{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:19:43Z","timestamp":1745986783102,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_10","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"133-145","source":"Crossref","is-referenced-by-count":19,"title":["Prioritized Execution of Privacy Policies"],"prefix":"10.1007","author":[{"given":"Ilaria","family":"Matteucci","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-28879-1_3","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"I. Matteucci","year":"2012","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L., Wiegand, L.: A Design Phase for Data Sharing Agreements. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 25\u201341. Springer, Heidelberg (2012)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-32498-7_42","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"F. Martinelli","year":"2012","unstructured":"Martinelli, F., Matteucci, I., Petrocchi, M., Wiegand, L.: A Formal Support for Collaborative Data Sharing. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 547\u2013561. Springer, Heidelberg (2012)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Mori, P., Petrocchi, M., Wiegand, L.: Controlled data sharing in E-health. In: Socio Technical Aspects in Security and Trust, pp. 17\u201323. IEEE (2011)","DOI":"10.1109\/STAST.2011.6059251"},{"issue":"2-3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.cose.2010.09.001","volume":"30","author":"J. Jin","year":"2011","unstructured":"Jin, J., Ahn, G.J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for electronic healthcare services. Computers & Security\u00a030(2-3), 116\u2013127 (2011)","journal-title":"Computers & Security"},{"key":"10_CR5","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 (2010)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Firewall policy advisor for anomaly discovery and rule editing. In: IFIP\/IEEE Integrated Network Management, pp. 17\u201330 (2003)","DOI":"10.1007\/978-0-387-35674-7_2"},{"key":"10_CR7","unstructured":"Hall-May, M., Kelly, T.: Towards conflict detection and resolution of safety policies. In: Intl. System Safety Conf. (2006)"},{"issue":"6","key":"10_CR8","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/32.824414","volume":"25","author":"E.C. Lupu","year":"1999","unstructured":"Lupu, E.C., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng.\u00a025(6), 852\u2013869 (1999)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR9","unstructured":"Syukur, E.: Methods for policy conflict detection and resolution in pervasive computing environments. In: Policy Management for Web (WWW 2005), pp. 10\u201314. ACM (2005)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Amini, M., Jalili, R.: Conflict detection and resolution in context-aware authorization. In: Security in Networks and Distributed Systems, pp. 505\u2013511. IEEE (2007)","DOI":"10.1109\/AINAW.2007.127"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Dunlop, N., Indulska, J., Raymond, K.: Methods for conflict resolution in policy-based management systems. In: Enterprise Distributed Object Computing, pp. 98\u2013109. IEEE (2003)","DOI":"10.1109\/EDOC.2003.1233841"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0377-2217(02)00227-8","volume":"145","author":"T.L. Saaty","year":"2003","unstructured":"Saaty, T.L.: Decision-making with the AHP: Why is the principal eigenvector necessary. European Journal of Operational Research\u00a0145(1), 85\u201391 (2003)","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1504\/IJSSCI.2008.017590","volume":"1","author":"T.L. Saaty","year":"2008","unstructured":"Saaty, T.L.: Decision making with the Analytic Hierarchy Process. International Journal of Services Sciences\u00a01(1), 83\u201398 (2008)","journal-title":"International Journal of Services Sciences"},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","volume":"48","author":"T.L. Saaty","year":"1990","unstructured":"Saaty, T.L.: How to make a decision: The Analytic Hierarchy Process. European Journal of Operational Research\u00a048(1), 9\u201326 (1990)","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"10_CR15","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/0022-2496(77)90033-5","volume":"15","author":"T.L. Saaty","year":"1977","unstructured":"Saaty, T.L.: A scaling method for priorities in hierarchical structures. Journal of Mathematical Psychology\u00a015(3), 234\u2013281 (1977)","journal-title":"Journal of Mathematical Psychology"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:51:10Z","timestamp":1745945470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}