{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:12:49Z","timestamp":1725891169007},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540857341"},{"type":"electronic","value":"9783540857358"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85735-8_17","type":"book-chapter","created":{"date-parts":[[2008,8,22]],"date-time":"2008-08-22T08:47:03Z","timestamp":1219394823000},"page":"173-184","source":"Crossref","is-referenced-by-count":3,"title":["Obligations: Building a Bridge between Personal and Enterprise Privacy in Pervasive Computing"],"prefix":"10.1007","author":[{"given":"Susana","family":"Alcalde Bag\u00fc\u00e9s","sequence":"first","affiliation":[]},{"given":"Jelena","family":"Mitic","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zeidler","sequence":"additional","affiliation":[]},{"given":"Marta","family":"Tejada","sequence":"additional","affiliation":[]},{"given":"Ignacio R.","family":"Matias","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Fernandez Valdivielso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: The platform for enterprise privacy practices - privacy enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482. Springer, Heidelberg (2003)"},{"key":"17_CR2","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.2) Specification (November 2003), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11957454_7","volume-title":"Privacy Enhancing Technologies","author":"M. Casassa Mont","year":"2006","unstructured":"Casassa Mont, M., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 118\u2013134. Springer, Heidelberg (2006)"},{"key":"17_CR4","unstructured":"Alcalde Bag\u00fc\u00e9s, S., Zeidler, A., Fernandez Valdivielso, C., Matias, I.R.: Sentry@home - leveraging the smart home for privacy in pervasive computing. International Journal of Smart Home\u00a01(2) (2007)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","volume":"63","author":"B.A. Price","year":"2005","unstructured":"Price, B.A., Adam, K., Nuseibeh, B.: Keeping ubiquitous computing to yourself: a practical model for user control of privacy. International Journal of Human-Computer Studies\u00a063, 228\u2013253 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1007\/978-3-540-76890-6_14","volume-title":"On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops","author":"S. Alcalde Bag\u00fc\u00e9s","year":"2007","unstructured":"Alcalde Bag\u00fc\u00e9s, S., Zeidler, A., Fernandez Valdivielso, C., Matias, I.R.: Towards personal privacy control. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM-WS 2007, Part II. LNCS, vol.\u00a04806, pp. 886\u2013895. Springer, Heidelberg (2007)"},{"key":"17_CR7","unstructured":"Federal Trade\u00a0Commission (FTC). Fair information practice principles. Privacy online: A (June 1998)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch, J., et al.: Privacy and Identity Management for Everyone. In: Proceedings of the ACM DIM (2005)","DOI":"10.1145\/1102486.1102491"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11555827_7","volume-title":"Computer Security \u2013 ESORICS 2005","author":"M. Hiltya","year":"2005","unstructured":"Hiltya, M., Basin, D.A., Pretschner, A.: On Obligations. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 98\u2013117. Springer, Heidelberg (2005)"},{"key":"17_CR10","unstructured":"Marco Casassa Mont. A System to Handle Privacy Obligations in Enterprises. Thesis (2005)"},{"key":"17_CR11","unstructured":"The CONNECT Project, http:\/\/www.ist-connect.eu\/"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Alcalde Bag\u00fc\u00e9s, S., Zeidler, A., Fernandez Valdivielso, C., Matias, I.R.: A user-centric privacy framework for pervasive environments. In: OTM Workshops (2), pp. 1347\u20131356 (2006)","DOI":"10.1007\/11915072_38"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Alcalde Bag\u00fc\u00e9s, S., Zeidler, A., Fernandez Valdivielso, C., Matias, I.R.: Disappearing for a while - using white lies in pervasive computing. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society (WPES 2007) (2007)","DOI":"10.1145\/1314333.1314349"},{"issue":"9","key":"17_CR14","first-page":"623","volume":"2","author":"R.P. Riet van de","year":"1996","unstructured":"van de Riet, R.P., Burg, J.F.M.: Linguistic tools for modelling alter egos in cyberspace: Who is responsible? Journal of Universal Computer Science\u00a02(9), 623\u2013636 (1996)","journal-title":"Journal of Universal Computer Science"},{"key":"17_CR15","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: Ponder: A language for specifying security and management policies for distributed systems (2000)"},{"key":"17_CR16","unstructured":"OASIS standard. eXtensible Access Control Markup Language. Version 2 (February 2005)"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The uconabc usage control model. ACM Trans. Inf. Syst. Secur.\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"17_CR18","unstructured":"Kagal, L.: A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments. Phd Thesis, University of Maryland Baltimore County (September 2004)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Mbanaso, U.M., Cooper, G.S., Chadwick, D.W., Anderson, A.: Obligations for privacy and confidentiality in distributed transactions. In: EUC Workshops, pp. 69\u201381 (2007)","DOI":"10.1007\/978-3-540-77090-9_7"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85735-8_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:34:21Z","timestamp":1606167261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85735-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540857341","9783540857358"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85735-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}