{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:47:45Z","timestamp":1756000065226},"reference-count":22,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2002,5,1]],"date-time":"2002-05-01T00:00:00Z","timestamp":1020211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4107,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,5]]},"DOI":"10.1016\/s1571-0661(04)80342-6","type":"journal-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T15:29:25Z","timestamp":1096385365000},"page":"140-158","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Enforcing policies with privacy guardians"],"prefix":"10.1016","volume":"63","author":[{"given":"Radu","family":"Serban","sequence":"first","affiliation":[]},{"given":"Reind","family":"van de Riet","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB1","unstructured":"Bieber P. and F. Cuppens, Computer security policies and deontic logic, in: Proceedings of the First International Workshop on Deontic Logic in Computer Science, Amsterdam, The Netherlands, 1991."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","article-title":"For Unknown Secrecies Refusal is Better than Lying","author":"Biskup","year":"2000","journal-title":"Data & Knowledge Engineering"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB3","unstructured":"Cuppens F., Roles and deontic logic, in: Proceedings of the Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB4","doi-asserted-by":"crossref","unstructured":"Cuppens F. and C. Saurel, Specifying a security policy: A case study, in: Proceedings of the computer security foundations workshop, Kenmare, Co. Kerry, Ireland, 1996.","DOI":"10.1109\/CSFW.1996.503697"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB5","series-title":"Deontic Logic in Computer Science: Normative System Specification","article-title":"Expression of confidentiality policies with deontic logic","author":"Cuppens","year":"1993"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB6","first-page":"41","article-title":"Answering queries without revealing secrets","author":"de Jonge","year":"1983","journal-title":"ACM Transactions on Database Systems"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB7","author":"Fred Schneider","year":"1999","journal-title":"Enforceable Security Policies"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB8","doi-asserted-by":"crossref","unstructured":"Harry Hochheiser, Principles for privacy protection software, in: Proceedings of the 14th Conference on Computers, Freedom and Privacy, CFP2000, Toronto, Canada, April 2000.","DOI":"10.1145\/332186.332250"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB9","doi-asserted-by":"crossref","unstructured":"J. Glasgow, G. M. and P. Panangaden, A logic for reasoning about security, in: Proceedings of Computer Security Foundations Workshop, Franconia (1990), pp. 2\u201313.","DOI":"10.1109\/CSFW.1990.128180"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB10","doi-asserted-by":"crossref","unstructured":"Mark S. Ackerman; Lorrie Faith Cranor; Joseph Reagle, Privacy in e-commerce: Examining user scenarios and privacy preferences, in: Proceedings of the ACM Conference on Electronic Commerce, 1999, 1999, pp. 1\u20138.","DOI":"10.1145\/336992.336995"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB11","doi-asserted-by":"crossref","unstructured":"Paul F Syverson; Stuart G Stubblebine, Group principals and the formalization of anonymity, in: J. W. J. W. J. Davies, editor, Formal Methods, vol. I, LNCS vol. 1708, Springer-Verlag, Berlin, September 1999 pp. 814\u2013833","DOI":"10.1007\/3-540-48119-2_45"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB12","author":"Piero Bonatti","year":"1999","journal-title":"Data-Security in Heterogeneous Agent Systems"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB13","unstructured":"Prasun Dewan; Honghai Shen, Flexible Meta Access-Control for Collaborative Applications (2000)."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB14","unstructured":"Radu Serban; Reind van de Riet, Trusted environments for privacy protection in online transactions, in: C. C. Y.-H. T. R. F. B. S. Firozabadi, editor, Proceedings of the 3rd workshop on Deception Fraud and Trust in Agent Societies, AA-1999, Seattle, U.S.A., May 1999, pp. 107\u2013116."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB15","unstructured":"Rodolphe Ortalo, Using Deontic Logic for Security Policy Specification, Technical Report LAAS-96380, LAAS-CNRS Toulouse, France (1996)."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB16","unstructured":"Rodolphe Ortalo, Using Role-based Abstractions for Security Policy Specification with Deontic Logic, Technical Report LAAS-97216, LAAS-CNRS Toulouse, France (1998)."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB17","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s004460050038","article-title":"Knowledge-Based Programs","author":"Fagin","year":"1997","journal-title":"Distributed Computing"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB18","first-page":"429","article-title":"A formal characterisation of institutionalised power","author":"Sergot","year":"1996","journal-title":"Journal of the IGPL"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB19","unstructured":"Thoen Y.-H. T. W., Towards a generic model of trust for electronic commerce, in: C. C. Y.-H. T. R. F. B. S. Firozabadi, editor, Proceedings of the 3rd workshop on Deception Fraud and Trust in Agent Societies, AA-1999, Seattle, U.S.A., May 1999, pp. 117\u2013127."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB20","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/4236.877485","article-title":"A Pessimistic Approach to Trust in Mobile Agent Platforms","author":"Uwe Wilhelm","year":"2000","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB21","unstructured":"Wilhelm, U. G., \u201cA Technical Approach to Privacy based on Mobile Agents Protected by Tamper-resistant Hardware (PhD Thesis),\u201d Ecole Polytechnique Federale de Lausanne, Switzerland, 1999."},{"key":"10.1016\/S1571-0661(04)80342-6_NEWBIB22","series-title":"Foundations of DAI","article-title":"Temporal belief logics for modelling distributed artificial intelligence systems","author":"Wooldridge","year":"1995"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803426?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803426?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T07:22:52Z","timestamp":1549178572000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104803426"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,5]]},"references-count":22,"alternative-id":["S1571066104803426"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80342-6","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2002,5]]}}}