{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T08:01:10Z","timestamp":1744444870294,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642358890"},{"type":"electronic","value":"9783642358906"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35890-6_12","type":"book-chapter","created":{"date-parts":[[2013,1,11]],"date-time":"2013-01-11T03:45:00Z","timestamp":1357875900000},"page":"160-173","source":"Crossref","is-referenced-by-count":4,"title":["Automating Privacy Enforcement in Cloud Platforms"],"prefix":"10.1007","author":[{"given":"Peng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jakub","family":"Sendor","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Serme","sequence":"additional","affiliation":[]},{"given":"Anderson Santana","family":"de Oliveira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing p3p using database technology. In: Proceedings of the 19th International Conference on Data Engineering, pp. 595\u2013606 (March 2003)"},{"key":"12_CR2","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (epal). Research report 3485 (2003)"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-20317-6_17","volume-title":"Privacy and Identity Management for Life","author":"L. Bussard","year":"2011","unstructured":"Bussard, L., Neven, G., Preiss, F.S.: Matching privacy policies and preferences: Access control, obligatons, authorisations, and downstream usage. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 313\u2013326. Springer, Heidelberg (2011)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/1063979.1063998","volume-title":"Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, SACMAT 2005, pp. 102\u2013110. ACM, New York (2005)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chen, K., Wang, D.W.: An aspect-oriented approach to privacy-aware access control. In: 2007 International Conference on Machine Learning and Cybernetics, vol.\u00a05, pp. 3016\u20133021 (August 2007)","DOI":"10.1109\/ICMLC.2007.4370665"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1145\/303976.303992","volume-title":"Proceedings of the Eighteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 1999","author":"S. Cohen","year":"1999","unstructured":"Cohen, S., Nutt, W., Serebrenik, A.: Rewriting aggregate queries using views. In: Proceedings of the Eighteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 1999, pp. 155\u2013166. ACM, New York (1999)"},{"issue":"6","key":"12_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"1","author":"L. Cranor","year":"2003","unstructured":"Cranor, L.: P3P: making privacy policies more useful. IEEE Security Privacy\u00a01(6), 50\u201355 (2003)","journal-title":"IEEE Security Privacy"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-28879-1_13","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"M.S. Idrees","year":"2012","unstructured":"Idrees, M.S., Serme, G., Roudier, Y., de Oliveira, A.S., Grall, H., S\u00fcdholt, M.: Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 190\u2013205. Springer, Heidelberg (2012)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Itani, W., Kayssi, A.I., Chehab, A.: Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: DASC, pp. 711\u2013716. IEEE (2009)","DOI":"10.1109\/DASC.2009.139"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Lang, U.: Openpmf scaas: Authorization as a service for cloud & soa applications. In: CloudCom, pp. 634\u2013643. IEEE (2010)","DOI":"10.1109\/CloudCom.2010.13"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.J.: Limiting disclosure in hippocratic databases. In: Nascimento, M.A., \u00d6zsu, M.T., Kossmann, D., Miller, R.J., Blakeley, J.A., Schiefer, K.B. (eds.) VLDB, pp. 108\u2013119. Morgan Kaufmann (2004)","DOI":"10.1016\/B978-012088469-8.50013-9"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11957454_7","volume-title":"Privacy Enhancing Technologies","author":"M.C. Mont","year":"2006","unstructured":"Mont, M.C., Thyne, R.: A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 118\u2013134. Springer, Heidelberg (2006)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Mowbray, M., Pearson, S.: A client-based privacy manager for cloud computing. In: Bosch, J., Clarke, S. (eds.) COMSWARE, p. 5. ACM (2009)","DOI":"10.1145\/1621890.1621897"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-10665-1_12","volume-title":"Cloud Computing","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Charlesworth, A.: Accountability as a Way Forward for Privacy Protection in the Cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol.\u00a05931, pp. 131\u2013144. Springer, Heidelberg (2009)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1145\/1007568.1007631","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004","author":"S. Rizvi","year":"2004","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004, pp. 551\u2013562. ACM, New York (2004)"},{"issue":"5","key":"12_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal on Uncertainty Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty Fuzziness and Knowledge-based Systems"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: Liebeherr, J., Ventre, G., Biersack, E.W., Keshav, S. (eds.) CoNEXT, pp. 169\u2013180. ACM (2009)","DOI":"10.1145\/1658939.1658959"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35890-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T09:24:08Z","timestamp":1676798648000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-35890-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642358890","9783642358906"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35890-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}