{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T20:40:16Z","timestamp":1741293616205,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_18","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"146-155","source":"Crossref","is-referenced-by-count":10,"title":["Enhancing Accountability in the Cloud via Sticky Policies"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]},{"given":"Gina","family":"Kounga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"CPSRT 2010, CloudCom","author":"S. Pearson","year":"2010","unstructured":"Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In: CPSRT 2010, CloudCom, IEEE, Los Alamitos (2010)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Catteddu, D., Hogben, G. (eds.): ENISA: Cloud Computing: Benefits, Risks and Recommendations for Information Security (2009), http:\/\/www.enisa.europa.eu\/act\/rm\/files\/deliverables\/cloud-computing-risk-assessment","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"18_CR3","volume-title":"AAAI Spring Symposium on The Semantic Web meets eGovernment","author":"D. Weitzner","year":"2006","unstructured":"Weitzner, D., Abelson, H., Berners-Lee, T., Hanson, C., Hendler, J.A., Kagal, L., McGuinness, D.L., Sussman, G.J., Waterman, K.K.: Transparent Accountable Data Mining: New Strategies for Privacy Protection. In: AAAI Spring Symposium on The Semantic Web meets eGovernment, AAAI Press, Menlo Park (2006)"},{"key":"18_CR4","unstructured":"Galway Project: Plenary session Introduction, p. 5 (April 28, 2009)"},{"key":"18_CR5","unstructured":"Crompton, M., Cowper, C., Jefferis, C.: The Australian Dodo Case: an insight for data protection regulation. World Data Protection Report\u00a09(1), BNA (2009)"},{"key":"18_CR6","unstructured":"Galway Project: Data Protection Accountability: The Essential Elements (2009), http:\/\/www.huntonfiles.com\/files\/webupload\/CIPL_Galway_Accountability_Paper.pdf"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"18_CR8","first-page":"377","volume-title":"DEXA","author":"M. Casassa Mont","year":"2003","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services. In: DEXA, pp. 377\u2013382. IEEE Computer Society, Los Alamitos (2003)"},{"key":"18_CR9","unstructured":"IBM: The Enterprise Privacy Authorization Language (EPAL), EPAL specification, v1.2 (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"18_CR10","unstructured":"OASIS: XACML, http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"18_CR11","unstructured":"Ardagna, C., et al.: PrimeLife Policy Language, ACAS, W3C (2009), http:\/\/www.w3.org\/2009\/policy-ws\/"},{"key":"18_CR12","unstructured":"Bussard, L., Becker, M.Y.: Can access control be extended to deal with data handling in privacy scenarios?, ACAS, W3C (2009), http:\/\/www.w3.org\/2009\/policy-ws\/"},{"key":"18_CR13","unstructured":"Papanikolaou, N., Creese, S., Goldsmith, M., Casassa Mont, M., Pearson, S.: ENCORE: Towards a holistic approach to privacy. In: SECRYPT (2010)"},{"key":"18_CR14","volume-title":"Web Privacy with P3P","author":"L. Cranor","year":"2002","unstructured":"Cranor, L.: Web Privacy with P3P. O\u2019Reilly & Associates, Sebastopol (2002)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), http:\/\/wwwdse.doc.ic.ac.uk\/research\/policies\/index.shtml","DOI":"10.1007\/3-540-44569-2_2"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/11805588_16","volume-title":"Data and Applications Security XX","author":"C. Ardagna","year":"2006","unstructured":"Ardagna, C., Vimercati, S., Samarati, P.: Enhancing user privacy through data handling policies. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 224\u2013236. Springer, Heidelberg (2006)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"18_CR18","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: A Framework for Privacy Preferences and Data-Handling Policies, MSR-TR-2009-128 (2009), http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx?id=102614"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Bruening, P., Krasnow Waterman, K.: Data Tagging for New Information Governance Models. IEEE Security and Privacy, 64\u201368 (September\/October 2010)","DOI":"10.1109\/MSP.2010.147"},{"key":"18_CR20","unstructured":"Voltage, http:\/\/www.voltage.com\/technology\/Technology_FormatPreservingEncryption.htm"},{"key":"18_CR21","unstructured":"Navajos, http:\/\/navajosystems.com\/technology_encryption.asp"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","volume-title":"Selected Areas in Cryptography","author":"M. Bellare","year":"2009","unstructured":"Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format-Preserving Encryption. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 295\u2013312. Springer, Heidelberg (2009)"},{"key":"18_CR23","unstructured":"Tang, W.: On using encryption techniques to enhance sticky policies enforcement, TR-CTIT-08-64, Centre for Telematics and Information Technology (2008)"},{"key":"18_CR24","series-title":"IFIP","first-page":"471","volume-title":"I-NetSec 2006","author":"S. Pearson","year":"2006","unstructured":"Pearson, S., Casassa Mont, M.: A System for Privacy-aware Resource Allocation and Data Processing in Dynamic Environments. In: I-NetSec 2006. IFIP, vol.\u00a0201, pp. 471\u2013482. Springer, Heidelberg (2006)"},{"issue":"5","key":"18_CR25","first-page":"451","volume":"9","author":"Y. Zuo","year":"2007","unstructured":"Zuo, Y., O\u2019Keefe, T.: Post-release information privacy protection: A framework and next-generation priacy-enhanced operating system. ISF\u00a09(5), 451\u2013467 (2007), http:\/\/www.springerlink.com\/content\/03718003288553u5\/","journal-title":"ISF"},{"issue":"1","key":"18_CR26","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2008.19","volume":"6","author":"S. Pearson","year":"2008","unstructured":"Pearson, S., Casassa Mont, M., Novoa, M.: Securing Information Transfer within Distributed Computing Environments. IEEE Security & Privacy Magazine\u00a06(1), 34\u201342 (2008)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"18_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/11926214_2","volume-title":"Transactions on Data Hiding and Multimedia Security I","author":"L. P\u00e9rez-Freire","year":"2006","unstructured":"P\u00e9rez-Freire, L., Comesa\u00f1a, P., Troncoso-Pastoriza, J.R., P\u00e9rez-Gonz\u00e1lez, F.: Watermarking security: A survey. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security I. LNCS, vol.\u00a04300, pp. 41\u201372. Springer, Heidelberg (2006)"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data Privacy through Optimal k-Anonymisation. In: International Conference on Data Engineering, pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"P\u00f6hls, H.C.: Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. In: ICICS (2008)","DOI":"10.1007\/978-3-540-88625-9_19"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-75551-7_14","volume-title":"Privacy Enhancing Technologies","author":"M. Schunter","year":"2007","unstructured":"Schunter, M., Waidner, M.: Simplified privacy controls for aggregated services \u2014 suspend and resume of personal data. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 218\u2013232. Springer, Heidelberg (2007)"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-10665-1_12","volume-title":"Cloud Computing","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol.\u00a05931, pp. 131\u2013144. Springer, Heidelberg (2009)"},{"key":"18_CR32","unstructured":"Knode, R., Egan, D.: Digital Trust in the Cloud, CSC (July 2010), http:\/\/assets1.csc.com\/cloud\/downloads\/wp_cloudtrustprotocolprecis_073010.pdf"},{"key":"18_CR33","unstructured":"Dataware project, Horizon Digital Economy Research Group, http:\/\/www.horizon.ac.uk"},{"key":"18_CR34","unstructured":"EnCoRe, Ensuring Consent and Revocation project, http:\/\/www.encore-project.info"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:30:42Z","timestamp":1741289442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}