{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:29:30Z","timestamp":1725773370999},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,30]]},"DOI":"10.1145\/3341105.3375764","type":"proceedings-article","created":{"date-parts":[[2020,3,29]],"date-time":"2020-03-29T12:13:52Z","timestamp":1585484032000},"page":"1288-1296","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Towards application-layer purpose-based access control"],"prefix":"10.1145","author":[{"given":"Frank","family":"Pallas","sequence":"first","affiliation":[{"name":"Information Systems Engineering Research Group, Berlin, Germany"}]},{"given":"Max-R.","family":"Ulbricht","sequence":"additional","affiliation":[{"name":"Information Systems Engineering Research Group, Berlin, Germany"}]},{"given":"Stefan","family":"Tai","sequence":"additional","affiliation":[{"name":"Information Systems Engineering Research Group, Berlin, Germany"}]},{"given":"Thomas","family":"Peikert","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Marcel","family":"Reppenhagen","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Daniel","family":"Wenzel","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Paul","family":"Wille","sequence":"additional","affiliation":[{"name":"TU Berlin"}]},{"given":"Karl","family":"Wolf","sequence":"additional","affiliation":[{"name":"TU Berlin"}]}],"member":"320","published-online":{"date-parts":[[2020,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hippocratic Databases. In Proceedings of the 28th International Conference on Very Large Data Bases. VLDB Endowment","author":"Agrawal Rakesh","year":"2002","unstructured":"Rakesh Agrawal , Jerry Kiernan , Ramakrishnan Srikant , and Yirong Xu . 2002 . Hippocratic Databases. In Proceedings of the 28th International Conference on Very Large Data Bases. VLDB Endowment , Hong Kong, China, 143--154. http:\/\/dl.acm.org\/citation.cfm?id=1287369.1287383 Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. 2002. Hippocratic Databases. In Proceedings of the 28th International Conference on Very Large Data Bases. VLDB Endowment, Hong Kong, China, 143--154. http:\/\/dl.acm.org\/citation.cfm?id=1287369.1287383"},{"key":"e_1_3_2_1_2_1","volume-title":"Web Services: Concepts, Architectures and Applications","author":"Alonso Gustavo","year":"2004","unstructured":"Gustavo Alonso , Fabio Casati , Harumi Kuno , and Vijay Machiraju . 2004 . Web Services: Concepts, Architectures and Applications . Springer-Verlag , Berlin Heidelberg . https:\/\/www.springer.com\/de\/book\/9783540440086 Gustavo Alonso, Fabio Casati, Harumi Kuno, and Vijay Machiraju. 2004. Web Services: Concepts, Architectures and Applications. Springer-Verlag, Berlin Heidelberg. https:\/\/www.springer.com\/de\/book\/9783540440086"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jasmin Azemovi\u0107. 2012. Data Privacy in SQL Server Based on Hippocratic Database Principles. http:\/\/blogs.msdn.com\/b\/mvpawardprogram\/archive\/2012\/07\/30\/data-privacy-in-sql-server-based-on-hippocratic-database-principles.aspx Jasmin Azemovi\u0107. 2012. Data Privacy in SQL Server Based on Hippocratic Database Principles. http:\/\/blogs.msdn.com\/b\/mvpawardprogram\/archive\/2012\/07\/30\/data-privacy-in-sql-server-based-on-hippocratic-database-principles.aspx","DOI":"10.1145\/2371316.2371344"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1989.65127"},{"volume-title":"Database Systems for Advanced Applications (Lecture Notes in Computer Science)","author":"Bertino Elisa","key":"e_1_3_2_1_5_1","unstructured":"Elisa Bertino . 2005. Purpose Based Access Control for Privacy Protection in Database Systems . In Database Systems for Advanced Applications (Lecture Notes in Computer Science) , Lizhu Zhou, Beng Chin Ooi, and Xiaofeng Meng (Eds.). Springer Berlin Heidelberg , Beijing, China , 2--2. Elisa Bertino. 2005. Purpose Based Access Control for Privacy Protection in Database Systems. In Database Systems for Advanced Applications (Lecture Notes in Computer Science), Lizhu Zhou, Beng Chin Ooi, and Xiaofeng Meng (Eds.). Springer Berlin Heidelberg, Beijing, China, 2--2."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063998"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2497680"},{"key":"e_1_3_2_1_9_1","unstructured":"European Parliament & Council. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:31995L0046&from=en European Parliament & Council. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:31995L0046&from=en"},{"key":"e_1_3_2_1_10_1","volume-title":"Official Journal of the European Union L 119\/1","author":"European Parliament & Council. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"European Parliament & Council. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L 119\/1 ( 2016 ), 1--88. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32016R0679 European Parliament & Council. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L 119\/1 (2016), 1--88. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32016R0679"},{"volume-title":"Patterns of Enterprise Application Architecture (01 ed.)","author":"Fowler Martin","key":"e_1_3_2_1_11_1","unstructured":"Martin Fowler . 2003. Patterns of Enterprise Application Architecture (01 ed.) . Addison Wesley , Boston . Martin Fowler. 2003. Patterns of Enterprise Application Architecture (01 ed.). Addison Wesley, Boston."},{"key":"e_1_3_2_1_12_1","unstructured":"Martin Fowler. 2015. PresentationDomainDataLayering. https:\/\/martinfowler.com\/bliki\/PresentationDomainDataLayering.html Martin Fowler. 2015. PresentationDomainDataLayering. https:\/\/martinfowler.com\/bliki\/PresentationDomainDataLayering.html"},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy Online: A Report to Congress. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/privacy-online-report-congress\/priv-23a.pdf","author":"FTC.","year":"1998","unstructured":"FTC. 1998 . Privacy Online: A Report to Congress. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/privacy-online-report-congress\/priv-23a.pdf FTC. 1998. Privacy Online: A Report to Congress. https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/privacy-online-report-congress\/priv-23a.pdf"},{"volume-title":"The Pragmatic Programmer. From Journeyman to Master (01 ed.)","author":"Hunt Andrew","key":"e_1_3_2_1_14_1","unstructured":"Andrew Hunt , David Thomas , and Ward Cunningham . 1999. The Pragmatic Programmer. From Journeyman to Master (01 ed.) . Addison Wesley , Reading, Mass . Andrew Hunt, David Thomas, and Ward Cunningham. 1999. The Pragmatic Programmer. From Journeyman to Master (01 ed.). Addison Wesley, Reading, Mass."},{"key":"e_1_3_2_1_15_1","unstructured":"ISO. 2011. ISO\/IEC 29100:2011-Information Technology - Security Techniques - Privacy Framework. ISO. 2011. ISO\/IEC 29100:2011-Information Technology - Security Techniques - Privacy Framework."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.55"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Yasin Laura-Silva and Walid Aref. 2006. Realizing Privacy-Preserving Features in Hippocratic Databases. http:\/\/docs.lib.purdue.edu\/cstech\/1665 Yasin Laura-Silva and Walid Aref. 2006. Realizing Privacy-Preserving Features in Hippocratic Databases. http:\/\/docs.lib.purdue.edu\/cstech\/1665","DOI":"10.1109\/ICDEW.2007.4400992"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316701"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 2nd International Conference on Information Technology for Application. unknown","author":"Lin Qiang","year":"2004","unstructured":"Qiang Lin . 2004 . Defense In-Depth to Achieve \"Unbreakable\" Database Security . In Proceedings of the 2nd International Conference on Information Technology for Application. unknown , Harbin, China, 386--390. Qiang Lin. 2004. Defense In-Depth to Achieve \"Unbreakable\" Database Security. In Proceedings of the 2nd International Conference on Information Technology for Application. unknown, Harbin, China, 386--390."},{"key":"e_1_3_2_1_20_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Mehta Aastha","year":"2017","unstructured":"Aastha Mehta , Eslam Elnikety , Katura Harvey , Deepak Garg , and Peter Druschel . 2017 . Qapla: Policy compliance for database-backed systems . In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 1463--1479. Aastha Mehta, Eslam Elnikety, Katura Harvey, Deepak Garg, and Peter Druschel. 2017. Qapla: Policy compliance for database-backed systems. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 1463--1479."},{"key":"e_1_3_2_1_21_1","unstructured":"OECD. 1980. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD. 1980. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data."},{"key":"e_1_3_2_1_22_1","unstructured":"OECD. 2013. THE OECD PRIVACY FRAMEWORK. http:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf OECD. 2013. THE OECD PRIVACY FRAMEWORK. http:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.126"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019654"},{"key":"e_1_3_2_1_25_1","volume-title":"Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes. In 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus","author":"Pallas Frank","year":"2018","unstructured":"Frank Pallas and Martin Grambow . 2018 . Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes. In 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2018. Springer, Regensburg, Germany, 39--54. Frank Pallas and Martin Grambow. 2018. Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes. In 15th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2018. Springer, Regensburg, Germany, 39--54."},{"key":"e_1_3_2_1_26_1","volume-title":"Architectural Patterns: Uncover essential patterns in the most indispensable realm of enterprise architecture (1 ed.)","author":"Raj Pethuru","year":"2017","unstructured":"Pethuru Raj , Anupama Raman , and Harihara Subramanian . 2017 . Architectural Patterns: Uncover essential patterns in the most indispensable realm of enterprise architecture (1 ed.) . Packt Publishing , Birmingham, UK . Pethuru Raj, Anupama Raman, and Harihara Subramanian. 2017. Architectural Patterns: Uncover essential patterns in the most indispensable realm of enterprise architecture (1 ed.). Packt Publishing, Birmingham, UK."},{"volume-title":"Software Architecture Patterns","author":"Richards Mark","key":"e_1_3_2_1_27_1","unstructured":"Mark Richards . 2015. Software Architecture Patterns . O'Reilly Media, Inc. , Sebastopol, USA. Mark Richards. 2015. Software Architecture Patterns. O'Reilly Media, Inc., Sebastopol, USA."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266846"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03345-6_2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1114223.1114237"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Ulbricht R","key":"e_1_3_2_1_32_1","unstructured":"Max- R Ulbricht and Frank Pallas . 2018. YaPPL-A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , Barcelona, Spain , 329--344. Max-R Ulbricht and Frank Pallas. 2018. YaPPL-A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, Barcelona, Spain, 329--344."}],"event":{"name":"SAC '20: The 35th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Brno Czech Republic","acronym":"SAC '20"},"container-title":["Proceedings of the 35th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341105.3375764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T23:56:30Z","timestamp":1693353390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341105.3375764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,30]]},"references-count":32,"alternative-id":["10.1145\/3341105.3375764","10.1145\/3341105"],"URL":"https:\/\/doi.org\/10.1145\/3341105.3375764","relation":{},"subject":[],"published":{"date-parts":[[2020,3,30]]},"assertion":[{"value":"2020-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}