{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:54:24Z","timestamp":1725558864034},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642140570"},{"type":"electronic","value":"9783642140587"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14058-7_63","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T10:32:31Z","timestamp":1277807551000},"page":"612-621","source":"Crossref","is-referenced-by-count":4,"title":["Addressing Complexity in a Privacy Expert System"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","volume-title":"The Wiki Way: Quick Collaboration on the Web","author":"B. Leuf","year":"2001","unstructured":"Leuf, B., Cunningham, W.: The Wiki Way: Quick Collaboration on the Web. Addison-Wesley, Reading (2001)"},{"key":"63_CR2","volume-title":"INSPEC 2009","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Rao, P., Sander, T., Parry, A., Paull, A., Patruni, S., Dandamudi-Ratnakar, V., Sharma, P.: Scalable, Accountable Privacy Management for Large Organizations. In: INSPEC 2009. IEEE, Los Alamitos (2009)"},{"key":"63_CR3","unstructured":"Drools, http:\/\/jboss.org\/drools\/"},{"key":"63_CR4","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"63_CR5","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"63_CR6","volume-title":"Web Privacy with P3P","author":"L. Cranor","year":"2002","unstructured":"Cranor, L.: Web Privacy with P3P. O\u2019Reilly & Associates, Sebastopol (2002)"},{"key":"63_CR7","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), http:\/\/www-dse.doc.ic.ac.uk\/research\/policies\/index.shtml","DOI":"10.1007\/3-540-44569-2_2"},{"key":"63_CR8","unstructured":"IBM: Sparcle project, http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/sparcle.index.html"},{"key":"63_CR9","unstructured":"IBM: REALM project, http:\/\/www.zurich.ibm.com\/security\/publications\/2006\/REALM-at-IRIS2006-20060217.pdf"},{"key":"63_CR10","unstructured":"OASIS: eContracts Specification v1.0 (2007), http:\/\/www.oasis-open.org\/apps\/org\/workgroup\/legalxml-econtracts"},{"issue":"1","key":"63_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"D. Travis","year":"2008","unstructured":"Travis, D., Breaux, T.D., Ant\u00f3n, A.I.: Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1), 5\u201320 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"63_CR12","unstructured":"Kenny, S., Borking, J.: The Value of Privacy Engineering, JILT (2002)"},{"key":"63_CR13","unstructured":"Privacy and Identity Management for Europe (2008), http:\/\/www.prime-project.org.eu"},{"key":"63_CR14","volume-title":"Artificial Intelligence \u2013 A Modern Approach","author":"S. Russel","year":"2003","unstructured":"Russel, S., Norvig, P.: Artificial Intelligence \u2013 A Modern Approach. Prentice Hall, Englewood Cliffs (2003)"},{"key":"63_CR15","unstructured":"Dicodess: Open Source Model-Driven DSS Generator, http:\/\/dicodess.sourceforge.net"},{"key":"63_CR16","unstructured":"XpertRule: Knowledge Builder, http:\/\/www.xpertrule.com\/pages\/info_kb.htm"},{"key":"63_CR17","volume-title":"Proc. Frontiers in Education Conference","author":"J. McGough","year":"2001","unstructured":"McGough, J., Mortensen, J., Johnson, J., Fadali, S.: A web-based testing system with dynamic question generation. In: Proc. Frontiers in Education Conference, Reno. IEEE, Los Alamitos (2001)"},{"key":"63_CR18","unstructured":"Bowen, J., Likitvivatanavong, C.: Question-Generation in Constraint-Based Expert Systems, http:\/\/ww.4c.ucc.ie"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management of Uncertainty in Knowledge-Based Systems. Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14058-7_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:47:14Z","timestamp":1606168034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14058-7_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642140570","9783642140587"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14058-7_63","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}