{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:09:13Z","timestamp":1742800153996},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642151514"},{"type":"electronic","value":"9783642151521"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15152-1_7","type":"book-chapter","created":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T10:02:06Z","timestamp":1283162526000},"page":"69-80","source":"Crossref","is-referenced-by-count":11,"title":["Context-Aware Privacy Design Pattern Selection"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Yun","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Information Commissioneres Office: The Privacy Dividend; the business case for investing in proactive privacy protection (2010)"},{"key":"7_CR2","volume-title":"A Pattern Language: Towns, Buildings, Construction","author":"C. Alexander","year":"1977","unstructured":"Alexander, C., Ishikawa, S., Silverstein, M., Jacobson, M., Fiksdahl-King, I., Angel, S.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Miller, G.A.: WordNet: A Lexical Database for English. Communications of the ACM\u00a038(11), 39\u201341","DOI":"10.1145\/219717.219748"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Pretschner, A., Schtz, F., Schaefer, C., Walter, T.: Policy Evolution in Distributed Usage Control. Electron. Notes Theor. Comput. Sci. 244 (2009)","DOI":"10.1016\/j.entcs.2009.07.042"},{"key":"7_CR5","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-540-30079-3_13","volume-title":"Trust and Privacy in Digital Business","author":"M. Casassa Mont","year":"2004","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations, Important Aspects and Technical Approaches. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 120\u2013131. Springer, Heidelberg (2004)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-540-88625-9_19","volume-title":"Information and Communications Security","author":"H.G. Phls","year":"2008","unstructured":"Phls, H.G.: Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 279\u2013293. Springer, Heidelberg (2008)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P privacy policies and privacy authorization. In: WPES \u201902, pp. 103\u2013109 (2002)","DOI":"10.1145\/644527.644538"},{"key":"7_CR9","unstructured":"Microsoft Corporation: Privacy Guidelines for Developing Software Products and Services, Version 2.1a (2007), http:\/\/www.microsoft.com\/Downloads\/details.aspx?FamilyID=c48cf80f-6e87-48f5-83ec-a18d1ad2fc1f&displaylang=en"},{"key":"7_CR10","volume-title":"Privacy: What Developers and IT Professionals Should Know","author":"J.C. Cannon","year":"2004","unstructured":"Cannon, J.C.: Privacy: What Developers and IT Professionals Should Know. Addison Wesley, Reading (2004)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"A. Patrick","year":"2003","unstructured":"Patrick, A., Kenny, S.: From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 107\u2013124. Springer, Heidelberg (2003)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Belloti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proc. 3rd European Conference on Computer-Supported Cooperative Work, pp. 77\u201392 (1993)","DOI":"10.1007\/978-94-011-2094-4_6"},{"key":"7_CR13","unstructured":"Information Commissioneres Office: PIA handbook (2007), http:\/\/www.ico.gov.uk\/"},{"key":"7_CR14","unstructured":"Office of the Privacy Commissioner of Canada: Fact sheet: Privacy impact assessments (2007), http:\/\/www.privcom.gc.ca\/"},{"key":"7_CR15","unstructured":"Information Commissioners Office: Privacy by Design. Report (2008), http:\/\/www.ico.gov.uk"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2005.50","volume":"3","author":"D.N. Jutla","year":"2005","unstructured":"Jutla, D.N., Bodorik, P.: Sociotechnical architecture for online privacy. IEEE Security and Privacy\u00a03(2), 29\u201339 (2005)","journal-title":"IEEE Security and Privacy"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering, 1\u201342 (2008)","DOI":"10.1109\/TSE.2008.88"},{"key":"7_CR18","unstructured":"Arista: Cloud Networking: Design Patterns for Cloud Centric Application Environments (2009), http:\/\/www.aristanetworks.com\/en\/CloudCentricDesignPatterns.pdf"},{"key":"7_CR19","first-page":"1","volume-title":"Proc. 2006 Conference on Pattern Languages of Programs","author":"M. Hafiz","year":"2006","unstructured":"Hafiz, M.: A collection of privacy design patterns. In: Proc. 2006 Conference on Pattern Languages of Programs, pp. 1\u201313. ACM, NY (2006)"},{"key":"7_CR20","volume-title":"Artificial Intelligence A Modern Approach","author":"S. Russel","year":"2003","unstructured":"Russel, S., Norvig, P.: Artificial Intelligence A Modern Approach, 2nd edn. Prentice Hall, Englewood Cliffs (2003)","edition":"2"},{"key":"7_CR21","unstructured":"Wikipedia, http:\/\/en.wikipedia.org\/wiki\/Decision_support"},{"key":"7_CR22","unstructured":"Dicodess: Open Source Model-Driven DSS Generator, http:\/\/dicodess.sourceforge.net"},{"key":"7_CR23","unstructured":"XpertRule: Knowledge Builder, http:\/\/www.xpertrule.com\/pages\/info_kb.htm"},{"key":"7_CR24","unstructured":"Lumenaut: Decision Tree Package, http:\/\/www.lumenaut.com\/decisiontree.htm"},{"key":"7_CR25","unstructured":"OC1 Oblique Classifier 1, http:\/\/www.cbcb.umd.edu\/~salzberg\/announce-oc1.html"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Halkidis, S.T., Tsantalis, N., Chatzigeorgiou, A., Stephanides, G.: Architectural Risk Analysis of Software Systems Based on Security Patterns. IEEE TDSC\u00a05(3) (2008)","DOI":"10.1109\/TDSC.2007.70240"},{"key":"7_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88775-3","volume-title":"Security and Dependability Solutions for Web Services and Workflows : A Patterns Approach, Security and dependability for Ambient Intelligence","author":"S. Kokolakis","year":"2009","unstructured":"Kokolakis, S., Rizomiliotis, P., Benameur, A., Kumar Sinha, S.: Security and Dependability Solutions for Web Services and Workflows: A Patterns Approach, Security and dependability for Ambient Intelligence, May 2009. Springer, Heidelberg (2009)"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Benameur, A., Fenet, S., Saidane, A., Khumar Sinha, S.: A Pattern-Based General Security Framework: An eBusiness Case Study. In: HPCC, Seoul, Korea (2009)","DOI":"10.1109\/HPCC.2009.93"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Delessy, N.A., d Fernandez, E. B.: A Pattern-Driven Security Process for SOA Applications. In: ARES, pp. 416\u2013421 (2008)","DOI":"10.1109\/ARES.2008.89"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Lobato, L.L., d Fernandez, E.B., Zorzo, S.D.: Patterns to Support the Development of Privacy Policies. In: ARES, pp. 744\u2013774 (2009)","DOI":"10.1109\/ARES.2009.114"},{"key":"7_CR31","unstructured":"EnCoRe - Ensuring Consent and Revocation, http:\/\/www.encore-project.info\/"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15152-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T12:20:49Z","timestamp":1559478049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15152-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642151514","9783642151521"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15152-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}