{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T14:31:41Z","timestamp":1712241101012},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T00:00:00Z","timestamp":1387324800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00766-013-0190-7","type":"journal-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T06:28:05Z","timestamp":1387261685000},"page":"281-307","source":"Crossref","is-referenced-by-count":51,"title":["Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements"],"prefix":"10.1007","volume":"19","author":[{"given":"Travis D.","family":"Breaux","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Hibshi","sequence":"additional","affiliation":[]},{"given":"Ashwini","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,18]]},"reference":[{"key":"190_CR1","doi-asserted-by":"crossref","unstructured":"Anderson A (2006) A comparison of two privacy policy languages: EPAL and XACML. ACM workshop on secure web services, pp 53\u201360","DOI":"10.1145\/1180367.1180378"},{"key":"190_CR2","doi-asserted-by":"crossref","unstructured":"Ashley P, Hada S, Karjoth G, Schunter M (2002) E-P3P privacy policies and privacy authorization. In: Proceedings of the ACM workshop on privacy in the electronic society, pp 103\u2013109","DOI":"10.1145\/644527.644538"},{"issue":"2","key":"190_CR3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MSECP.2004.1281243","volume":"2","author":"AI Ant\u00f3n","year":"2004","unstructured":"Ant\u00f3n AI, Earp JB, He Q, Stufflebeam W, Bolchini D, Jensen C (2004) Financial privacy policies and the need for standardization. IEEE Secur Priv 2(2):36\u201345","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"190_CR4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s00766-003-0183-z","volume":"9","author":"AI Ant\u00f3n","year":"2004","unstructured":"Ant\u00f3n AI, Earp JB (2004) A requirements taxonomy for reducing web site privacy vulnerabilities. Requir Eng J 9(3):169\u2013185","journal-title":"Requir Eng J"},{"key":"190_CR5","doi-asserted-by":"crossref","unstructured":"Aucher G, Boella G, van der Torre L (2010) Privacy policies with modal logic: a dynamic turn. In: Lecture Notes on Computer Science, vol 6181, pp 196\u2013213","DOI":"10.1007\/978-3-642-14183-6_15"},{"key":"190_CR6","volume-title":"The description logic handbook: theory, implementation and applications","year":"2003","unstructured":"Baader F, Calvenese D, McGuiness D (eds) (2003) The description logic handbook: theory, implementation and applications. Cambridge University Press, Cambridge"},{"key":"190_CR7","doi-asserted-by":"crossref","unstructured":"Barth A, Datta A, Mitchell JC, Nissenbaum H (2006) Privacy and contextual integrity: framework and applications. In: IEEE symposium on security and privacy, pp 184\u2013198","DOI":"10.1109\/SP.2006.32"},{"key":"190_CR8","doi-asserted-by":"crossref","unstructured":"Breaux TD, Ant\u00f3n AI (2005) Analyzing goal semantics for rights, permissions, and obligations. In: IEEE international requirements engineering conference, Paris, France, pp 177\u2013186","DOI":"10.1109\/RE.2005.12"},{"issue":"1","key":"190_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"TD Breaux","year":"2008","unstructured":"Breaux TD, Ant\u00f3n AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5\u201320","journal-title":"IEEE Trans Softw Eng"},{"key":"190_CR10","doi-asserted-by":"crossref","unstructured":"Breaux TD, Ant\u00f3n AI, Doyle J (2009) Semantic parameterization: a conceptual modeling process for domain descriptions. ACM Trans Softw Eng Method 18(2) (article 5)","DOI":"10.1145\/1416563.1416565"},{"key":"190_CR11","doi-asserted-by":"crossref","unstructured":"Breaux TD, Vail MW, Ant\u00f3n AI (2006) Towards regulatory compliance: extracting rights and obligations to align requirements with regulations. In: IEEE requirements engineering conference, pp 49\u201358","DOI":"10.1109\/RE.2006.68"},{"issue":"4","key":"190_CR12","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.cose.2010.11.003","volume":"30","author":"TD Breaux","year":"2011","unstructured":"Breaux TD, Baumer DL (2011) Legally \u2018reasonable\u2019 security requirements: a 10-year FTC retrospective. Comput Secur 30(4):178\u2013193","journal-title":"Comput Secur"},{"key":"190_CR13","doi-asserted-by":"crossref","unstructured":"Breaux TD, Rao A (2013) Formal analysis of privacy requirements specifications for multi-tier applications. In: IEEE 21st international requirements engineering conference (to appear)","DOI":"10.1109\/RE.2013.6636701"},{"key":"190_CR14","doi-asserted-by":"crossref","unstructured":"Bradshaw J, Uszok A, Jeffers R, Suri N, Hayes P, Burstein M, Acquisti A, Benyo B, Breedy M, Carvalho M, Diller D, Johnson M, Kulkarni S, Lott J, Sierhuis M, van Hoof R (2003) Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads. In: 2nd International joint conference on autonomous agents and multi agent systems","DOI":"10.1145\/860575.860709"},{"key":"190_CR15","unstructured":"Cranor L et al (2006) Platform for privacy preferences (P3P) specification. W3C working group note"},{"issue":"4","key":"190_CR16","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1037\/h0026256","volume":"70","author":"J Cohen","year":"1968","unstructured":"Cohen J (1968) Weighted kappa: nominal scale agreement with provision for scaled disagreement or partial credit. Psychol Bull 70(4):213\u2013220","journal-title":"Psychol Bull"},{"key":"190_CR17","unstructured":"Dean J, Ghemawat S (2004) MapReduce: simplified data processing on large clusters. In: 6th Symposium on operating system design and implementation"},{"key":"190_CR18","doi-asserted-by":"crossref","unstructured":"DeYoung H, Garg D, Jia L, Kaynar D, Datta A (2010) Experiences in the logical specification of the HIPAA and GLBA privacy laws. In: ACM workshop on privacy in the electronic society, pp 73\u201382","DOI":"10.1145\/1866919.1866930"},{"key":"190_CR19","unstructured":"Farrell CB (2011) FTC charges deceptive privacy practices in Google\u2019s rollout of its buzz social network. In: U.S. Federal Trade Commission News Release, March 30, 2011"},{"key":"190_CR20","doi-asserted-by":"crossref","unstructured":"Hanson C, Berners-Lee T, Kagal L, Sussman GJ, Weitzner D (2007) Data-purpose algebra: modeling data usage policies. In: 8th IEEE workshop on policies for distributed systems and networks, pp 173\u2013177","DOI":"10.1109\/POLICY.2007.14"},{"key":"190_CR21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/BF01531262","volume":"9","author":"JF Horty","year":"1993","unstructured":"Horty JF (1993) Deontic logic as founded in non-monotonic logic. Ann Math Artif Intell 9:69\u201391","journal-title":"Ann Math Artif Intell"},{"key":"190_CR22","unstructured":"Kagal L (2004) A policy-based approach to governing autonomous behavior in distributed environments. Ph.D. Thesis, University of Maryland, Baltimore County"},{"key":"190_CR23","doi-asserted-by":"crossref","unstructured":"Kahmer M, Gilliot M, Muller G (2008) Automating privacy compliance with ExPDT. In: 10th IEEE conference on e-commerce technology, pp 87\u201394","DOI":"10.1109\/CECandEEE.2008.122"},{"key":"190_CR24","volume-title":"Content analysis: an introduction to its methodology","author":"K Krippendorff","year":"2004","unstructured":"Krippendorff K (2004) Content analysis: an introduction to its methodology. Sage, Thousand Oaks"},{"key":"190_CR25","doi-asserted-by":"crossref","unstructured":"Leon PG, Cranor LF, McDonald AM, McGuire R (2010) Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens. In: 9th Workshop on privacy in the electronic society, pp 93\u2013104","DOI":"10.1145\/1866919.1866932"},{"key":"190_CR26","unstructured":"Lin HT, Sirin E (2008) Pellint\u2014a performance lint tool for pellet. In: International workshop on OWL: experiences and directions (OWL-ED 2008)"},{"key":"190_CR27","doi-asserted-by":"crossref","unstructured":"Lupu E, Sloman M, Dulay N, Damianou N (2000) Ponder: realizing enterprise viewpoint concepts. In: 4th International conference on enterprise distributed object computing, Japan, pp 66\u201375","DOI":"10.1109\/EDOC.2000.882345"},{"key":"190_CR28","doi-asserted-by":"crossref","unstructured":"Lutz C, Wolter F, Zakharyashev M (2008) Temporal description logics: a survey. In: 15th IEEE international symposium on temporal representation and reasoning, pp 3\u201314","DOI":"10.1109\/TIME.2008.14"},{"key":"190_CR29","unstructured":"Moses T (ed) (2005) eXtensible Access Control Markup Language (XACML), v.2.0, OASIS Standard"},{"key":"190_CR30","unstructured":"May MJ (2008) Privacy APIs: formal models for analyzing legal and privacy requirements. Ph.D. Thesis, University of Pennsylvania"},{"key":"190_CR31","first-page":"119","volume":"791","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev 791:119\u2013158","journal-title":"Wash Law Rev"},{"key":"190_CR32","unstructured":"Powers C, Schunter M (2003) Enterprise policy authorization language, version 1.2. W3C Member Submission"},{"issue":"1","key":"190_CR33","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park J, Sandhu R (2004) The UCONABC usage control model. ACM Trans Inf Syst Secur 7(1):128\u2013174","journal-title":"ACM Trans Inf Syst Secur"},{"key":"190_CR34","unstructured":"Steel E, Fowler GA (2010) Facebook in privacy breach. Wall Street J. http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304772804575558484075236968"},{"issue":"5","key":"190_CR35","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"Latanya Sweeney","year":"2002","unstructured":"Sweeney Latanya (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"190_CR36","first-page":"419","volume":"2870","author":"G Tonti","year":"2003","unstructured":"Tonti G, Bradshaw JM, Jeffers R, Montanari R, Suri N, Uszok A (2003) Semantic web languages for policy representation and reasoning: a comparison of KAoS, Rei, and Ponder. LNCS 2870:419\u2013437","journal-title":"LNCS"},{"key":"190_CR37","doi-asserted-by":"crossref","unstructured":"Uszok A, Bradshaw JM, Lott J, Breedy M, Bunch L (2008) New developments in ontology-based policy management: increasing the practicality and comprehensiveness of KAoS. In: IEEE workshop on policies for distributed systems and networks, pp 145\u2013152","DOI":"10.1109\/POLICY.2008.47"},{"key":"190_CR38","doi-asserted-by":"crossref","unstructured":"Wan F, Singh MP (2005) Formalizing and achieving multiparty agreements via commitments. In: 4th international joint conference on\u00a0autonomous agents multiagent systems, pp. 770\u2013777","DOI":"10.1145\/1082473.1082591"},{"key":"190_CR39","unstructured":"Yin RK (2009) Case study research, 4th edn. In: Applied social research methods series, v.5. Sage Publications"},{"key":"190_CR40","doi-asserted-by":"crossref","unstructured":"Yu T, Li N, Ant\u00f3n AI (2004) A formal semantics for P3P. ACM workshop on secure web services, pp 1\u20138","DOI":"10.1145\/1111348.1111349"},{"key":"190_CR41","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s00766-010-0108-6","volume":"16","author":"J Young","year":"2011","unstructured":"Young J (2011) Commitment analysis to operationalize software requirements from privacy policies. Requir Eng J 16:33\u201346","journal-title":"Requir Eng J"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0190-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-013-0190-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0190-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:35:42Z","timestamp":1564965342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-013-0190-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,18]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["190"],"URL":"https:\/\/doi.org\/10.1007\/s00766-013-0190-7","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,18]]}}}