{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:26:29Z","timestamp":1725657989103},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275845"},{"type":"electronic","value":"9783642275852"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27585-2_9","type":"book-chapter","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T17:38:29Z","timestamp":1328636309000},"page":"104-118","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Bussard","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Pinsdorf","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"9_CR1","doi-asserted-by":"publisher","first-page":"369","DOI":"10.3233\/JCS-2008-0328","volume":"16","author":"C.A. Ardagna","year":"2008","unstructured":"Ardagna, C.A., Cremonini, M., De Capitani di Vimercati, S., Samarati, P.: A privacy-aware access control system. J. Comput. Secur.\u00a016(4), 369\u2013397 (2008)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Ardagna, C., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In: Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, Minnesota, USA (August 2010)","key":"9_CR2","DOI":"10.1109\/SocialCom.2010.115"},{"unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language, EPAL 1.2 (2003)","key":"9_CR3"},{"doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. Journal of Computer Security (2009)","key":"9_CR4","DOI":"10.3233\/JCS-2009-0364"},{"doi-asserted-by":"crossref","unstructured":"Becker, M.Y., Mackay, J.F., Dillaway, B.: Abductive authorization credential gathering. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY) (July 2009)","key":"9_CR5","DOI":"10.1109\/POLICY.2009.23"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-17714-9_10","volume-title":"Information Systems Security","author":"M.Y. Becker","year":"2010","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: A Practical Generic Privacy Language. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol.\u00a06503, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s12394-009-0031-5","volume":"2","author":"L. Bussard","year":"2009","unstructured":"Bussard, L., Nano, A., Pinsdorf, U.: Delegation of access rights in multi-domain service compositions. Identity in the Information Society\u00a02(2), 137\u2013154 (2009), http:\/\/www.springerlink.com\/content\/020524p066765742\/","journal-title":"Identity in the Information Society"},{"doi-asserted-by":"crossref","unstructured":"Bussard, L., Neven, G., Preiss, F.S.: Downstream usage control. In: IEEE Policy 2010\u00a0(July 2010)","key":"9_CR8","DOI":"10.1109\/POLICY.2010.17"},{"unstructured":"ContentGuard: XrML 2.0 Technical Overview (2002), http:\/\/www.xrml.org\/reference\/XrMLTechnicalOverviewV1.pdf","key":"9_CR9"},{"unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems. Concepts and Design, 4th edn. Addison Wesley (2005)","key":"9_CR10"},{"unstructured":"Hammer-Lahav, E.: RFC 5849: The OAuth 1.0 Protocol (2010), http:\/\/tools.ietf.org\/html\/rfc5849","key":"9_CR11"},{"unstructured":"Kagal, L., Abelson, H.: Access control is an inadequate framework for privacy protection. In: W3C Workshop on Privacy for Advanced Web APIs (July 2010)","key":"9_CR12"},{"unstructured":"Kantara Initiative: User managed initiative, http:\/\/kantarainitiative.org\/confluence\/display\/uma\/","key":"9_CR13"},{"unstructured":"Microsoft: Rights Management Services (2009), http:\/\/www.microsoft.com\/windowsserver2008\/en\/us\/ad-rms-overview.aspx","key":"9_CR14"},{"unstructured":"ODRL: Open Digital Rights Language (ODRL), version 1.1 (2002), http:\/\/www.odrl.net\/1.1\/ODRL-11.pdf","key":"9_CR15"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-20317-6_21","volume-title":"Privacy and Identity Management for Life","author":"U. Pinsdorf","year":"2011","unstructured":"Pinsdorf, U., Bussard, L., Meissner, S., Schallab\u00f6ck, J., Short, S.: Privacy in Service Oriented Architectures. In: Camenisch, J., Fischer-Huebner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 383\u2013411. Springer, Heidelberg (2011)"},{"unstructured":"Pretschner, A., Sch\u00fctz, F., Schaefer, C., Walter, T.: Policy evolution in distributed usage control. In: 4th Intl. Workshop on Security and Trust Management. Elsevier (June 2008)","key":"9_CR17"},{"unstructured":"PrimeLife Consortium: Draft 2nd design for policy languages and protocols (heartbeat: H5.3.2). Tech. rep. (July 2009)","key":"9_CR18"},{"unstructured":"PrimeLife Consortium: Second Release of the Policy Engine (D5.3.2). Tech. rep. (September 2010)","key":"9_CR19"},{"unstructured":"PrimeLife Consortium: Infrastructure for Privacy for Life (D6.3.2). Tech. rep (January 2011), http:\/\/www.primelife.eu\/images\/stories\/deliverables\/d6.3.2-infrastructure_for_privacy_for_life-public.pdf","key":"9_CR20"},{"unstructured":"Rahman, S.T.: Analyzing Causes of Privacy Mismatches in Service Oriented Architecture. Master\u2019s thesis, RWTH (2010)","key":"9_CR21"},{"unstructured":"Rissanen, E.: OASIS eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS committee specification 01, OASIS (August 2010)","key":"9_CR22"},{"unstructured":"W3C: A P3P preference exchange language 1.0, APPEL1.0 (2002)","key":"9_CR23"},{"unstructured":"W3C: The platform for privacy preferences 1.1 (P3P1.1) specification (2006)","key":"9_CR24"},{"issue":"4","key":"9_CR25","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MMUL.2004.31","volume":"11","author":"X. Wang","year":"2004","unstructured":"Wang, X.: MPEG-21 Rights Expression Language: Enabling Interoperable Digital Rights Management. IEEE MultiMedia\u00a011(4), 84\u201387 (2004)","journal-title":"IEEE MultiMedia"}],"container-title":["Lecture Notes in Computer Science","Open Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27585-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T20:04:59Z","timestamp":1584389099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27585-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275845","9783642275852"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27585-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}