{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:40:11Z","timestamp":1750214411408,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3148011.3148022","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T13:22:50Z","timestamp":1513603370000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Propagating Data Policies"],"prefix":"10.1145","author":[{"given":"Enrico","family":"Daga","sequence":"first","affiliation":[{"name":"The Open University, Milton Keynes, United Kingdom"}]},{"given":"Mathieu","family":"d'Aquin","sequence":"additional","affiliation":[{"name":"Insight Centre - NUI, Galway, Ireland"}]},{"given":"Enrico","family":"Motta","sequence":"additional","affiliation":[{"name":"The Open University, Milton Keynes, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"volume-title":"Data reverse engineering: slaying the legacy dragon","author":"Aiken Peter H","key":"e_1_3_2_1_1_1","unstructured":"Peter H Aiken . 1996. Data reverse engineering: slaying the legacy dragon . McGraw-Hill Companies . Peter H Aiken. 1996. Data reverse engineering: slaying the legacy dragon. McGraw-Hill Companies."},{"key":"e_1_3_2_1_2_1","volume-title":"Protection and composition of crossmedia content in collaborative environments. Multimedia Tools and Applications","author":"Bellini Pierfrancesco","year":"2017","unstructured":"Pierfrancesco Bellini , Marco Mesiti , Paolo Nesi , and Paolo Perlasca . 2017. Protection and composition of crossmedia content in collaborative environments. Multimedia Tools and Applications ( 2017 ). Pierfrancesco Bellini, Marco Mesiti, Paolo Nesi, and Paolo Perlasca. 2017. Protection and composition of crossmedia content in collaborative environments. Multimedia Tools and Applications (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Pompeu Casanovas. 2015. Conceptualisation of rights and meta-rule of law for the web of data. (2015).  Pompeu Casanovas. 2015. Conceptualisation of rights and meta-rule of law for the web of data. (2015).","DOI":"10.22495\/jgr_v4_i1_p11"},{"key":"e_1_3_2_1_4_1","volume-title":"Addressing Exploitability of Smart City Data. In International Smart Cities Conference (ISC2). IEEE.","author":"Daga Enrico","year":"2016","unstructured":"Enrico Daga , Alessandro Adamou , Mathieu d' Aquin , and Enrico Motta . 2016 . Addressing Exploitability of Smart City Data. In International Smart Cities Conference (ISC2). IEEE. Enrico Daga, Alessandro Adamou, Mathieu d'Aquin, and Enrico Motta. 2016. Addressing Exploitability of Smart City Data. In International Smart Cities Conference (ISC2). IEEE."},{"key":"e_1_3_2_1_5_1","volume-title":"Reasoning with Data Flows and Policy Propagation Rules. Semantic Web Journal","author":"Daga Enrico","year":"2017","unstructured":"Enrico Daga , Alessandro Adamou , Mathieu d' Aquin , and Enrico Motta . 2017. Reasoning with Data Flows and Policy Propagation Rules. Semantic Web Journal ( 2017 ). Enrico Daga, Alessandro Adamou, Mathieu d'Aquin, and Enrico Motta. 2017. Reasoning with Data Flows and Policy Propagation Rules. Semantic Web Journal (2017)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815833.2815839"},{"key":"e_1_3_2_1_7_1","unstructured":"Enrico Daga Mathieu d'Aquin Aldo Gangemi and Enrico Motta. 2014. Describing Semantic Web Applications Through Relations Between Data Nodes. (2014).  Enrico Daga Mathieu d'Aquin Aldo Gangemi and Enrico Motta. 2014. Describing Semantic Web Applications Through Relations Between Data Nodes. (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2015.130"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41335-3_10"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.65"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2014.2314600"},{"key":"e_1_3_2_1_12_1","volume-title":"Legal Knowledge and Information Systems. JURIX 2014: The Twenty-Seventh Annual Conference., Rinke Hoekstra (Ed.). IOS Press.","author":"Rodr\u00edguez-Doncel V\u00edctor","year":"2014","unstructured":"V\u00edctor Rodr\u00edguez-Doncel , Serena Villata , and Asunci\u00f3n G\u00f3mez-P\u00e9rez . 2014 . A dataset of RDF licenses . In Legal Knowledge and Information Systems. JURIX 2014: The Twenty-Seventh Annual Conference., Rinke Hoekstra (Ed.). IOS Press. V\u00edctor Rodr\u00edguez-Doncel, Serena Villata, and Asunci\u00f3n G\u00f3mez-P\u00e9rez. 2014. A dataset of RDF licenses. In Legal Knowledge and Information Systems. JURIX 2014: The Twenty-Seventh Annual Conference., Rinke Hoekstra (Ed.). IOS Press."},{"key":"e_1_3_2_1_13_1","volume-title":"Towards Formal Semantics for ODRL Policies. In International Symposium on Rules and Rule Markup Languages for the Semantic Web. Springer, 360--375","author":"Steyskal Simon","year":"2015","unstructured":"Simon Steyskal and Axel Polleres . 2015 . Towards Formal Semantics for ODRL Policies. In International Symposium on Rules and Rule Markup Languages for the Semantic Web. Springer, 360--375 . Simon Steyskal and Axel Polleres. 2015. Towards Formal Semantics for ODRL Policies. In International Symposium on Rules and Rule Markup Languages for the Semantic Web. Springer, 360--375."}],"event":{"name":"K-CAP 2017: Knowledge Capture Conference","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Austin TX USA","acronym":"K-CAP 2017"},"container-title":["Proceedings of the Knowledge Capture Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3148011.3148022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3148011.3148022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:33Z","timestamp":1750213593000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3148011.3148022"}},"subtitle":["a User Study"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":13,"alternative-id":["10.1145\/3148011.3148022","10.1145\/3148011"],"URL":"https:\/\/doi.org\/10.1145\/3148011.3148022","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}