{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T01:12:12Z","timestamp":1768871532216,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642316678","type":"print"},{"value":"9783642316685","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_18","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"232-244","source":"Crossref","is-referenced-by-count":1,"title":["Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Agrafiotis","sequence":"first","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-14282-6_20","volume-title":"Privacy and Identity Management for Life","author":"I. Agrafiotis","year":"2010","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol.\u00a0320, pp. 246\u2013258. Springer, Heidelberg (2010)"},{"key":"18_CR2","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-20769-3_22","volume-title":"Privacy and Identity Management for Life","author":"I. Agrafiotis","year":"2011","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0352, pp. 271\u2013282. Springer, Heidelberg (2011)"},{"key":"18_CR3","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: The logic of consent and revocation (2011) (in preparation)"},{"key":"18_CR4","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (epal). Research report, 3485 (2003)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: 2006 IEEE Symposium on Security and Privacy, p. 15. IEEE (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"18_CR6","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: A framework for privacy preferences and data-handling policies. Technical report, Technical Report MSR-TR-2009-128, Microsoft Research (2009)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Damiani, E., De Capitani di Vemercati, S., Samarati, P.: A component-based architecture for secure data publication. In: Proceedings of 17th Annual Computer Security Applications Conference, ACSAC 2001, pp. 309\u2013318. IEEE (2001)","DOI":"10.1109\/ACSAC.2001.991546"},{"key":"18_CR8","unstructured":"Cranor, L.F.: Web privacy with P3P. O\u2019Reilly Media (2002)"},{"key":"18_CR9","unstructured":"http:\/\/www.encore-project.info"},{"key":"18_CR10","first-page":"119","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev.\u00a079, 119 (2004)","journal-title":"Wash. L. Rev."},{"key":"18_CR11","unstructured":"http:\/\/wyvern.ndcls.ox.ac.uk\/orb\/"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"M. Tschantz","year":"2009","unstructured":"Tschantz, M., Wing, J.: Formal Methods for Privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol.\u00a05850, pp. 1\u201315. Springer, Heidelberg (2009)"},{"key":"18_CR13","unstructured":"Whitley, E.A.: Perceptions of government technology, surveillance and privacy: the UK identity cards scheme. In: New Directions in Surveillance and Privacy, p. 133 (2009)"},{"issue":"3","key":"18_CR14","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.istr.2009.10.001","volume":"14","author":"Edgar A. Whitley","year":"2009","unstructured":"Whitley, E.A.: Information privacy consent and the \u2018control\u2019 of personal data. Inform. Secur. Tech. Rep. (2009), doi:10.1016\/j.istr.2009.10.001","journal-title":"Information Security Technical Report"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:43:18Z","timestamp":1620128598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_18","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}