{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:16:34Z","timestamp":1759335394822,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9377864","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T17:10:21Z","timestamp":1616173821000},"page":"3963-3978","source":"Crossref","is-referenced-by-count":15,"title":["Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies"],"prefix":"10.1109","author":[{"given":"Lavanya","family":"Elluri","sequence":"first","affiliation":[]},{"given":"Karuna","family":"Pande Joshi","sequence":"additional","affiliation":[]},{"given":"Anantaa","family":"Kotal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"General Data Protection Regulation (GDPR)","article-title":"Final text neatly arranged","year":"0","key":"ref39"},{"year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.63"},{"journal-title":"Resource description framework (RDF)","year":"0","key":"ref32"},{"key":"ref31","article-title":"ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services","volume":"2020","author":"kotal","year":"2020","journal-title":"IEEE International Conference on Cloud Computing (CLOUD)"},{"year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-0013-z"},{"key":"ref36","article-title":"Modeling Communicative Behavior Using Permissions and Obligations","author":"kagal","year":"2004","journal-title":"Agent Communication International Workshop on Agent Communication AC 2004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87877-3_13"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.68"},{"journal-title":"DRIP","year":"0","key":"ref10"},{"journal-title":"Resources about the GDPR","year":"0","key":"ref40"},{"journal-title":"DropBox","year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622236"},{"year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2018.00036"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-37022-4_4"},{"year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008964"},{"journal-title":"OWL Web Ontology Language","year":"0","key":"ref8"},{"journal-title":"Understanding Semantic Web andOntologies Theory and Applications","year":"0","key":"ref7"},{"key":"ref2","first-page":"109","author":"pande joshi","year":"2014","journal-title":"Automating Cloud Services Lifecycle through Semantic technologies"},{"year":"2020","key":"ref9"},{"article-title":"Cloud Security Alliance Warns Providers of &#x2019;The Notorious Nine&#x2019; Cloud Computing Top Threats in 2013","year":"0","author":"alliance","key":"ref1"},{"journal-title":"Modal Logic","year":"0","key":"ref46"},{"year":"0","key":"ref20"},{"journal-title":"Prot&#x00E9;g&#x00E9; Editor-Prot&#x00E9;g&#x00E9; Tool","year":"0","key":"ref45"},{"year":"0","key":"ref48"},{"year":"0","key":"ref22"},{"year":"0","key":"ref47"},{"year":"0","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45486-1_4"},{"year":"0","key":"ref24"},{"year":"2018","key":"ref41","article-title":"General Data Protection Regulation"},{"year":"0","key":"ref23"},{"key":"ref44","first-page":"8","article-title":"Triplet extraction from sentences","author":"rusu","year":"2007","journal-title":"Proceedings of the 10th International Multiconference\" Information Society-IS"},{"year":"0","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2005.03.001"},{"journal-title":"Box","year":"0","key":"ref25"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09377864.pdf?arnumber=9377864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:51:09Z","timestamp":1656330669000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9377864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9377864","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}