{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T23:48:50Z","timestamp":1725925730794},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319725970"},{"type":"electronic","value":"9783319725987"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72598-7_5","type":"book-chapter","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:06:49Z","timestamp":1512130009000},"page":"68-87","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Generalization of Privacy Policy Specification and Property-Based Information\u00a0Leakage"],"prefix":"10.1007","author":[{"given":"Dileep Kumar","family":"Koshley","sequence":"first","affiliation":[]},{"given":"Sapana","family":"Rani","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,2]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/11554578_6","volume-title":"Foundations of Security Analysis and Design III","author":"E Bertino","year":"2005","unstructured":"Bertino, E., Byun, J.-W., Li, N.: Privacy-preserving database systems. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, vol. 3655, pp. 178\u2013206. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11554578_6"},{"issue":"05","key":"5_CR3","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"1","key":"5_CR4","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: respecting privacy in data publishing. Proc. VLDB Endow. 3(1\u20132), 1370\u20131381 (2010)","DOI":"10.14778\/1920841.1921009"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39256-6_1","volume-title":"Data and Applications Security and Privacy XXVII","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Extending loose associations to multiple fragments. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 1\u201316. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39256-6_1"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Loose associations to increase utility in data publishing. J. Comput. Secur. 23(1), 59\u201388 (2015)","DOI":"10.3233\/JCS-140513"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-12098-5_14","volume-title":"Database Systems for Advanced Applications","author":"HW Wang","year":"2010","unstructured":"Wang, H.W., Liu, R.: Privacy-preserving publishing data with full functional dependencies. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds.) DASFAA 2010. LNCS, vol. 5982, pp. 176\u2013183. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12098-5_14"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Dong, B., Wang, W., Yang, J.: Secure data outsourcing with adversarial data dependency constraints. In: 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), IEEE International Conference on Intelligent Data and Security (IDS), pp. 73\u201378. IEEE (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.17"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE Trans. Dependable Secure Comput. 11(6), 510\u2013523 (2014)","DOI":"10.1109\/TDSC.2013.2295798"},{"key":"5_CR12","unstructured":"Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K., Byun, J.W.: On the correctness criteria of fine-grained access control in relational databases. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB Endowment, pp. 555\u2013566 (2007)"},{"key":"5_CR13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.jbi.2014.01.013","volume":"50","author":"AH Landberg","year":"2014","unstructured":"Landberg, A.H., Nguyen, K., Pardede, E., Rahayu, J.W.: $$\\delta $$ \u03b4 -dependency for privacy-preserving XML data publishing. J. Biomed. Inf. 50, 77\u201394 (2014)","journal-title":"J. Biomed. Inf."},{"issue":"2","key":"5_CR14","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. ACM SIGKDD Explor. Newsl. 4(2), 6\u201311 (2002)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB Endowment, pp. 143\u2013154 (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Paci, F., Zannone, N.: Preventing information inference in access control. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pp. 87\u201397. ACM (2015)","DOI":"10.1145\/2752952.2752971"},{"issue":"2","key":"5_CR17","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/362007.362035","volume":"13","author":"J Earley","year":"1970","unstructured":"Earley, J.: An efficient context-free parsing algorithm. Commun. ACM 13(2), 94\u2013102 (1970)","journal-title":"Commun. ACM"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/11575467_27","volume-title":"Programming Languages and Systems","author":"I Mastroeni","year":"2005","unstructured":"Mastroeni, I.: On the r\u00f4le of abstract non-interference in language-based security. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 418\u2013433. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11575467_27"},{"issue":"1","key":"5_CR19","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1145\/982962.964017","volume":"39","author":"R Giacobazzi","year":"2004","unstructured":"Giacobazzi, R., Mastroeni, I.: Abstract non-interference: parameterizing non-interference by abstract interpretation. ACM SIGPLAN Not. 39(1), 186\u2013197 (2004)","journal-title":"ACM SIGPLAN Not."},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-642-22348-8_6","volume-title":"Data and Applications Security and Privacy XXV","author":"V Ciriani","year":"2011","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Enforcing confidentiality and data visibility constraints: an OBDD approach. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 44\u201359. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22348-8_6"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S., Rjaibi, W.: Extending relational database systems to automatically enforce privacy policies. In: 21st International Conference on Data Engineering, ICDE 2005, Proceedings, pp. 1013\u20131022. IEEE (2005)","DOI":"10.1109\/ICDE.2005.64"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Iyilade, J., Vassileva, J.: P2U: a privacy policy specification language for secondary data sharing and usage. In: 2014 IEEE Security and Privacy Workshops (SPW), pp. 18\u201322. IEEE (2014)","DOI":"10.1109\/SPW.2014.12"},{"issue":"6","key":"5_CR23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"99","author":"LF Cranor","year":"2003","unstructured":"Cranor, L.F.: P3P: making privacy policies more useful. IEEE Secur. Priv. 99(6), 50\u201355 (2003)","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72598-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T03:36:23Z","timestamp":1570419383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72598-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319725970","9783319725987"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72598-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}