{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:21:02Z","timestamp":1763202062921,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078879","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"247-254","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems"],"prefix":"10.1145","author":[{"given":"Paolo","family":"Guarda","sequence":"first","affiliation":[{"name":"University of Trento, Trento, Italy"}]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[{"name":"FBK-Irst, Trento, Italy"}]},{"given":"Hari","family":"Siswantoro","sequence":"additional","affiliation":[{"name":"FBK-Irst, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1402660.1402664"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05302-8_14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875493"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.68"},{"key":"e_1_3_2_1_7_1","unstructured":"Omar Chowdhury Haining Chen Jianwei Niu Ninghui Li and Elisa Bertino. 2012. On XACML's adequacy to specify and to enforce HIPAA. In USENIX Ws. on Health S&P.   Omar Chowdhury Haining Chen Jianwei Niu Ninghui Li and Elisa Bertino. 2012. On XACML's adequacy to specify and to enforce HIPAA. In USENIX Ws. on Health S&P."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462423"},{"key":"e_1_3_2_1_9_1","unstructured":"A. Cimatti S. Mover and S. Tonetta. 2011. Proving and explaining the unfeasibility of message sequence charts for hybrid systems. In FMCAD. 54--62.   A. Cimatti S. Mover and S. Tonetta. 2011. Proving and explaining the unfeasibility of message sequence charts for hybrid systems. In FMCAD. 54--62."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063986"},{"key":"e_1_3_2_1_11_1","unstructured":"G. Danezis J. Domingo-Ferrer M. Hansen J.-H. Hoepman D. Le M\u00e9tayer R. Tirtea and S. Schiffner. 2014. Privacy and Data Protection by Design - from policy to engineering. ENISA. (2014).  G. Danezis J. Domingo-Ferrer M. Hansen J.-H. Hoepman D. Le M\u00e9tayer R. Tirtea and S. Schiffner. 2014. Privacy and Data Protection by Design - from policy to engineering. ENISA. (2014)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2007.015739"},{"key":"e_1_3_2_1_13_1","volume-title":"Enderton","author":"Enderton Herbert","year":"2001","unstructured":"Herbert Enderton and Herbert B . Enderton . 2001 . A mathematical introduction to logic. Academic press . Herbert Enderton and Herbert B. Enderton. 2001. A mathematical introduction to logic. Academic press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"K. Fatema D. W Chadwick and B. Van Alsenoy. 2012. Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. In Privacy and Identity Management for Life. 59--72.  K. Fatema D. W Chadwick and B. Van Alsenoy. 2012. Extracting Access Control and Conflict Resolution Policies from European Data Protection Law. In Privacy and Identity Management for Life. 59--72.","DOI":"10.1007\/978-3-642-31668-5_5"},{"key":"e_1_3_2_1_15_1","volume-title":"SPW","author":"Fatema K.","year":"2016","unstructured":"K. Fatema , C. Debruyne , D. Lewis , D. O'Sullivan , J. P Morrison , and A. Mazed . 2016. A Semi-Automated Methodology for Extracting access control rules from the European Data Protection Directive . In SPW , 2016 IEEE. 25--32. K. Fatema, C. Debruyne, D. Lewis, D. O'Sullivan, J. P Morrison, and A. Mazed. 2016. A Semi-Automated Methodology for Extracting access control rules from the European Data Protection Directive. In SPW, 2016 IEEE. 25--32."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046726"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.04.004"},{"key":"e_1_3_2_1_18_1","unstructured":"V. C Hu D. Ferraiolo R. Kuhn A. R. Friedman A. J Lang M. M Cogdell A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2013. Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Draft). Number 800-162 in NIST.  V. C Hu D. Ferraiolo R. Kuhn A. R. Friedman A. J Lang M. M Cogdell A. Schnitzer K. Sandlin R. Miller and K. Scarfone. 2013. Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Draft). Number 800-162 in NIST."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/501963.501966"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629210"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110363.2110401"},{"volume-title":"Proc. of PADL. 58--73","author":"Li N.","key":"e_1_3_2_1_23_1","unstructured":"N. Li and J.C. Mitchell . 2003. Datalog with constraints: a foundation for trust management languages . In Proc. of PADL. 58--73 . N. Li and J.C. Mitchell. 2003. Datalog with constraints: a foundation for trust management languages. In Proc. of PADL. 58--73."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34002-4_30"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.21"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_7"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":26,"alternative-id":["10.1145\/3078861.3078879","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078879","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}