{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T12:23:28Z","timestamp":1751718208431,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cimca.2005.1631276","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"261-267","source":"Crossref","is-referenced-by-count":3,"title":["Proposal and Evaluation of Policy Description for Information Lifecycle Management"],"prefix":"10.1109","volume":"1","author":[{"given":"T.","family":"Tanaka","sequence":"first","affiliation":[]},{"given":"K.","family":"Ushijima","sequence":"additional","affiliation":[]},{"given":"R.","family":"Ueda","sequence":"additional","affiliation":[]},{"given":"I.","family":"Naitoh","sequence":"additional","affiliation":[]},{"given":"T.","family":"Aizono","sequence":"additional","affiliation":[]},{"given":"N.","family":"Komoda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"30","article-title":"File systems and storage","volume":"22","author":"chudnow","year":"2003","journal-title":"Computer Technology Review"},{"key":"2","article-title":"The Cost Of Compliance","author":"marlin","year":"2003","journal-title":"Security Pipeline"},{"year":"0","key":"10"},{"journal-title":"AMR Research Predicts Compliance Is an $80B Issue","year":"2005","author":"reilly","key":"1"},{"key":"7","first-page":"20","article-title":"Policy-based data management in ILM","volume":"24","author":"palermo","year":"2004","journal-title":"Computer Technology Review"},{"key":"6","first-page":"38","article-title":"Information lifecycle management","volume":"23","author":"rief","year":"2003","journal-title":"Computer Technology Review"},{"key":"5","first-page":"3","article-title":"SNIA nails down ILM definition","volume":"26","author":"francis","year":"2004","journal-title":"Infoworld"},{"journal-title":"Meeting the Enterprise Data Protection Challenge","year":"0","author":"doyle","key":"4"},{"journal-title":"Ontology for Knowledge Activity Resources (OKAR) Guide","year":"2005","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.26"},{"year":"0","key":"11"},{"year":"0","key":"12"}],"event":{"name":"International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)","location":"Vienna, Austria"},"container-title":["International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10869\/34211\/01631276.pdf?arnumber=1631276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T14:30:33Z","timestamp":1489501833000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1631276\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cimca.2005.1631276","relation":{},"subject":[]}}