{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:10:49Z","timestamp":1725538249025},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042799"},{"type":"electronic","value":"9783642042805"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04280-5_29","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T09:25:31Z","timestamp":1253265931000},"page":"369-384","source":"Crossref","is-referenced-by-count":0,"title":["Towards E-Society Policy Interoperability"],"prefix":"10.1007","author":[{"given":"Renato","family":"Iannella","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Qui, X.: Citizen Engagement: Driving Force of E-Society Development. In: Wang, W. (ed.) IFIP International Federation for Information Processing. Integration and Innovation Orient to E-Society, Integration and Innovation Orient to E-Society, vol.\u00a0252, 2, pp. 540\u2013548. Springer, Boston"},{"key":"29_CR2","unstructured":"Iannella, R.: Industry Challenges for Social and Professional Networks. In: W3C Workshop on the Future of Social Networking, Barcelona (January 15-16, 2009), http:\/\/www.w3.org\/2008\/09\/msnws\/papers\/nicta-position-paper.pdf"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Weitzner, D.G.: Profiling, and Privacy. IEEE Internet Computing, 95\u201397 (November\/December 2007)","DOI":"10.1109\/MIC.2007.129"},{"key":"29_CR4","unstructured":"Cohen, N.: Use My Photo? Not Without Permission. New York Times (October 1, 2007), http:\/\/www.nytimes.com\/2007\/10\/01\/technology\/01link.html?ex=1348977600&en=182a46901b23f450&ei=5124&partner=permalink&exprod=permalink"},{"key":"29_CR5","unstructured":"ABC Media Watch, Filleting Facebook. Australian Broadcasting Corporation (ABC) (October 29, 2007), http:\/\/www.abc.net.au\/mediawatch\/transcripts\/s2074079.htm"},{"key":"29_CR6","unstructured":"Iannella, R., Henricksen, K., Robinson, R.: A Policy Oriented Architecture for the Web: New Infrastructure and New Opportunities. In: W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy, October 17-18 (2006)"},{"key":"29_CR7","unstructured":"Iannella, R. (ed.): Open Digital Rights Language, Version 1.1 Specification. ODRL Initiative (September 19, 2002), http:\/\/odrl.net\/1.1\/ODRL-11.pdf , http:\/\/www.w3.org\/TR\/odrl\/"},{"key":"29_CR8","unstructured":"Wenning, R., Schunter, M. (eds.): The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C Working Group Note (November 13, 2006), http:\/\/www.w3.org\/TR\/P3P11\/"},{"key":"29_CR9","volume-title":"Ontology Matching","author":"J. Euzenat","year":"2007","unstructured":"Euzenat, J., Shvaiko, P.: Ontology Matching. Springer, Berlin (2007)"},{"key":"29_CR10","unstructured":"Arnab, A., Hutchison, A.: DRM Use License Negotiation using ODRL v2.0. In: Proceedings 5th International Workshop for Technology, Economy, and Legal Aspects of Virtual Goods and the 3rd International ODRL Workshop, Koblenz, Germany, October 11-13 (2007)"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Hu, Y.J.: Semantic-Driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies. In: Workshop on Privacy Enforcement and Accountability with Semantics, International Semantic Web Conference 2007, Busan Korea (2007)","DOI":"10.1109\/SUTC.2008.59"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Garc\u00eda, R., Gil, R.: An OWL Copyright Ontology for Semantic Digital Rights Management. In: IFIP WG 2.12 & WG 12.4 International Workshop on Web Semantics, Montpellier, France (November 2006)","DOI":"10.1007\/11915072_81"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Kolari, P., Ding, L., Shashidhara, G., Joshi, A., Finin, T., Kagal, L.: Enhancing Web privacy protection through declarative policies. In: Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, June 6-8, pp. 57\u201366 (2005)","DOI":"10.1109\/POLICY.2005.15"},{"key":"29_CR14","unstructured":"OASIS eXtensible Access Control Markup Language (XACML), Version 2.0. OASIS Standard (February 1, 2005), http:\/\/docs.oasis-open.org\/xacml\/2.0\/XACML-2.0-OS-NORMATIVE.zip"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1007\/11762256_51","volume-title":"The Semantic Web: Research and Applications","author":"P.A. Bonatti","year":"2006","unstructured":"Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic Web Policies - A Discussion of Requirements and Research Issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol.\u00a04011, pp. 712\u2013724. Springer, Heidelberg (2006)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Kolari, P., Finin, T., Yesha, Y., Lyons, K., Hawkins, J., Perelgut, S.: Policy Management of Enterprise Systems: A Requirements Study. In: Proceedings of the Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2006 (2006)","DOI":"10.1109\/POLICY.2006.23"},{"key":"29_CR17","unstructured":"Semantic Web and Policy Workshop, Galway, Ireland (November 7, 2005)"},{"key":"29_CR18","unstructured":"2nd International Semantic Web Policy Workshop (SWPW 2006), Athens, GA, USA, November 5-9 (2006)"},{"key":"29_CR19","unstructured":"Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sus, G.J.: Information Accountability. MIT Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2007-034 (June 13, 2007)"},{"key":"29_CR20","unstructured":"Casassa-Mont, M., Crosta, S., Kriegelstein, T., Sommer, D.: PRIME Architecture V2 (March 29, 2007), https:\/\/www.prime-project.eu\/prime_products\/reports\/arch\/pub_del_D14.2.c_ec_WP14.2_v1_Final.pdf"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/11560326_33","volume-title":"Computer Network Security","author":"F.J.G. Clemente","year":"2005","unstructured":"Clemente, F.J.G., Perez, G.M., Skarmeta, A.F.G.: An XML-Seamless Policy Based Management Framework. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2005. LNCS, vol.\u00a03685, pp. 418\u2013423. Springer, Heidelberg (2005)"},{"issue":"2","key":"29_CR22","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/1065545.1065547","volume":"8","author":"R. Bhatti","year":"2005","unstructured":"Bhatti, R., Ghafoor, A., Bertino, E., Joshi, J.B.D.: X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC)\u00a08(2), 187\u2013227 (2005)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"4","key":"29_CR23","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10270-006-0030-z","volume":"5","author":"M. Koch","year":"2006","unstructured":"Koch, M., Parisi-Presicce, F.: UML specification of access control policies and their formal verification. Software and Systems Modeling\u00a05(4), 429\u2013447 (2006)","journal-title":"Software and Systems Modeling"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Lamparter, S., Ankolekar, A., Studer, R., Oberle, D., Weinhardt, C.: A policy framework for trading configurable goods and services in open electronic markets. In: Proceedings of the 8th International Conference on Electronic Commerce, Fredericton, New Brunswick, Canada, August 14-16 (2006)","DOI":"10.1145\/1151454.1151488"},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A. Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Commun. ACM\u00a049, 9 (2006)","journal-title":"Commun. ACM"},{"key":"29_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-540-39718-2_27","volume-title":"The Semantic Web - ISWC 2003","author":"G. Tonti","year":"2003","unstructured":"Tonti, G., Bradshaw, J., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic Web Languages for Policy Representation and Reasoning: A Comparison of Kaos, Rei, and Ponder. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 419\u2013437. Springer, Heidelberg (2003)"},{"key":"29_CR27","unstructured":"Anderson, A.: A comparison of two Privacy Policy Languages: EPAL and XACML. Sun Mircosystems Labs technical report (2005), http:\/\/research.sun.com\/techrep\/2005\/smli_tr-2005-147\/"},{"key":"29_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/11531371_48","volume-title":"Web Engineering","author":"C. Ardagna","year":"2005","unstructured":"Ardagna, C., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Offline Expansion of XACML Policies Based on P3P Metadata. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol.\u00a03579, pp. 363\u2013374. Springer, Heidelberg (2005)"},{"key":"29_CR29","unstructured":"Jensen, C., Tullio, J., Potts, C., Mynatt, E.D.: STRAP: A Structured Analysis Framework for Privacy. Georgia Institute of Technology Technical Report GIT-GVU-05-02, http:\/\/hdl.handle.net\/1853\/4450"},{"key":"29_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-27834-4_41","volume-title":"Web Engineering","author":"E. Damiani","year":"2004","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending Policy Languages to the Semantic Web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol.\u00a03140, pp. 330\u2013343. Springer, Heidelberg (2004)"},{"key":"29_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-540-39718-2_26","volume-title":"The Semantic Web - ISWC 2003","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T., Joshi, A.: A Policy Based Approach to Security for the Semantic Web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 402\u2013418. Springer, Heidelberg (2003)"},{"key":"29_CR32","unstructured":"Felt, A., Evans, D.: Privacy Protection for Social Networking Platforms. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)"},{"key":"29_CR33","unstructured":"Chew, M., Balfanz, D., Laurie, B.: (Under) Mining Privacy in Social Networks. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)"},{"key":"29_CR34","unstructured":"Grandison, T., Maximilien, E.M.: Towards Privacy Propagation in the Social Web. In: Web 2.0 Security and Privacy at the 2008 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)"},{"key":"29_CR35","doi-asserted-by":"crossref","unstructured":"Kaiser, M.: Toward the Realization of Policy-Oriented Enterprise Management. IEEE Computer, 57\u201363 (November 2007)","DOI":"10.1109\/MC.2007.406"},{"key":"29_CR36","unstructured":"Guth, S., Iannella, R. (eds.): ODRL Version 2.0 Core Model. Draft Specification (March 6, 2009), http:\/\/odrl.net\/2.0\/DS-ODRL-Model.html"}],"container-title":["IFIP Advances in Information and Communication Technology","Software Services for e-Business and e-Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04280-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:12:33Z","timestamp":1558548753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04280-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042799","9783642042805"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04280-5_29","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}