{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:10:36Z","timestamp":1725549036803},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642112065"},{"type":"electronic","value":"9783642112072"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11207-2_2","type":"book-chapter","created":{"date-parts":[[2010,3,5]],"date-time":"2010-03-05T09:46:11Z","timestamp":1267782371000},"page":"9-17","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Management for Global Organizations"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Tomas","family":"Sander","sequence":"additional","affiliation":[]},{"given":"Rajneesh","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"54","volume-title":"Internet Computing Privacy Ontology Support for E-Commerce","author":"M. Hecker","year":"2008","unstructured":"Hecker, M., Dillon, T.S., Chang, E.: Internet Computing Privacy Ontology Support for E-Commerce, vol.\u00a012(2), pp. 54\u201361. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"2_CR2","first-page":"947","volume-title":"An ontology for privacy policy management in ubiquitous environments, NOMS","author":"L.A.F. Martimiano","year":"2008","unstructured":"Martimiano, L.A.F., Goncalves, M.R.P., dos Santos Moreira, E.: An ontology for privacy policy management in ubiquitous environments, NOMS, pp. 947\u2013950. IEEE, Los Alamitos (2008)"},{"doi-asserted-by":"crossref","unstructured":"Pearson, Sander, Sharma. Privacy Management for Global Organizations, HP-TR (2009)","key":"2_CR3","DOI":"10.1109\/EDOCW.2009.5331996"},{"unstructured":"Organization for Economic Co-operation and Development (OECD): Guidelines Governing the Protection of Privacy and Transborder Flow of Personal Data, OECD, Geneva (1980)","key":"2_CR4"},{"unstructured":"Galway Project, Plenary Session Introduction, p. 5 (April 8, 2009)","key":"2_CR5"},{"doi-asserted-by":"crossref","unstructured":"Weitzner, A., Berners-Lee, F., Hendler, S.: Information Accountability. Communications of ACM 51(6) (June 2008)","key":"2_CR6","DOI":"10.1145\/1349026.1349043"},{"key":"2_CR7","volume-title":"INSPEC 2009","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Rao, P., Sander, T., Parry, A., Paull, A., Patruni, S., Dandamudi-Ratnakar, V., Sharma, P.: Scalable, Accountable Privacy Management for Large Organizations. In: INSPEC 2009. IEEE, Los Alamitos (2009)"},{"unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/","key":"2_CR8"},{"unstructured":"OASIS: eXtensible Access Control Markup Language (XACML), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml","key":"2_CR9"},{"key":"2_CR10","volume-title":"Web Privacy with P3P","author":"L. Cranor","year":"2002","unstructured":"Cranor, L.: Web Privacy with P3P. O\u2019Reilly & Associates, Sebastopol (2002)"},{"doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), http:\/\/www-dse.doc.ic.ac.uk\/research\/policies\/index.shtml","key":"2_CR11","DOI":"10.1007\/3-540-44569-2_2"},{"unstructured":"IBM: Sparcle project, http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/sparcle.index.html","key":"2_CR12"},{"unstructured":"IBM: REALM project, http:\/\/www.zurich.ibm.com\/security\/publications\/2006\/REALM-at-IRIS2006-20060217.pdf","key":"2_CR13"},{"unstructured":"OASIS: eContracts Specification v1.0 (2007), http:\/\/www.oasis-open.org\/apps\/org\/workgroup\/legalxml-econtracts","key":"2_CR14"},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"D. Travis","year":"2008","unstructured":"Travis, D., Breaux, T.D., Ant\u00f3n, A.I.: Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1), 5\u201320 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"unstructured":"Kenny, S., Borking, J.: The Value of Privacy Engineering, JILT (2002)","key":"2_CR16"},{"unstructured":"Privacy and Identity Management for Europe (2008), http:\/\/www.prime-project.org.eu","key":"2_CR17"},{"key":"2_CR18","volume-title":"Artificial Intelligence \u2013 A Modern Approach","author":"S. Russel","year":"2003","unstructured":"Russel, S., Norvig, P.: Artificial Intelligence \u2013 A Modern Approach. Prentice-Hall, Englewood Cliffs (2003)"},{"unstructured":"Dicodess: Open Source Model-Driven DSS Generator, http:\/\/dicodess.sourceforge.net","key":"2_CR19"},{"unstructured":"XpertRule: Knowledge Builder, http:\/\/www.xpertrule.com\/pages\/info_kb.htm","key":"2_CR20"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11207-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:38:21Z","timestamp":1606167501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11207-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642112065","9783642112072"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11207-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}