{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:10Z","timestamp":1725557890293},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_14","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T15:02:02Z","timestamp":1277218922000},"page":"205-221","source":"Crossref","is-referenced-by-count":11,"title":["From P3P to Data Licenses"],"prefix":"10.1007","author":[{"given":"Shi-Cho","family":"Cha","sequence":"first","affiliation":[]},{"given":"Yuh-Jzer","family":"Joung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: Platform for Privacy Preference (P3P). In: W3C Recommendations (2002), Retrieved from \n                  \n                    http:\/\/www.w3c.org\/TR\/P3P\/"},{"key":"14_CR2","unstructured":"EPIC, Junkbuster: Pretty poor privacy: An assessment of p3p and internet privacy (2000), \n                  \n                    http:\/\/www.epic.org\/reports\/prettypoorprivacy.html"},{"key":"14_CR3","unstructured":"Isenberg, D.: The GigaLaw\u2014Guide to Internet Law. Random House Trade Paperbacks (2002)"},{"key":"14_CR4","unstructured":"Cha, S.C., Joung, Y.J.: Online Personal Data Licensing. In: Proceedings of the 3rd International Conference of Law and Technology (LAWTECH2002), pp. 28\u201333 (2002)"},{"key":"14_CR5","unstructured":"TRUSTe: (2002), Retrieved from \n                  \n                    http:\/\/www.truste.org"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/293411.293461","volume":"42","author":"P. Benassi","year":"1999","unstructured":"Benassi, P.: TRUSTe: an online privacy seal program. Communications of the ACM\u00a042, 56\u201359 (1999)","journal-title":"Communications of the ACM"},{"key":"14_CR7","unstructured":"for Economic Cooperation, O., (OECD), D.: Guidelines on the protection of privacy and transborder flows of personal data. Committee for Information, Computer, and Communication Policy (1980)"},{"key":"14_CR8","unstructured":"U.S. Federal Trade Commission: Privacy online: a report to congress (1998), Retrieved from \n                  \n                    http:\/\/www.ftc.gov\/reports\/privacy3\/index.htm"},{"key":"14_CR9","unstructured":"U.S. Department OF Commerce: Safe harbor privacy principles (2000), \n                  \n                    http:\/\/www.export.gov\/safeharbor\/SHPRINCIPLESFINAL.htm"},{"key":"14_CR10","unstructured":"European Comission: Platform for privacy preferences and the open profiling standard. Draft opinion of the working party on the protection of individuals with regard to the processing of personal data (1998), \n                  \n                    http:\/\/www.epic.org\/privacy\/internet\/ecp3p.html"},{"key":"14_CR11","unstructured":"World-Wide Web Consortium: W3C publishes first public working draft of P3P 1.0 (1998), \n                  \n                    http:\/\/www.w3.org\/Press\/1998\/P3P"},{"key":"14_CR12","unstructured":"Hensley, P., Metral, M., Shardanand, U., Converse, D., Meyers, M.: Proposal for an open profiling standard. In: W3 Consortium (1997), available as \n                  \n                    http:\/\/www.w3.org\/TR\/NOTE-OPS-FrameWork.html"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/502152.502153","volume":"1","author":"D.M. Kristol","year":"2001","unstructured":"Kristol, D.M.: HTTP Cookies: Standards, privacy, and politics. ACM Transactions on Internet Technology (TOIT)\u00a01, 151\u2013198 (2001)","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"14_CR14","unstructured":"W3C: Removing data transfer from P3P (1999), Retrieved from \n                  \n                    http:\/\/www.w3c.org\/P3P\/data-transfer.html"},{"key":"14_CR15","unstructured":"US Department of Defense: Trusted Computer System Evaluation Criteria. Technical Report 5200.28, US Department of Defense (1985)"},{"key":"14_CR16","volume-title":"Network Security: Private Communication in a Public World","author":"C. Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network Security: Private Communication in a Public World. Prentice Hall, Englewood Cliffs (2002) ISBN: 0-13-046019-2"},{"key":"14_CR17","unstructured":"Calder, A., Watkins, S.: IT Governance: Data Security & BS 7799\/ISO 17799. Kogan Page Ltd. (2002) ISBN: 0-7494-3845-2"},{"key":"14_CR18","unstructured":"Cranor, L., Langheinrich, M., Zurich, E.: A P3P Preference Exchange Language 1.0 (APPEL1.0). In: W3C Working Draft (2002), Retrieved August 20, (2002) from \n                  \n                    http:\/\/www.w3c.org\/TR\/P3P-preferences.html"},{"key":"14_CR19","unstructured":"Boyer, J.: Canonical XML. W3C Recommendation Version 1.0, W3C (2001)"},{"key":"14_CR20","unstructured":"Sonera Plaza Ltd MediaLab: Digital Rights Management white paper. Technical report, Sonera Plaza Ltd. (2002), \n                  \n                    http:\/\/www.medialab.sonera.fi"},{"key":"14_CR21","unstructured":"Microsoft Corporation: Windows Media Rights Manager 9 series - Live DRM. Technical report, Microsoft Corporation White Paper (2002), \n                  \n                    http:\/\/www.microsoft.com\/windows\/windowsmedia\/drm\/livedrm.pdf"},{"key":"14_CR22","unstructured":"IBM Corporation: Electronic Media Management System. Technical report, IBM Corporation (2000), \n                  \n                    http:\/\/www-1.ibm.com\/industries\/media\/pdf\/emms_brochure_in_english.pdf"},{"key":"14_CR23","unstructured":"Ayars, J.: XMCL - the eXtensible Media Commerce Language. W3c note, W3C (2002)"},{"key":"14_CR24","unstructured":"ContentGuard: XrML 2.1 overview. Technical report, ContentGard (2002)"},{"key":"14_CR25","volume-title":"Code and other Laws of Cyberspace","author":"L. Lessig","year":"1999","unstructured":"Lessig, L.: Code and other Laws of Cyberspace. Basic Books, New York (1999)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T21:35:49Z","timestamp":1552599349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}