{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:10:13Z","timestamp":1746159013833,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_11","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"162-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Legal Issues About Metadata Data Privacy vs Information Security"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Munier","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vincent","family":"Lalanne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pierre-Yves","family":"Ardoy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Magali","family":"Ricarde","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"11_CR1","unstructured":"Inmon, W.H.: Tech topic: What is a data warehouse? Prism Solutions, 1 pp. (1995)"},{"key":"11_CR2","volume-title":"The Data Warehouse Lifecycle Toolkit","author":"R Kimball","year":"2008","unstructured":"Kimball, R., Ross, M., Thornthwaite, W., Mundy, J., Becker, B.: The Data Warehouse Lifecycle Toolkit, 2nd edn. Wiley Publishing, New York (2008)","edition":"2"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Munier, M.: A multi-view approach for embedded information system security. In: CRiSIS, pp. 65\u201372. IEEE (2010)","DOI":"10.1109\/CRISIS.2010.5764917"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Munier, M., Lalanne, V., Ricarde, M.: Self-protecting documents for cloud storage security. In: TrustCom, pp. 1231\u20131238. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.261"},{"key":"11_CR5","unstructured":"Kalam, A.A.E., Benferhat, S., Mi\u00e8ge, A., Baida, R.E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: POLICY, pp. 120\u2013131. IEEE Computer Society (2003)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: From contextual permission to dynamic pre-obligation: an integrated approach. In: ARES, pp. 70\u201378. IEEE Computer Society (2010)","DOI":"10.1109\/ARES.2010.71"},{"issue":"4","key":"11_CR7","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. Int. J. Inf. Sec. 7(4), 285\u2013305 (2008)","journal-title":"Int. J. Inf. Sec."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Modelling contexts in the or-bac model. In: ACSAC, pp. 416\u2013427. IEEE Computer Society (2003)","DOI":"10.1109\/CSAC.2003.1254346"},{"key":"11_CR9","series-title":"LNCS","first-page":"1","volume-title":"SDM 2010","author":"E Bertino","year":"2010","unstructured":"Bertino, E., Lim, H.-S.: Assuring data trustworthiness - concepts and research challenges. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 1\u201312. Springer, Heidelberg (2010)"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Zheng, X., Maill\u00e9, P., Le, C.T.P., Morucci, S.: Improving the efficiency of collaborative work with trust management. In: Agoulmine, N., Bartolini, C., Pfeifer, T., O\u2019Sullivan, D. (eds.) Integrated Network Management, pp. 1172\u20131179. IEEE (2011)","DOI":"10.1109\/INM.2011.5990578"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Zheng, X., Maill\u00e9, P., Le, C.T.P., Morucci, S.: Trust mechanisms for efficiency improvement in collaborative working environments. In: MASCOTS, pp. 465\u2013467. IEEE (2010)","DOI":"10.1109\/MASCOTS.2010.67"},{"key":"11_CR12","series-title":"LNICST","first-page":"451","volume-title":"CollaborateCom 2008","author":"CTP Le","year":"2009","unstructured":"Le, C.T.P., Cuppens, F., Cuppens, N., Maill\u00e9, P.: Evaluating the trustworthiness of contributors in a collaborative environment. In: Bertino, E., Joshi, J.B.D. (eds.) CollaborateCom 2008. LNICST, vol. 10, pp. 451\u2013460. Springer, Heidelberg (2009)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Lalanne, V., Munier, M., Gabillon, A.: Information security risk management in a world of services. In: PASSAT (2013)","DOI":"10.1109\/SocialCom.2013.88"},{"key":"11_CR14","unstructured":"Jaramillo, E., Munier, M., Aniort\u00e9, P.: Information security in business intelligence based on cloud: a survey of key issues and the premises of a proposal. In: WOSIS (2013)"},{"key":"11_CR15","unstructured":"Hricik, D., Scott, C.E.: Metadata: the ghosts haunting e-documents. In: FindLaw, March 2008"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Van Hoboken, J., Arnbak, A., Van Eijk, N.: Cloud computing in higher education and research institutions and the USA PATRIOT Act. Social Science Research Network Working Paper Series, November 2012","DOI":"10.2139\/ssrn.2181534"},{"key":"11_CR17","first-page":"371","volume":"29","author":"LT Lee","year":"2003","unstructured":"Lee, L.T.: USA PATRIOT ACT and telecommunications: privacy under attack. Rutgers Comput. Tech. LJ 29, 371 (2003)","journal-title":"Rutgers Comput. Tech. LJ"},{"key":"11_CR18","unstructured":"EU: Fighting cyber crime and protecting privacy in the cloud. EU Parliament (2012)"},{"key":"11_CR19","unstructured":"EU: Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protecting Regulation). Comm. European Communities, Bruxelles (2012)"},{"issue":"2","key":"11_CR20","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337\u2013350 (2009)","journal-title":"Inf. Softw. Technol."},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. 10(2), 12\u201322 (2008)","journal-title":"SIGKDD Explor. Newsl."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T03:30:28Z","timestamp":1746156628000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}