{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T16:03:43Z","timestamp":1751299423530},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642383229"},{"type":"electronic","value":"9783642383236"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38323-6_22","type":"book-chapter","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T01:02:28Z","timestamp":1369789348000},"page":"272-280","source":"Crossref","is-referenced-by-count":2,"title":["PERSONA - A Personalized Data Protection Framework"],"prefix":"10.1007","author":[{"given":"Marina","family":"Egea","sequence":"first","affiliation":[]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[]},{"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"22_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s12599-011-0155-7","volume":"3","author":"R. Accorsi","year":"2011","unstructured":"Accorsi, R., Lowis, L., Sato, Y.: Automated certification for compliant cloud-based business processes. Business & Information Systems Engineering\u00a03(3), 145\u2013154 (2011)","journal-title":"Business & Information Systems Engineering"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Adriansyah, A., Sidorova, N., van Dongen, B.F.: Cost-Based Fitness in Conformance Checking. In: Proc. of ACSD, pp. 57\u201366. IEEE (2011)","DOI":"10.1109\/ACSD.2011.19"},{"key":"22_CR3","unstructured":"Anderson, H.: Personalized Medicine and Privacy - Pairing Genetic Information, EHRs Raises Concerns (2010)"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-16265-7_4","volume-title":"Integrated Formal Methods","author":"A.E. Arenas","year":"2010","unstructured":"Arenas, A.E., Aziz, B., Bicarregui, J., Wilson, M.D.: An Event-B Approach to Data Sharing Agreements. In: M\u00e9ry, D., Merz, S. (eds.) IFM 2010. LNCS, vol.\u00a06396, pp. 28\u201342. Springer, Heidelberg (2010)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-32885-5_8","volume-title":"Business Process Management","author":"S. Banescu","year":"2012","unstructured":"Banescu, S., Petkovi\u0107, M., Zannone, N.: Measuring privacy compliance using fitness metrics. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol.\u00a07481, pp. 114\u2013119. Springer, Heidelberg (2012)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Egea, M.: A decade of model driven security. In: Proceedings of the 16th Symposium on Access Control Models and Technologies, pp. 1\u201310. ACM (2011)","DOI":"10.1145\/1998441.1998443"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-23082-0_4","volume-title":"Foundations of Security Analysis and Design VI","author":"D. Basin","year":"2011","unstructured":"Basin, D., Clavel, M., Egea, M., Garc\u00eda de Dios, M.A., Dania, C., Ortiz, G., Valdazo, J.: Model-driven development of security-aware gUIs for data-centric applications. In: Aldini, A., Gorrieri, R. (eds.) FOSAD VI. LNCS, vol.\u00a06858, pp. 101\u2013124. Springer, Heidelberg (2011)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-540-87603-8_15","volume-title":"Abstract State Machines, B and Z","author":"J. Bicarregui","year":"2008","unstructured":"Bicarregui, J., Arenas, A., Aziz, B., Massonet, P., Ponsard, C.: Towards Modelling Obligations in Event-B. In: B\u00f6rger, E., Butler, M., Bowen, J.P., Boca, P. (eds.) ABZ 2008. LNCS, vol.\u00a05238, pp. 181\u2013194. Springer, Heidelberg (2008)"},{"key":"22_CR9","unstructured":"Care Technologies: Olivanova \u2013 the programming machine (2011), \n                    \n                      http:\/\/www.care-t.com"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"22_CR11","unstructured":"Fontaine, P.J.: Goal-Oriented Elaboration of Security Requirements. PhD thesis, Universite Catholique de Louvain (2001)"},{"key":"22_CR12","first-page":"1305","volume":"10","author":"S. Goedertier","year":"2009","unstructured":"Goedertier, S., Martens, D., Vanthienen, J., Baesens, B.: Robust process discovery with artificial negative events. Journal of Machine Learning Research\u00a010, 1305\u20131340 (2009)","journal-title":"Journal of Machine Learning Research"},{"issue":"6","key":"22_CR13","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/j.infsof.2008.11.005","volume":"51","author":"Q. He","year":"2009","unstructured":"He, Q., Ant\u00f3n, A.I.: Requirements-based access control analysis and policy specification (recaps). Inf. Softw. Technol.\u00a051(6), 993\u20131009 (2009)","journal-title":"Inf. Softw. Technol."},{"issue":"2-3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.cose.2010.09.001","volume":"30","author":"J. Jin","year":"2011","unstructured":"Jin, J., Ahn, G.J., Hu, H., Covington, M.J., Zhang, X.: Patient-centric authorization framework for electronic healthcare services. Computers & Security\u00a030(2-3), 116\u2013127 (2011)","journal-title":"Computers & Security"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Kharbili, M.E., et al.: CoReL: Policy-Based and Model-Driven Regulatory Compliance Management. In: Enterprise Distributed Object Computing, pp. 247\u2013256. IEEE (2011)","DOI":"10.1109\/EDOC.2011.23"},{"key":"22_CR16","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proceedings of 11th Int. Conf. on Req. Eng., pp. 151\u2013161. IEEE (2003)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/978-3-642-32498-7_42","volume-title":"Multidisciplinary Research and Practice for Information Systems","author":"F. Martinelli","year":"2012","unstructured":"Martinelli, F., Matteucci, I., Petrocchi, M., Wiegand, L.: A formal support for collaborative data sharing. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol.\u00a07465, pp. 547\u2013561. Springer, Heidelberg (2012)"},{"key":"22_CR18","series-title":"SCI","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-05183-8_6","volume-title":"Advances in Intelligent Information Systems","author":"F. Massacci","year":"2010","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol.\u00a0265, pp. 147\u2013174. Springer, Heidelberg (2010)"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1007\/978-3-540-88873-4_11","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"F. Massacci","year":"2008","unstructured":"Massacci, F., Zannone, N.: A model-driven approach for the specification and analysis of access control policies. In: Meersman, R., Tari, Z. (eds.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1087\u20131103. Springer, Heidelberg (2008)"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Mori, P., Petrocchi, M., Wiegand, L.: Controlled data sharing in E-health. In: STAST, pp. 17\u201323 (2011)","DOI":"10.1109\/STAST.2011.6059251"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L.: CNL4DSA: a controlled natural language for data sharing agreements. In: SAC, pp. 616\u2013620 (2010)","DOI":"10.1145\/1774088.1774218"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-28879-1_3","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"I. Matteucci","year":"2012","unstructured":"Matteucci, I., Petrocchi, M., Sbodio, M.L., Wiegand, L.: A design phase for data sharing agreements. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 25\u201341. Springer, Heidelberg (2012)"},{"key":"22_CR23","unstructured":"Microsoft: Visual studio lightswitch (2010), \n                    \n                      http:\/\/www.microsoft.com\/visualstudio\/en-us\/lightswitch"},{"key":"22_CR24","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 (August 2010)"},{"key":"22_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-35890-6_10","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"I. Matteucci","year":"2013","unstructured":"Matteucci, I., Mori, P., Petrocchi, M.: Prioritized execution of privacy policies. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol.\u00a07731, pp. 133\u2013145. Springer, Heidelberg (2013)"},{"key":"22_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-23556-6_10","volume-title":"Secure Data Management","author":"M. Petkovi\u0107","year":"2011","unstructured":"Petkovi\u0107, M., Prandi, D., Zannone, N.: Purpose control: Did you process the data for the intended purpose? In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol.\u00a06933, pp. 145\u2013168. Springer, Heidelberg (2011)"},{"issue":"1","key":"22_CR27","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0377-2217(90)90057-I","volume":"48","author":"T. Saaty","year":"1990","unstructured":"Saaty, T.: How to make a decision: The analytic hierarchy process. European Journal of Operational Research\u00a048(1), 9\u201326 (1990)","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"22_CR28","first-page":"67","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.: Engineering privacy. TSE\u00a035(1), 67\u201382 (2009)","journal-title":"TSE"},{"key":"22_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11575771_11","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., de Beer, H.T., van Dongen, B.F.: Process mining and verification of properties: an approach based on temporal logic. In: Meersman, R. (ed.) OTM 2005. LNCS, vol.\u00a03760, pp. 130\u2013147. Springer, Heidelberg (2005)"},{"key":"22_CR30","series-title":"IFIP AICT","first-page":"111","volume-title":"HCC10 2012","author":"S. Vavilis","year":"2012","unstructured":"Vavilis, S., Petkovi\u0107, M., Zannone, N.: Impact of ICT on Home Healthcare. In: Hercheui, M.D., Whitehouse, D., McIver Jr., W., Phahlamohlaka, J. (eds.) HCC10 2012. IFIP AICT, vol.\u00a0386, pp. 111\u2013122. Springer, Heidelberg (2012)"},{"key":"22_CR31","unstructured":"Web Models Company: Web ratio \u2013 you think, you get (2010), \n                    \n                      http:\/\/www.webratio.com"},{"issue":"7","key":"22_CR32","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.is.2011.04.002","volume":"36","author":"M. Weidlich","year":"2011","unstructured":"Weidlich, M., Polyvyanyy, A., Desai, N., Mendling, J., Weske, M.: Process compliance analysis based on behavioural profiles. Information Systems\u00a036(7), 1009\u20131025 (2011)","journal-title":"Information Systems"},{"key":"22_CR33","unstructured":"Westin, A.: Harris-Equifax Consumer Privacy Survey. Report, Equifax Inc. (1991)"},{"key":"22_CR34","unstructured":"Yu, E.: Modeling organizations for information systems requirements engineering. In: Proceedings of IEEE Int. Symposium on Requirements Engineering, pp. 34\u201341 (1993)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management VII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38323-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:54:44Z","timestamp":1557734084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38323-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642383229","9783642383236"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38323-6_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}