{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:59:04Z","timestamp":1725415144776},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/iscc.2007.4381555","type":"proceedings-article","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T21:55:20Z","timestamp":1194990920000},"page":"851-858","source":"Crossref","is-referenced-by-count":1,"title":["PPMLP: A Special Modeling Language Processor for Privacy Policies"],"prefix":"10.1109","author":[{"given":"Weider D.","family":"Yu","sequence":"first","affiliation":[]},{"given":"Savitha","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Link Grammar","year":"2005","author":"lafferty","key":"ref10"},{"journal-title":"Lex-A lexical analyzer generator","year":"0","author":"lesk","key":"ref11"},{"article-title":"Lex & Yacc","year":"1992","author":"levine","key":"ref12"},{"journal-title":"National Privacy Principles (extracted from the Privacy Amendment (private Sector) Act 2000)","year":"0","key":"ref13"},{"journal-title":"Phoenix Health Systems Sample Privacy Policy Template","year":"0","key":"ref14"},{"key":"ref15","first-page":"67","article-title":"A Privacy Assessment Approach for Service Oriented Architecture Applications","author":"yu","year":"2006","journal-title":"The IEEE International Symposium on Service-Oriented System Engineering"},{"key":"ref4","article-title":"UML Overview of the EPAL Syntax","author":"ashley","year":"2003","journal-title":"Enterprise Privacy Authorization Language (EPAL 1 2)"},{"journal-title":"Policy Regarding Protected Health Information and Methods to De-Identify Protected Health Information","year":"2002","key":"ref3"},{"journal-title":"Exploring English","year":"2003","author":"dixon","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073005"},{"key":"ref8","article-title":"Yacc-Yet Another Compiler-Compiler","author":"johnson","year":"1979","journal-title":"UNIX Programmer's Manual"},{"journal-title":"Generally Accepted Privacy Prinicples","year":"0","key":"ref7"},{"article-title":"Compilers: Principles, Techniques, and Tools","year":"1986","author":"aho","key":"ref2"},{"year":"2003","key":"ref1","article-title":"Formatting text using Unix tools: Nroff\/Troff"},{"journal-title":"SPARCLE(Server Privacy Architecture and Capability Enablement) policy workbench","year":"0","author":"karat","key":"ref9"}],"event":{"name":"2007 IEEE Symposium on Computers and Communications","start":{"date-parts":[[2007,7,1]]},"location":"Santiago, Portugal","end":{"date-parts":[[2007,7,4]]}},"container-title":["2007 IEEE Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4381469\/4381470\/04381555.pdf?arnumber=4381555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T21:50:19Z","timestamp":1489701019000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4381555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iscc.2007.4381555","relation":{},"ISSN":["1530-1346"],"issn-type":[{"type":"print","value":"1530-1346"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}