{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:58:17Z","timestamp":1725879497036},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319530758"},{"type":"electronic","value":"9783319530765"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53076-5_8","type":"book-chapter","created":{"date-parts":[[2017,1,27]],"date-time":"2017-01-27T07:14:22Z","timestamp":1485501262000},"page":"137-154","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of User Specific Privacy Policy Architecture for Collaborative BPaaS on the Example of Logistics"],"prefix":"10.1007","author":[{"given":"Bj\u00f6rn","family":"Schwarzbach","sequence":"first","affiliation":[]},{"given":"Michael","family":"Gl\u00f6ckner","sequence":"additional","affiliation":[]},{"given":"Bogdan","family":"Franczyk","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Ludwig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,28]]},"reference":[{"key":"8_CR1","unstructured":"Wolf, M.-B., Rahn, J., Hompel, M.T.: Cloud Computing f\u00fcr Logistik 2: Akzeptanz und Nutzungsbereitschaft der Logistics Mall bei Anwendern und Anbietern: [eine qualitative und quantitative empirische Analyse des Fraunhofer-Institutes f\u00fcr Materialfluss und Logistik IML. Fraunhofer Verlag (2013)"},{"key":"8_CR2","unstructured":"Schwarzbach, B., Pirogov, A., Schier, A., Franczyk, B.: Inter-cloud architecture for privacy-preserving collaborative BPaaS. QUIS14 (2015)"},{"issue":"6","key":"8_CR3","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24\u201331 (2010)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"8_CR4","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35(4), 1017\u20131042 (2011)","journal-title":"MIS Q."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Schwarzbach, B., Gl\u00f6ckner, M., Pirogov, A., R\u00f6hling, M.M., Franczyk, B.: Secure service interaction for collaborative business processes in the inter-cloud. In: 2015 Federated Conference on Computer Science and Information Systems, pp. 1377\u20131386. IEEE (2015). doi: 10.15439\/2015F282","DOI":"10.15439\/2015F282"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44\u201352 (2009)","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"8_CR7","unstructured":"Bundesamt, S.: 12% der Unternehmen setzen auf Cloud Computing. https:\/\/www.destatis.de\/DE\/PresseService\/Presse\/Pressemitteilungen\/2014\/12\/PD14\\textunderscore467\\textunderscore52911.html (2014)"},{"key":"8_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.46","author":"M Singhal","year":"2013","unstructured":"Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.-J., Bertino, E.: Collaboration in multicloud computing environments: framework and security issues. Computer (2013). doi: 10.1109\/MC.2013.46","journal-title":"Computer"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4","volume-title":"Data and Applications Security and Privacy XXVI","year":"2012","unstructured":"Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.): DBSec 2012. LNCS, vol. 7371. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31540-4"},{"key":"8_CR10","unstructured":"Lindqvist, H.: Mandatory access control. Master\u2019s Thesis in Computing Science, Umea University, Department of Computing Science, SE-901, vol. 87 (2006)"},{"key":"8_CR11","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-Based Access Control (RBAC): features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241\u2013248 (1995)"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"Zahid, I., Josef, N.: Towards semantic-enhanced attribute-based access control for cloud services. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1223\u20131230 (2012). doi: 10.1109\/TrustCom.2012.280","DOI":"10.1109\/TrustCom.2012.280"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-31540-4_4","volume-title":"Data and Applications Security and Privacy XXVI","author":"X Jin","year":"2012","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 41\u201355. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31540-4_4"},{"key":"8_CR14","unstructured":"Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. arXiv preprint arXiv:0903.2171 (2009)"},{"issue":"4","key":"8_CR15","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1016\/j.cose.2012.01.010","volume":"31","author":"A Gouglidis","year":"2012","unstructured":"Gouglidis, A., Mavridis, I.: domRBAC: an access control model for modern collaborative systems. Comput. Secur. 31(4), 540\u2013556 (2012)","journal-title":"Comput. Secur."},{"key":"8_CR16","unstructured":"Le, X.H., Wang, D.: Development of a system framework for implementation of an enhanced role-based access control model to support collaborative processes. In: Proceedings of 3rd USENIX Workshops on Health Security and Privacy (2012)"},{"issue":"6","key":"8_CR17","doi-asserted-by":"crossref","first-page":"1084","DOI":"10.1016\/j.jbi.2012.06.001","volume":"45","author":"XH Le","year":"2012","unstructured":"Le, X.H., Doll, T., Barbosu, M., Luque, A., Wang, D.: An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow. J. Biomed. Inform. 45(6), 1084\u20131107 (2012)","journal-title":"J. Biomed. Inform."},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.11.007","author":"XH Le","year":"2014","unstructured":"Le, X.H., Doll, T., Barbosu, M., Luque, A., Wang, D.: Evaluation of an enhanced role-based access control model to manage information access in collaborative processes for a statewide clinical education program. J. Biomed. Inf. (2014). doi: 10.1016\/j.jbi.2013.11.007","journal-title":"J. Biomed. Inf."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations. national institute of standards and technology (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"8_CR20","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2014.36","author":"J Venable","year":"2014","unstructured":"Venable, J., Pries-Heje, J., Baskerville, R.: FEDS: a framework for evaluation in design science research. Eur. J. Inf. Syst. (2014). doi: 10.1057\/ejis.2014.36","journal-title":"Eur. J. Inf. Syst."},{"issue":"1","key":"8_CR21","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"A Hevner","year":"2004","unstructured":"Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013105 (2004)","journal-title":"MIS Q."},{"issue":"5","key":"8_CR22","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1080\/0141192960220502","volume":"22","author":"D Wiliam","year":"1996","unstructured":"Wiliam, D., Black, P.: Meanings and consequences: a basis for distinguishing formative and summative functions of assessment? Brit. Educ. Res. J. 22(5), 537\u2013548 (1996)","journal-title":"Brit. Educ. Res. J."},{"key":"8_CR23","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20324","author":"Y Sun","year":"2006","unstructured":"Sun, Y., Kantor, P.B.: Cross-evaluation: a new model for information system evaluation. J. Am. Soc. Inf. Sci. Technol. (2006). doi: 10.1002\/asi.20324","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"8_CR24","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-94-010-0309-4_4","volume-title":"International Handbook of Educational Evaluation","author":"DL Stufflebeam","year":"2003","unstructured":"Stufflebeam, D.L.: The CIPP model for evaluation. In: Kellaghan, T., Stufflebeam, D.L. (eds.) International Handbook of Educational Evaluation, vol. 9, pp. 31\u201362. Springer, Dordrecht (2003). Kluwer International Handbooks of Education"},{"key":"8_CR25","volume-title":"Object-Oriented Analysis and Design","author":"L Mathiassen","year":"2000","unstructured":"Mathiassen, L., Munk-Madsen, A., Nielsen, P.A., Stage, J., Jacksen, M.: Object-Oriented Analysis and Design. Marko, Aalborg (2000)"},{"key":"8_CR26","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000304","author":"S Smithson","year":"1998","unstructured":"Smithson, S., Hirschheim, R.: Analysing information systems evaluation: another look at an old problem. Eur. J. Inf. Syst. (1998). doi: 10.1057\/palgrave.ejis.3000304","journal-title":"Eur. J. Inf. Syst."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Nergaard, H., Ulltveit-Moe, N., Gj\u00f8s\u00e6ter, T.: A scratch-based graphical policy editor for XACML. In: ICISSP 2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy ESEO, Angers, Loire Valley, France, pp. 182\u2013191 (2015)","DOI":"10.1007\/978-3-319-27668-7_7"}],"container-title":["Lecture Notes in Business Information Processing","Information Technology for Management: New Ideas and Real Solutions"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53076-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T21:28:38Z","timestamp":1568755718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-53076-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319530758","9783319530765"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53076-5_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2017]]}}}