{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T04:09:31Z","timestamp":1748923771562,"version":"3.41.0"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319336114"},{"type":"electronic","value":"9783319336121"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33612-1_8","type":"book-chapter","created":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T08:18:38Z","timestamp":1461053918000},"page":"122-142","source":"Crossref","is-referenced-by-count":1,"title":["Type Checking Purpose-Based Privacy Policies in the $$\\pi $$ -Calculus"],"prefix":"10.1007","author":[{"given":"Eleni","family":"Kokkinofta","sequence":"first","affiliation":[]},{"given":"Anna","family":"Philippou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,20]]},"reference":[{"unstructured":"Vanderbilt University Medical Center, My Health at Vanderbilt (2015). http:\/\/www.vanderbilthealth.com\/main\/guide","key":"8_CR1"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.is.2013.12.006","volume":"47","author":"R Accorsi","year":"2015","unstructured":"Accorsi, R., Lehmann, A., Lohmann, N.: Information leak detection in business process models: theory, application, and tool support. Inf. Syst. 47, 244\u2013257 (2015)","journal-title":"Inf. Syst."},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of VLDB 2002, pp. 143\u2013154. Morgan Kaufmann (2002)","key":"8_CR3","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-540-39650-5_10","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 162\u2013180. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy, contextual integrity: framework and applications. In: Proceedings of S&P 2006, pp. 184\u2013198 (2006)","key":"8_CR5","DOI":"10.1109\/SP.2006.32"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14295-6_1","volume-title":"Computer Aided Verification","author":"D Basin","year":"2010","unstructured":"Basin, D., Klaedtke, F., M\u00fcller, S.: Policy monitoring in first-order temporal logic. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 1\u201318. Springer, Heidelberg (2010)"},{"issue":"2","key":"8_CR7","doi-asserted-by":"crossref","first-page":"113","DOI":"10.3233\/JCS-2006-14202","volume":"14","author":"C Braghin","year":"2006","unstructured":"Braghin, C., Gorla, D., Sassone, V.: Role-based access control for a distributed calculus. J. Comput. Secur. 14(2), 113\u2013155 (2006)","journal-title":"J. Comput. Secur."},{"issue":"4","key":"8_CR8","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1017\/S0960129509007762","volume":"19","author":"M Bugliesi","year":"2009","unstructured":"Bugliesi, M., Colazzo, D., Crafa, S., Macedonio, D.: A type system for discretionary access control. Math. Struct. Comput. Sci. 19(4), 839\u2013875 (2009)","journal-title":"Math. Struct. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Byun, J., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of SACMAT 2005, pp. 102\u2013110. ACM (2005)","key":"8_CR9","DOI":"10.1145\/1063979.1063998"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.ic.2014.07.005","volume":"238","author":"S Capecchi","year":"2014","unstructured":"Capecchi, S., Castellani, I., Dezani-Ciancaglini, M.: Typing access control and secure information flow in sessions. Inf. Comput. 238, 68\u2013105 (2014)","journal-title":"Inf. Comput."},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ic.2004.08.003","volume":"196","author":"L Cardelli","year":"2005","unstructured":"Cardelli, L., Ghelli, G., Gordon, A.D.: Secrecy and group creation. Inf. Comput. 196(2), 127\u2013155 (2005)","journal-title":"Inf. Comput."},{"doi-asserted-by":"crossref","unstructured":"Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Datta, A., Jia, L., Winsborough, W.H.: Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. In: Proceedings of SACMAT 2013, pp. 3\u201314. ACM (2013)","key":"8_CR12","DOI":"10.1145\/2462410.2462423"},{"issue":"11","key":"8_CR13","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1109\/TKDE.2014.2312112","volume":"26","author":"P Colombo","year":"2014","unstructured":"Colombo, P., Ferrari, E.: Enforcement of purpose based access control within relational database management systems. IEEE Trans. Knowl. Data Eng. 26(11), 2703\u20132716 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1\u20133","key":"8_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.tcs.2008.01.040","volume":"398","author":"AB Compagnoni","year":"2008","unstructured":"Compagnoni, A.B., Gunter, E.L., Bidinger, P.: Role-based access control for boxed ambients. Theor. Comput. Sci. 398(1\u20133), 203\u2013216 (2008)","journal-title":"Theor. Comput. Sci."},{"key":"8_CR15","volume-title":"Web privacy with P3P- The Platform for Privacy Preferences","author":"LF Cranor","year":"2002","unstructured":"Cranor, L.F.: Web privacy with P3P- The Platform for Privacy Preferences. O\u2019Reilly, Sebastopol (2002)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25560-1_1","volume-title":"Information Systems Security","author":"A Datta","year":"2011","unstructured":"Datta, A., Blocki, J., Christin, N., DeYoung, H., Garg, D., Jia, L., Kaynar, D., Sinha, A.: Understanding and protecting privacy: formal semantics and principled audit mechanisms. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 1\u201327. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"DeYoung, H., Garg, D., Jia, L., Kaynar, D.K., Datta, A.: Experiences in the logical specification of the HIPAA and GLBA privacy laws. In: Proceedings of WPES 2010, pp. 73\u201382. ACM (2010)","key":"8_CR17","DOI":"10.21236\/ADA571991"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-20775-4_1","volume-title":"Functional and Constraint Logic Programming","author":"M Dezani-Ciancaglini","year":"2011","unstructured":"Dezani-Ciancaglini, M., Ghilezan, S., Jak\u0161i\u0107, S., Pantovi\u0107, J.: Types for Role-based access control of dynamic web data. In: Mari\u00f1o, J. (ed.) WFLP 2010. LNCS, vol. 6559, pp. 1\u201329. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Garg, D., Jia, L., Datta, A.: Policy auditing over incomplete logs: theory, implementation and applications. In: Proceedings of CCS 2011, pp. 151\u2013162. ACM (2011)","key":"8_CR19","DOI":"10.1145\/2046707.2046726"},{"issue":"4\u20135","key":"8_CR20","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00236-005-0178-y","volume":"42","author":"M Hennessy","year":"2005","unstructured":"Hennessy, M., Rathke, J., Yoshida, N.: Safedpi: a language for controlling mobile code. Acta Informatica 42(4\u20135), 227\u2013290 (2005)","journal-title":"Acta Informatica"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1006\/inco.2001.3089","volume":"173","author":"M Hennessy","year":"2002","unstructured":"Hennessy, M., Riely, J.: Resource access control in systems of mobile agents. Inf. Comput. 173(1), 82\u2013120 (2002)","journal-title":"Inf. Comput."},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-642-36742-7_31","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Koleini","year":"2013","unstructured":"Koleini, M., Ritter, E., Ryan, M.: Model checking agent knowledge in dynamic access control policies. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013 (ETAPS 2013). LNCS, vol. 7795, pp. 448\u2013462. Springer, Heidelberg (2013)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-319-19195-9_12","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"D Kouzapas","year":"2015","unstructured":"Kouzapas, D., Philippou, A.: Type checking privacy policies in the $$\\pi $$ -calculus. In: Graf, S., Viswanathan, M. (eds.) Formal Techniques for Distributed Objects, Components, and Systems. LNCS, vol. 9039, pp. 181\u2013195. Springer, Heidelberg (2015)"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-75698-9_15","volume-title":"International Symposium on Fundamentals of Software Engineering","author":"A Lapadula","year":"2007","unstructured":"Lapadula, A., Pugliese, R., Tiezzi, F.: Regulating data exchange in service oriented applications. In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol. 4767, pp. 223\u2013239. Springer, Heidelberg (2007)"},{"issue":"2","key":"8_CR25","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1147\/sj.462.0335","volume":"46","author":"Y Liu","year":"2007","unstructured":"Liu, Y., M\u00fcller, S., Xu, K.: A static compliance-checking framework for business process models. IBM Syst. J. 46(2), 335\u2013362 (2007)","journal-title":"IBM Syst. J."},{"doi-asserted-by":"crossref","unstructured":"May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: Proceedings of CSFW 2006, pp. 85\u201397 (2006)","key":"8_CR26","DOI":"10.1109\/CSFW.2006.24"},{"doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proceedings of SACMAT 2008, pp. 133\u2013142. ACM (2008)","key":"8_CR27","DOI":"10.1145\/1377836.1377857"},{"key":"8_CR28","volume-title":"Privacy in Context: Technology, Policy and the Integrity of Social Life","author":"H Nissenbaum","year":"2010","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy and the Integrity of Social Life. Stanford University Press, Palo Alto (2010)"},{"issue":"4","key":"8_CR29","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.entcs.2006.02.006","volume":"144","author":"O Sokolsky","year":"2006","unstructured":"Sokolsky, O., Sammapun, U., Lee, I., Kim, J.: Run-time checking of dynamic properties. Electron. Notes Theor. Comput. Sci. 144(4), 91\u2013108 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Tschantz, M.C., Datta, A., Wing, J.M.: Formalizing and enforcing purpose restrictions in privacy policies. In: Proceedings of SP 2012, pp. 176\u2013190. IEEE Computer Society (2012)","key":"8_CR30","DOI":"10.1109\/SP.2012.21"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"MC Tschantz","year":"2009","unstructured":"Tschantz, M.C., Wing, J.M.: Formal Methods for Privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1\u201315. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Yang, N., Barringer, H., Zhang, N.: A purpose-based access control model. In: Proceedings of IAS 2007, pp. 143\u2013148. IEEE Computer Society (2007)","key":"8_CR32","DOI":"10.1109\/ISIAS.2007.4299765"}],"container-title":["Lecture Notes in Computer Science","Web Services, Formal Methods, and Behavioral Types"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33612-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T20:16:10Z","timestamp":1748895370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33612-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336114","9783319336121"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33612-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}