{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:23Z","timestamp":1750306043430,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSA","award":["Grant on Science of Security"],"award-info":[{"award-number":["Grant on Science of Security"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-0964710"],"award-info":[{"award-number":["CNS-0964710"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3084176","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"191-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language"],"prefix":"10.1145","author":[{"given":"Thomas","family":"MacGahan","sequence":"first","affiliation":[{"name":"Accenture Federal Services, Arlington, VA, USA"}]},{"given":"Claiborne","family":"Johnson","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Armando","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Jeffery","family":"von Ronne","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio &amp; Google, Inc., San Antonio, TX, USA"}]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"How to comply with the children's online privacy protection rule.","year":"1999","key":"e_1_3_2_1_1_1","unstructured":"1999. Federal Trade Commission , How to comply with the children's online privacy protection rule. ( 1999 ). DOI: https:\/\/doi.org\/bcp\/conline\/pubs\/buspubs\/coppa.htm Public Law. 1999. Federal Trade Commission, How to comply with the children's online privacy protection rule. (1999). DOI: https:\/\/doi.org\/bcp\/conline\/pubs\/buspubs\/coppa.htm Public Law."},{"volume-title":"Gramm-Leach-Bliley Act.","year":"1999","key":"e_1_3_2_1_2_1","unstructured":"1999. Senate Banking Committee , Gramm-Leach-Bliley Act. ( 1999 ). Public Law 106--102. 1999. Senate Banking Committee, Gramm-Leach-Bliley Act. (1999). Public Law 106--102."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462423"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(77)90033-9"},{"volume-title":"Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq","author":"HIPAA","key":"e_1_3_2_1_5_1","unstructured":"HIPAA 1996. Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq .; 45 CFR Parts 144, 146, 160 162, and 164). HIPAA 1996. Health Insurance Portability and Accountability Act (HIPAA). (1996). (42 U.S.C. \u00a7300gg, 29 U.S.C \u00a71181 et seq., and 42 U.S.C \u00a71320d et seq.; 45 CFR Parts 144, 146, 160 162, and 164)."},{"volume-title":"An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis","author":"Johnson Claiborne","key":"e_1_3_2_1_6_1","unstructured":"Claiborne Johnson . 2016. An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis . University of Texas at San Antonio . Claiborne Johnson. 2016. An Actor-Based Framework for Verifiable Privacy Policy Enforcement: Assume-Guarantee Specification of an Actor-Component Architecture. Master's thesis. University of Texas at San Antonio."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078873"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(96)00069-2"},{"volume-title":"Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis","author":"MacGahan Thomas","key":"e_1_3_2_1_9_1","unstructured":"Thomas MacGahan . 2016. Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis . University of Texas at San Antonio . Thomas MacGahan. 2016. Towards Verifiable Privacy Policy Compliance of an Actor-Based Electronic Medical Records System: An extension to the HAPL language focused on exposing a user interface. Master's thesis. University of Texas at San Antonio."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414639.2414657"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084176","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084176","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3084176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3084176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":10,"alternative-id":["10.1145\/3078861.3084176","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3084176","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}