{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:28:40Z","timestamp":1725582520441},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207686"},{"type":"electronic","value":"9783642207693"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20769-3_23","type":"book-chapter","created":{"date-parts":[[2011,4,29]],"date-time":"2011-04-29T09:47:20Z","timestamp":1304070440000},"page":"283-296","source":"Crossref","is-referenced-by-count":4,"title":["A Decision Support System for Design for Privacy"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Azzedine","family":"Benameur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"The EnCoRe project: Ensuring Consent and Revocation (2008), \n                    \n                      http:\/\/www.encore-project.info","key":"23_CR1"},{"unstructured":"Microsoft Corporation, \u201cPrivacy Guidelines for Developing Software Products and Services\u201d, Version 2.1a (April 26, 2007)","key":"23_CR2"},{"unstructured":"Information Commissioners Office, \u201cPrivacy by Design\u201d, Report (November 2008), \n                    \n                      http:\/\/www.ico.gov.uk","key":"23_CR3"},{"doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Cranor, L.: Engineering Privacy. IEEE Transactions on Software Engineeing\u00a035(1) (January\/February 2009)","key":"23_CR4","DOI":"10.1109\/TSE.2008.88"},{"key":"23_CR5","volume-title":"Privacy: What Developers and IT Professionals Should Know","author":"J.C. Cannon","year":"2004","unstructured":"Cannon, J.C.: Privacy: What Developers and IT Professionals Should Know. Addison Wesley, Reading (2004)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"A. Patrick","year":"2003","unstructured":"Patrick, A., Kenny, S.: From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 107\u2013124. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Belloti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proc. 3rd conference on European Conference on Computer-Supported Cooperative Work, pp. 77\u201392 (1993)","key":"23_CR7","DOI":"10.1007\/978-94-011-2094-4_6"},{"unstructured":"Information Commissioner\u2018s Office, PIA handbook (2007), \n                    \n                      http:\/\/www.ico.gov.uk\/","key":"23_CR8"},{"unstructured":"Office of the Privacy Commissioner of Canada, \u201cPrivacy impact assessments\u201d, Fact Sheet (2007), \n                    \n                      http:\/\/www.privcom.gc.ca\/","key":"23_CR9"},{"unstructured":"Information Commissioners Office, \u201cPrivacy by Design\u201d. Report (2008), \n                    \n                      http:\/\/www.ico.gov.uk","key":"23_CR10"},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2005.50","volume":"3","author":"D.N. Jutla","year":"2005","unstructured":"Jutla, D.N., Bodorik, P.: Sociotechnical architecture for online privacy. IEEE Security and Privacy\u00a03(2), 29\u201339 (2005)","journal-title":"IEEE Security and Privacy"},{"doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering, 1\u201342 (2008)","key":"23_CR12","DOI":"10.1109\/TSE.2008.88"},{"key":"23_CR13","volume-title":"A Pattern Language: Towns, Buildings, Construction","author":"C. Alexander","year":"1977","unstructured":"Alexander, C., Ishikawa, S., Silverstein, M., Jacobson, M., Fiksdahl-King, I., Angel, S.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)"},{"key":"23_CR14","first-page":"1","volume-title":"Pattern Languages of Programs","author":"M. Hafiz","year":"2006","unstructured":"Hafiz, M.: A collection of privacy design patterns. In: Pattern Languages of Programs, pp. 1\u201313. ACM, New York (2006)"},{"unstructured":"Dicodess: Open Source Model-Driven DSS Generator (2009), \n                    \n                      http:\/\/dicodess.sourceforge.net","key":"23_CR15"},{"unstructured":"XpertRule: Knowledge Builder (2009), \n                    \n                      http:\/\/www.xpertrule.com\/pages\/info_kb.htm","key":"23_CR16"},{"unstructured":"Lumenaut: Decision Tree Package (2009), \n                    \n                      http:\/\/www.lumenaut.com\/decisiontree.htm","key":"23_CR17"},{"unstructured":"OC1 Oblique Classifier 1 (2009), \n                    \n                      http:\/\/www.cbcb.umd.edu\/~salzberg\/announce-oc1.html","key":"23_CR18"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-11207-2_2","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"S. Pearson","year":"2010","unstructured":"Pearson, S., Sander, T., Sharma, R.: Privacy Management for Global Organizations. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) DPM 2009. LNCS, vol.\u00a05939, pp. 9\u201317. Springer, Heidelberg (2010)"},{"unstructured":"SERENITY: System Engineering for Security and Dependability (2009), \n                    \n                      http:\/\/www.serenity-project.org","key":"23_CR20"},{"key":"23_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-88775-3","volume-title":"Security and Dependability for Ambient Intelligence","author":"S. Kokolakis","year":"2009","unstructured":"Kokolakis, S., Rizomiliotis, P., Benameur, A., Kumar Sinha, S.: Security and Dependability Solutions for Web Services and Workflows: A Patterns Approach. In: Security and Dependability for Ambient Intelligence. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Benameur, A., Fenet, S., Saidane, A., Khumar Sinha, S.: A Pattern-Based General Security Framework: An eBusiness Case Study, HPCC, Seoul, Korea (2009)","key":"23_CR22","DOI":"10.1109\/HPCC.2009.93"},{"doi-asserted-by":"crossref","unstructured":"Delessy, N.A., d Fernandez, E.B.: A Pattern-Driven Security Process for SOA Applications. In: ARES, pp. 416\u2013421 (2008)","key":"23_CR23","DOI":"10.1109\/ARES.2008.89"},{"doi-asserted-by":"crossref","unstructured":"Lobato, L.L., d Fernandez, E.B., Zorzo, S.D.: Patterns to Support the Development of Privacy Policies. In: ARES, pp. 744\u2013774 (2009)","key":"23_CR24","DOI":"10.1109\/ARES.2009.114"},{"key":"23_CR25","volume-title":"Introduction to Mathematical Logic","author":"E. Mendelson","year":"1964","unstructured":"Mendelson, E.: Introduction to Mathematical Logic. D. Van Nostrand Co., New York (1964)"},{"unstructured":"Blackburn, P., de Rijke, M., Venema, Y.: Modal Logic. Cambridge University Press, Cambridge, ISBN 0-521-80200-8","key":"23_CR26"},{"issue":"3","key":"23_CR27","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/A:1011298804831","volume":"14","author":"S. Benferhat","year":"2001","unstructured":"Benferhat, S., Dubois, D., Prade, H.: Towards a possibilistic logic handling of preferences. Applied Intelligence\u00a014(3), 303\u2013317 (2001)","journal-title":"Applied Intelligence"},{"key":"23_CR28","volume-title":"The Computer Modelling of Mathematical Reasoning","author":"A. Bundy","year":"1986","unstructured":"Bundy, A.: The Computer Modelling of Mathematical Reasoning, 2nd edn. Academic Press, London (1986)","edition":"2"},{"unstructured":"JBoss, Drools (2010), \n                    \n                      http:\/\/www.jboss.org\/drools\/","key":"23_CR29"},{"unstructured":"Eclipse (2010), \n                    \n                      http:\/\/www.eclipse.org\/","key":"23_CR30"},{"unstructured":"W3C, Rule Interchange Form (2010), \n                    \n                      http:\/\/www.w3.org\/2005\/rules\/wiki\/RIF_Working_Group","key":"23_CR31"},{"key":"23_CR32","first-page":"168","volume-title":"2nd International Workshop on Security and Privacy Distributed Computing, Enterprise Distributed Object Conference Workshop","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Rao, P., Sander, T., Parry, A., Paull, A., Patruni, S., Dandamudi-Ratnakar, Sharma, P.: Scalable, Accountable Privacy Management for Large Organizations. In: 2nd International Workshop on Security and Privacy Distributed Computing, Enterprise Distributed Object Conference Workshop, pp. 168\u2013175. IEEE, Los Alamitos (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20769-3_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:00:32Z","timestamp":1606186832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20769-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207686","9783642207693"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20769-3_23","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}