{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:41Z","timestamp":1725562781191},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_2","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"17-32","source":"Crossref","is-referenced-by-count":1,"title":["A Logic of Privacy"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]},{"given":"Valerio","family":"Genovese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"2_CR2","unstructured":"Berners-Lee, T.: The semantic web will build in privacy (2009), http:\/\/news.cnet.com"},{"issue":"1","key":"2_CR3","first-page":"45","volume":"12","author":"W. Simons","year":"2005","unstructured":"Simons, W., Mandl, K., Kohane, I.: The PING personally controlled electronic medical record system: Technical architecture. Journal of the American Medical Informatics Association\u00a012(1), 45\u201354 (2005)","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"6","key":"2_CR4","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"1","author":"L.F. Cranor","year":"2003","unstructured":"Cranor, L.F.: P3p: Making privacy policies more useful. IEEE Security & Privacy\u00a01(6), 50\u201355 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., D\u00fcrmuth, M., Karjoth, G.: Unification in privacy policy evaluation - translating EPAL into Prolog. In: POLICY, pp. 185\u2013188 (2004)","DOI":"10.1109\/POLICY.2004.1309165"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.J.: Limiting disclosure in hippocratic databases. In: VLDB, pp. 108\u2013119 (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Anderson, A.H.: A comparison of two privacy policy languages: EPAL and XACMl. In: SWS, pp. 53\u201360 (2006)","DOI":"10.1145\/1180367.1180378"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: SACMAT, pp. 41\u201350 (2007)","DOI":"10.1145\/1266840.1266848"},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2009.102","volume":"7","author":"Q. Ni","year":"2009","unstructured":"Ni, Q., Bertino, E., Lobo, J., Calo, S.B.: Privacy-aware role-based access control. IEEE Security & Privacy\u00a07(4), 35\u201343 (2009)","journal-title":"IEEE Security & Privacy"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy, pp. 184\u2013198 (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"2_CR11","volume-title":"Fibring logics","author":"D.M. Gabbay","year":"1999","unstructured":"Gabbay, D.M.: Fibring logics. Oxford University Press, Oxford (1999)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: SACMAT, pp. 187\u2013196 (2009)","DOI":"10.1145\/1542207.1542238"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11225-009-9203-4","volume":"92","author":"S. Barker","year":"2009","unstructured":"Barker, S., Boella, G., Gabbay, D.M., Genovese, V.: A meta-model of access control in a fibred security language. Studia Logica\u00a092(3), 437\u2013477 (2009)","journal-title":"Studia Logica"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B.W. Lampson","year":"1992","unstructured":"Lampson, B.W., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst.\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"2_CR15","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur.\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR16","unstructured":"Genovese, V., Gabbay, D.M., Boella, G., van der Torre, L.: FSL \u2013 fibred security language. In: Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. (eds.) Normative Multi-Agent Systems. Number 09121 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany (2009)"},{"issue":"4","key":"2_CR17","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.W., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst.\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"2_CR18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511621192","volume-title":"Modal logic an introduction","author":"B. Chellas","year":"1980","unstructured":"Chellas, B.: Modal logic an introduction. Cambridge University Press, Cambridge (1980)"},{"key":"2_CR19","unstructured":"Gabbay, D., Kurucz, A., Wolter, F., Zakharyaschev, M.: Many-Dimensional Modal Logics: Theory and Applications. Elsevier - Studies in Logic (2003)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: SACMAT, pp. 102\u2013110 (2005)","DOI":"10.1145\/1063979.1063998"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur.\u00a012(1) (2008)","DOI":"10.1145\/1410234.1410235"},{"issue":"2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.: Flexible support for multiple access control policies. ACM TODS\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-Security and Privacy","author":"S. Fischer-Hubner","year":"2001","unstructured":"Fischer-Hubner, S.: IT-Security and Privacy. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:32Z","timestamp":1606185752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}