{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:15Z","timestamp":1750308015948,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,10,30]]},"DOI":"10.1145\/1501434.1501465","type":"proceedings-article","created":{"date-parts":[[2009,2,4]],"date-time":"2009-02-04T13:02:04Z","timestamp":1233752524000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy policy enforcement in enterprises with identity management solutions"],"prefix":"10.1145","author":[{"given":"Marco Casassa","family":"Mont","sequence":"first","affiliation":[{"name":"Hewlett-Packard Laboratories, Stoke Gifford, Bristol, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Thyne","sequence":"additional","affiliation":[{"name":"Hewlett-Packard (Canada) Co., Toronto, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Laurant \"Privacy International: Privacy and Human Rights 2003: an International Survey of Privacy Laws and Developments Electronic Privacy Information Center (EPIC)\" Privacy International. http:\/\/www.privacyinternational.org\/survey\/phr2003\/2003.  C. Laurant \"Privacy International: Privacy and Human Rights 2003: an International Survey of Privacy Laws and Developments Electronic Privacy Information Center (EPIC)\" Privacy International. http:\/\/www.privacyinternational.org\/survey\/phr2003\/2003."},{"key":"e_1_3_2_1_2_1","unstructured":"Online Privacy Alliance \"Guidelines for Online Privacy Policies\" http:\/\/www.privacyalliance.org\/ Online Privacy Alliance 2004.  Online Privacy Alliance \"Guidelines for Online Privacy Policies\" http:\/\/www.privacyalliance.org\/ Online Privacy Alliance 2004."},{"key":"e_1_3_2_1_3_1","unstructured":"OECD \"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.\" http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF 1980.  OECD \"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data.\" http:\/\/www1.oecd.org\/publications\/e-book\/9302011E.PDF 1980."},{"volume-title":"Zurich. 15th IEEE Computer Foundations Workshop","year":"2002","author":"Karjoth G.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"69","volume-title":"2nd Workshop on Privacy Enhancing Technologies, LNCS 2482\/2003","author":"Karjoth G.","year":"2002"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Schunter P. Ashley \"The Platform for Enterprise Privacy Practices\" IBM Zurich Research Laboratory 2002.  M. Schunter P. Ashley \"The Platform for Enterprise Privacy Practices\" IBM Zurich Research Laboratory 2002."},{"volume-title":"Workshop on Trust and Privacy in Digital Business (TrustBus) 2002","year":"2002","author":"Karjoth G.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"IBM \"The Enterprise Privacy Authorization Language (EPAL) EPAL 1.1 specification\" http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/ IBM 2004.  IBM \"The Enterprise Privacy Authorization Language (EPAL) EPAL 1.1 specification\" http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/ IBM 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Agrawal J. Kiernan R. Srikant Y. Xu \"Hippocratic Databases\" http:\/\/www.almaden.ibm.com\/cs\/people\/srikant\/p apers\/vldb02.pdf IBM Almaden Research Center 2002.  R. Agrawal J. Kiernan R. Srikant Y. Xu \"Hippocratic Databases\" http:\/\/www.almaden.ibm.com\/cs\/people\/srikant\/p apers\/vldb02.pdf IBM Almaden Research Center 2002.","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"e_1_3_2_1_10_1","unstructured":"IBM Tivoli Privacy Manager \"IBM Tivoli Privacy Manager main web page\" http:\/\/www-306.ibm.com\/software\/tivoli\/products\/privacy-mgr-e-bus\/ 2005.  IBM Tivoli Privacy Manager \"IBM Tivoli Privacy Manager main web page\" http:\/\/www-306.ibm.com\/software\/tivoli\/products\/privacy-mgr-e-bus\/ 2005."},{"key":"e_1_3_2_1_11_1","unstructured":"IBM Tivoli Privacy Manager \"IBM Tivoli Online technical documentation\" http:\/\/publib.boulder.ibm.com\/tividd\/td\/PrivacyManagerfore-business1.1.html 2005.  IBM Tivoli Privacy Manager \"IBM Tivoli Online technical documentation\" http:\/\/publib.boulder.ibm.com\/tividd\/td\/PrivacyManagerfore-business1.1.html 2005."},{"key":"e_1_3_2_1_12_1","unstructured":"HP \"HP Select Federation: Product and Solution Overview\" http:\/\/www.managementsoftware.hp.com\/product s\/slctfed\/ 2005.  HP \"HP Select Federation: Product and Solution Overview\" http:\/\/www.managementsoftware.hp.com\/product s\/slctfed\/ 2005."},{"key":"e_1_3_2_1_13_1","unstructured":"ePok \"identity management solution - Trusted Data Exchange Server\" http:\/\/www.epokinc.com\/ 2005.  ePok \"identity management solution - Trusted Data Exchange Server\" http:\/\/www.epokinc.com\/ 2005."},{"key":"e_1_3_2_1_14_1","unstructured":"HP \"HP OpenView SelectAccess: Overview and Features\" http:\/\/www.openview.hp.com\/products\/select 2005.  HP \"HP OpenView SelectAccess: Overview and Features\" http:\/\/www.openview.hp.com\/products\/select 2005."},{"volume-title":"Technical Report 2004--52","year":"2004","author":"Byun J.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"M. Casassa Mont P. Bramhall J. Pato \"On Adaptive Identity Management: The Next Generation of Identity Management Technologies\" HPL-2003-149 2003.  M. Casassa Mont P. Bramhall J. Pato \"On Adaptive Identity Management: The Next Generation of Identity Management Technologies\" HPL-2003-149 2003."},{"key":"e_1_3_2_1_17_1","unstructured":"HP \"HP OpenView Select Audit Documentation\" http:\/\/www.managementsoftware.hp.com\/products\/slctaud\/ 2006.  HP \"HP OpenView Select Audit Documentation\" http:\/\/www.managementsoftware.hp.com\/products\/slctaud\/ 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_9"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Casassa Mont R. Thyne Pete Bramhall \"Privacy Enforcement with HP Select Access for Regulatory Compliance\" HPL-2005-10 2005.  M. Casassa Mont R. Thyne Pete Bramhall \"Privacy Enforcement with HP Select Access for Regulatory Compliance\" HPL-2005-10 2005."},{"key":"e_1_3_2_1_20_1","first-page":"120","volume-title":"1st International Conference on Trust and Privacy in Digital Business (TrustBus) 2004","author":"Casassa Mont M.","year":"2004"},{"key":"e_1_3_2_1_21_1","unstructured":"M. Casassa Mont \"Dealing with Privacy Obligations in Enterprises\" Information Security Solutions Europe (ISSE) 2004 2004.  M. Casassa Mont \"Dealing with Privacy Obligations in Enterprises\" Information Security Solutions Europe (ISSE) 2004 2004."},{"key":"e_1_3_2_1_22_1","unstructured":"PRIME \"Privacy and Identity Management for Europe European RTD Integrated Project under the FP6\/IST Programme\" http:\/\/www.prime-project.eu\/ 2006.  PRIME \"Privacy and Identity Management for Europe European RTD Integrated Project under the FP6\/IST Programme\" http:\/\/www.prime-project.eu\/ 2006."},{"key":"e_1_3_2_1_23_1","unstructured":"HP \"HP Open View Select Identity: Overview and Features\" http:\/\/www.openview.hp.com\/products\/slctid\/index.html 2005.  HP \"HP Open View Select Identity: Overview and Features\" http:\/\/www.openview.hp.com\/products\/slctid\/index.html 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_23"},{"key":"e_1_3_2_1_25_1","unstructured":"Oracle \"Oracle Virtual Private Database\" http:\/\/www.oracle.com\/technology\/deploy\/security\/db_security\/htdocs\/vpd.html 2006.  Oracle \"Oracle Virtual Private Database\" http:\/\/www.oracle.com\/technology\/deploy\/security\/db_security\/htdocs\/vpd.html 2006."}],"event":{"name":"PST06: International Conference on Privacy, Security and Trust","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Markham Ontario Canada","acronym":"PST06"},"container-title":["Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1501434.1501465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:40Z","timestamp":1750259200000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1501434.1501465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,30]]},"references-count":25,"alternative-id":["10.1145\/1501434.1501465","10.1145\/1501434"],"URL":"https:\/\/doi.org\/10.1145\/1501434.1501465","relation":{},"subject":[],"published":{"date-parts":[[2006,10,30]]},"assertion":[{"value":"2006-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}