{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T06:25:30Z","timestamp":1749191130380,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_20","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"166-173","source":"Crossref","is-referenced-by-count":7,"title":["Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography"],"prefix":"10.1007","author":[{"given":"Nick","family":"Papanikolaou","sequence":"first","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"20_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/64.163670","volume":"7","author":"B. Moulin","year":"2002","unstructured":"Moulin, B., Rousseau, D.: Automated Knowledge Acquisition from Regulatory Texts. IEEE Expert\u00a07(5), 27\u201335 (2002)","journal-title":"IEEE Expert"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Bret Michael, J., Ong, V., Rowe, N.C.: Natural-Language Processing Support for Developing Policy-Governed Software Systems. In: Proceedings of 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS 39), pp. 263\u2013274 (2001)","DOI":"10.1109\/TOOLS.2001.941679"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSECP.2004.1281243","volume":"2","author":"A.I. Ant\u00f3n","year":"2004","unstructured":"Ant\u00f3n, A.I., Earp, J.B., He, Q., Stufflebeam, W., Bolchini, D., Jensen, C.: Financial Privacy Policies and the Need for Standardization. IEEE Security and Privacy\u00a02(2), 36\u201345 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"20_CR4","volume-title":"Proceedings of PRIVACY 2010 - Intelligent Information Privacy Management AAAI Spring Symposium","author":"K. Krasnow Waterman","year":"2010","unstructured":"Krasnow Waterman, K.: Pre-processing Legal Text: Policy Parsing and Isomorphic Intermediate Representation. In: Proceedings of PRIVACY 2010 - Intelligent Information Privacy Management AAAI Spring Symposium. Stanford Center for Computers and Law, Palo Alto (2010)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Ant\u00f3n, A.I.: Deriving Semantic Models from Privacy Policies. In: Proceedings of the Sixth International Workshop on Policies for Distributed Systems and Networks, POLICY 2005 (2005)","DOI":"10.1109\/POLICY.2005.12"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Kiyavitskaya, N., Zeni, N., Breaux, T.D., Ant\u00f3n, A.I., Cordy, J.R., Mich, L., Mylopoulos, J.: Extracting Rights and Obligations from Regulations: Toward a Tool-Supported Process. In: Proceedings of ASE 2007 (2007)","DOI":"10.1145\/1321631.1321701"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Vail, M.W., Ant\u00f3n, A.I.: Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: Proceedings of 14th IEEE International Requirements Engineering Conference, RE 2006 (2006)","DOI":"10.1109\/RE.2006.68"},{"issue":"1","key":"20_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"T.D. Breaux","year":"2008","unstructured":"Breaux, T.D., Ant\u00f3n, A.I.: Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1), 5\u201320 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Machine Learning: ECML-93","author":"J.F. Delannoy","year":"1993","unstructured":"Delannoy, J.F., Feng, C., Matwin, S., Szpakowicz, S.: Knowledge Extraction from Text: Machine Learning for Text-to-rule Translation. In: Brazdil, P.B. (ed.) ECML 1993. LNCS, vol.\u00a0667. Springer, Heidelberg (1993)"},{"key":"20_CR10","unstructured":"Delisle, S., Barker, K., Delannoy, J., Matwin, S., Szpakowicz, S.: From Text to Horn Clauses: Combining Linguistic Analysis and Machine Learning. In: Proceedings of Canadian AI Conference, AI\/GI\/CV 1994 (1994)"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Stamey, J.W., Rossi, R.A.: Automatically Identifying Relations in Privacy Policies. In: Proceedings of SIGDOC 2009 (2009)","DOI":"10.1145\/1621995.1622041"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and Contextual Integrity: Framework and Applications. In: Proceedings of IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. In: Proceedings of Computer Security Foundations Workshop, CSFW 2006 (2006)","DOI":"10.1109\/CSFW.2006.24"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Brodie, C.A., Karat, C., Karat, J.: An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench. In: Proceedings of Symposium on Usable Privacy and Security, SOUPS (2006)","DOI":"10.1145\/1143120.1143123"},{"key":"20_CR15","unstructured":"Ong, V.L.: An Architecture and Prototype System for Automatically Processing Natural-Language Statements of Policy. Master\u2019s thesis, Naval Postgraduate School, Monterey, California (2001)"},{"volume-title":"Semantic Knowledge Management","year":"2009","key":"20_CR16","unstructured":"Davies, J., Grobelnik, M., Mladenic, D. (eds.): Semantic Knowledge Management. Springer, Heidelberg (2009)"},{"volume-title":"Law, Ontologies and the Semantic Web","year":"2009","key":"20_CR17","unstructured":"Breuker, J., Casanovas, P., Klein, M.C.A., Francesconi, E. (eds.): Law, Ontologies and the Semantic Web. IOS Press, Amsterdam (2009)"},{"volume-title":"Computable Models of the Law","year":"2008","key":"20_CR18","unstructured":"Casanovas, P., Sartor, G., Casellas, N., Rubino, R. (eds.): Computable Models of the Law. Springer, Heidelberg (2008)"},{"volume-title":"Law and the Semantic Web","year":"2005","key":"20_CR19","unstructured":"Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.): Law and the Semantic Web. Springer, Heidelberg (2005)"},{"key":"20_CR20","volume-title":"Legal Knowledge and Information Systems","author":"D. Bourcier","year":"2003","unstructured":"Bourcier, D.: Legal Knowledge and Information Systems. IOS Press, Amsterdam (2003)"},{"key":"20_CR21","series-title":"LNCS","volume-title":"Proceedings of PrimeLife\/IFIP Summer School 2010: Privacy and Identity Management for Life","author":"M.C. Mont","year":"2010","unstructured":"Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. In: Proceedings of PrimeLife\/IFIP Summer School 2010: Privacy and Identity Management for Life. LNCS. Springer, Heidelberg (2010)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Pearson, S., Rao, P., Sander, T., Parry, A., Paull, A., Patruni, S., Dandamudi-Ratnakar, V., Sharma, P.: Scalable, accountable privacy management for large organizations. In: Proceedings of 13th Enterprise Distributed Object Computing Conference Workshop (EDOCW 2009), pp. 168\u2013175 (2009)","DOI":"10.1109\/EDOCW.2009.5331996"},{"key":"20_CR23","unstructured":"SPIN, http:\/\/www.spinroot.org"},{"key":"20_CR24","unstructured":"IBM REALM Project, http:\/\/www.zurich.ibm.com\/security\/publications\/2006\/REALM-atIRIS2006-20060217.pdf"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Chen, K., Wang, D.: An aspect-oriented approach to privacy-aware access control. In: Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, August 19-22 (2007)","DOI":"10.1109\/ICMLC.2007.4370665"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/11957454_6","volume-title":"Privacy Enhancing Technologies","author":"C.V. Berghe","year":"2006","unstructured":"Berghe, C.V., Schunter, M.: Privacy Injector - Automated Privacy Enforcement through Aspects. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 99\u2013117. Springer, Heidelberg (2006)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Peleg, M., Beimel, D., Dori, D., Denekamp, Y.: Situation-Based Access Control: privacy management via modeling of patient data access scenarios. Journal of Biomedical Informatics (to appear)","DOI":"10.1016\/j.jbi.2008.03.014"},{"key":"20_CR28","unstructured":"Bussard, L., Becker, M.Y.: Can Access Control be Extended to Deal with Data Handling in Privacy Scenarios?. In: Proceedings of W3C Workshop on Access Control Application Scenarios (2009)"},{"key":"20_CR29","first-page":"159","volume-title":"Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004)","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Distributed Access Control Policies with Tunable Expressiveness. In: Proceedings of 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), Yorktown Heights, NY, USA, June 7-9, pp. 159\u2013168. IEEE Computer Society, Los Alamitos (2004)"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Mowbray, M., Pearson, S., Shen, Y.: Enhancing privacy in cloud computing via policy-based obfuscation. Journal of Supercomputing, doi:10.1007\/s11227-010-0425-z","DOI":"10.1007\/s11227-010-0425-z"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:30:13Z","timestamp":1741289413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}