{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T02:40:10Z","timestamp":1748832010324,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318103"},{"type":"electronic","value":"9783319318110"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31811-0_2","type":"book-chapter","created":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T10:59:22Z","timestamp":1459508362000},"page":"17-35","source":"Crossref","is-referenced-by-count":2,"title":["An Ontology Regulating Privacy Oriented Access Controls"],"prefix":"10.1007","author":[{"given":"Maherzia","family":"Belaazi","sequence":"first","affiliation":[]},{"given":"Hanen Boussi","family":"Rahmouni","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Bouhoula","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Damiani, E., Samarati, S.: New paradigms for access control in open environments. In: Proceedings of the Fifth IEEE International Symposium Signal Processing and Information Technology, pp. 540\u2013545 (2005)","DOI":"10.1109\/ISSPIT.2005.1577155"},{"key":"2_CR2","unstructured":"Reul, Q., Meersman, R.: Ontology-based access control policy interoperability. In: STARLab (2013)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11909033_18","volume-title":"Communications and Multimedia Security","author":"NJ Zhang","year":"2006","unstructured":"Zhang, N.J., Todd, C.: A privacy agent in context-aware ubiquitous computing environments. In: Leitold, H., Markatos, E.P. (eds.) CMS 2006. LNCS, vol. 4237, pp. 196\u2013205. Springer, Heidelberg (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Garcia, F.: Towards a base ontology for privacy protection in service-oriented architecture. In: IEEE International Conference on Service-Oriented Computing and Applications (SOCA) (2009)","DOI":"10.1109\/SOCA.2009.5410467"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquisition 5(2), 199\u2013220 (1993)","journal-title":"Knowl. Acquisition"},{"issue":"5\u20136","key":"2_CR6","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1006\/ijhc.1995.1081","volume":"43","author":"TR Gruber","year":"1995","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Int. J. Hum. Comput. Stud. 43(5\u20136), 907\u2013928 (1995)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"1\u20132","key":"2_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3233\/AO-2008-0047","volume":"3","author":"P Spyns","year":"2008","unstructured":"Spyns, P., Meersman, R.: An ontology engineering methodology for DOGMA. Appl. Ontology 3(1\u20132), 13\u201339 (2008)","journal-title":"Appl. Ontology"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Byun, J., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies. ACM New York (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1007\/11915072_108","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"MJ Covington","year":"2006","unstructured":"Covington, M.J., Sastry, M.R.: A contextual attribute-based access control model. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4278, pp. 1996\u20132006. Springer, Heidelberg (2006)"},{"key":"2_CR10","unstructured":"Gilles, N., Kamel, M.: Ontology learning by analyzing XML document structure and content. In: Proceedings of the International Conference on Knowledge Engineering and Ontology Development KEOD Portugal (2009)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kamel, M., Rothenburger, B.: Eliciting hierarchical structures from enumerative structures for ontology learning. In: Proceedings of the 6th International Conference on Knowledge Capture K-CAP (2011)","DOI":"10.1145\/1999676.1999706"},{"key":"2_CR12","unstructured":"Noy, N.F., McGuiness, D.: An ontology development 101: a guide to creating your first ontology. Standford knowledge systems laboratory Technical report KSL-01-05 and standford medical informatics Technical report SMI-2001-0880 (2001)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-38326-7_30","volume-title":"Artificial Intelligence in Medicine","author":"A Ben Abacha","year":"2013","unstructured":"Ben Abacha, A., Da Silveira, M., Pruski, C.: Medical ontology validation through question answering. In: Peek, N., Mar\u00edn Morales, R., Peleg, M. (eds.) AIME 2013. LNCS, vol. 7885, pp. 196\u2013205. Springer, Heidelberg (2013)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-30475-3_17","volume-title":"The Semantic Web \u2013 ISWC 2004","author":"NF Noy","year":"2004","unstructured":"Noy, N.F., Musen, M.A.: The prot\u00e9g\u00e9 OWL plugin: an open development environment for semantic web applications. In: McIlraith, S.A., Plexousakis, D., Harmelen, F. (eds.) ISWC 2004. LNCS, vol. 3298, pp. 229\u2013243. Springer, Heidelberg (2004)"},{"key":"2_CR15","unstructured":"Protege. http:\/\/protege.stanford.edu"},{"key":"2_CR16","unstructured":"SWRL. http:\/\/www.w3.org\/Submission\/SWRL\/"},{"key":"2_CR17","unstructured":"OWL. http:\/\/www.w3.org\/TR\/owl-guide\/"},{"key":"2_CR18","unstructured":"OECD Privacy. http:\/\/www.ncbi.nlm.nih.gov"},{"key":"2_CR19","unstructured":"EC: Data Protection in the European Union. European Commission (2010)"},{"key":"2_CR20","unstructured":"Boussi, H.: Ontology based privacy compliance for health data disclosure in Europe. A thesis report (2010)"},{"key":"2_CR21","unstructured":"Caralt, N.: Modelling legal knowledge through ontologies. A thesis report (2008)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/11564751_2","volume-title":"Principles and Practice of Constraint Programming","author":"I Horrocks","year":"2005","unstructured":"Horrocks, I.: OWL: a description logic based ontology language. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, pp. 5\u20138. Springer, Heidelberg (2005)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zhu, J., Smari, W.W.: Attribute based access control and security for collaboration environments. In: Aerospace and Electronics Conference (2008)","DOI":"10.1109\/NAECON.2008.4806511"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-540-45215-7_2","volume-title":"Computer Network Security","author":"R Sandhu","year":"2003","unstructured":"Sandhu, R., Park, J.: Usage control: a vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 17\u201331. Springer, Heidelberg (2003)"},{"key":"2_CR25","unstructured":"Oasis Web Site (2013). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Anderson, A.H: A Comparison of Two Privacy Policy Languages: EPAL and XACML. GSun Microsystems Labs Technical report (2005)","DOI":"10.1145\/1180367.1180378"},{"issue":"4","key":"2_CR27","first-page":"465","volume":"23","author":"CAN \u00d6zg\u00fc","year":"2010","unstructured":"\u00d6zg\u00fc, C.A.N., Bursa, O., \u00dcnalir, M.O.: Personalizable ontology-based access control. Gazi Univ. J. Sci. 23(4), 465\u2013474 (2010)","journal-title":"Gazi Univ. J. Sci."}],"container-title":["Lecture Notes in Computer Science","Risks and Security of Internet and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31811-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T02:27:40Z","timestamp":1748831260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31811-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318103","9783319318110"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31811-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}