{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:30:10Z","timestamp":1725582610156},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207686"},{"type":"electronic","value":"9783642207693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20769-3_21","type":"book-chapter","created":{"date-parts":[[2011,4,29]],"date-time":"2011-04-29T09:47:20Z","timestamp":1304070440000},"page":"258-270","source":"Crossref","is-referenced-by-count":12,"title":["A Conceptual Model for Privacy Policies with Consent and Revocation Requirements"],"prefix":"10.1007","author":[{"given":"Marco","family":"Casassa Mont","sequence":"first","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Papanikolaou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Mont, M.C.: On the Need to Explicitly Manage Privacy Obligation Policies as Part of Good Data Handling Practices. In: Proceedings of W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven Enforcement, Ispra, Italy, October 17-18 (2006)"},{"key":"21_CR2","unstructured":"Mont, M.C., Pearson, S., Kounga, G., Shen, Y., Bramhall, P.: On the Management of Consent and Revocation in Enterprises: Setting the Context. Technical Report HPL-2009-49, HP Labs, Bristol (2009)"},{"key":"21_CR3","unstructured":"Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.M., Schunter, M., Stampley, D.A., Wenning, R.: The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. World Wide Web Consortium Note NOTEP3P11-20061113 (2006)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Thyne, R.: Privacy Policy Enforcement in Enterprises with Identity Management Solutions. In: PST 2006 (2006)","DOI":"10.1145\/1501434.1501465"},{"key":"21_CR5","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1266840.1266848","volume-title":"Proceedings of the 12th ACM Symposium on Access Control Models and Technologies","author":"Q. Ni","year":"2007","unstructured":"Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, pp. 41\u201350. ACM, New York (2007)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Ferrini, R., Bertino, E.: A Comprehensive Approach for Solving Policy Heterogeneity. In: ICEIS 2009 -Proceedings of the 11th International Conference on Enterprise Information Systems, Milan, Italy, May 6-10, pp. 63\u201368 (2009)","DOI":"10.5220\/0001951500630068"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. In: Proceedings of Fifth International Summer School on Privacy and Identity Management for Life, Nice, France, September 7-11 (2009)","DOI":"10.1007\/978-3-642-14282-6_20"},{"key":"21_CR9","unstructured":"IBM, The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Vaniea, K., Karat, C., Gross, J.B., Karat, J., Brodie, C.: Evaluating assistance of natural language policy authoring. In: Proc. SOUPS 2008, vol.\u00a0337 (2008)","DOI":"10.1145\/1408664.1408674"},{"key":"21_CR11","unstructured":"IBM, REALM project, \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/publications\/2006\/REALM-at-IRIS2006-20060217.pdf"},{"key":"21_CR12","unstructured":"OASIS, eContracts Specification v1.0 (2007), \n                    \n                      http:\/\/www.oasis-open.org\/apps\/org\/workgroup\/legalxml-econtracts"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"D. Travis","year":"2008","unstructured":"Travis, D., Breaux, T., Ant\u00f3n, A.: Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1), 5\u201320 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21_CR14","unstructured":"W3C, The Platform for Privacy Preferences, v1.0 (2002), \n                    \n                      http:\/\/www.w3.org\/TR\/P3P\/"},{"key":"21_CR15","unstructured":"Kenny, S., Borking, J.: The Value of Privacy Engineering. Journal of Information, Law and Technology (JILT) 1 (2002), \n                    \n                      http:\/\/elj.warwick.ac.uk\/jilt\/02-\/kenny.html"},{"key":"21_CR16","unstructured":"Organization for Economic Co-operation and Development (OECD), Guidelines Governing the Protection of Privacy and Transborder Flow of Personal Data, OECD, Geneva (1980)"},{"key":"21_CR17","unstructured":"Borking, J.: Privacy Rules: A Steeple Chase for Systems Architects (2007), \n                    \n                      http:\/\/www.w3.org\/2006\/07\/privacy-ws\/papers\/04-borking-rules\/"},{"key":"21_CR18","volume-title":"Web Privacy with P3P","author":"L. Cranor","year":"2002","unstructured":"Cranor, L.: Web Privacy with P3P. O\u2019Reilly & Associates, Sebastopol (2002)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), \n                    \n                      http:\/\/www-dse.doc.ic.ac.uk\/research\/policies\/index.shtml","DOI":"10.1007\/3-540-44569-2_2"},{"key":"21_CR20","unstructured":"PRIME, Privacy and Identity Management for Europe (2008), \n                    \n                      http:\/\/www.prime-project.org.eu"},{"key":"21_CR21","unstructured":"IBM: Sparcle project, \n                    \n                      http:\/\/domino.research.ibm.com\/comm\/research_projects.nsf\/pages\/sparcle.index.html"},{"key":"21_CR22","unstructured":"The GRC-GRID, The Governance, Risk Management and Compliance Global Rules Information Database, \n                    \n                      http:\/\/www.grcroundtable.org\/grc-grid.htm"},{"key":"21_CR23","unstructured":"Archer: Compliance Management solution, \n                    \n                      http:\/\/www.archer-tech.com"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11207-2_2","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"S. Pearson","year":"2010","unstructured":"Pearson, S., Sander, T., Sharma, R.: A Privacy Management Tool for Global Outsourcing. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS, vol.\u00a05939. Springer, Heidelberg (2010)"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A Privacy-Aware Access Control System. Journal of Computer Security, JCS (2008)","DOI":"10.3233\/JCS-2008-0328"},{"key":"21_CR26","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Athenaeum, New York (1967)"},{"key":"21_CR27","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: The Logic of Consent and Revocation (2010) (submitted)"},{"key":"21_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, p. 137. Springer, Heidelberg (2001)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Bonatti, P., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: An Access Control Model for Data Archives. In: Proc. of the 16th International Conference on Information Security, Paris, France (June 2001)","DOI":"10.1007\/0-306-46998-7_18"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20769-3_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:31Z","timestamp":1606186831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20769-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207686","9783642207693"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20769-3_21","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}