{"id":"https://openalex.org/W1662980175","doi":"https://doi.org/10.1007/978-3-8348-9283-6_5","title":"Identity management and privacy languages technologies: Improving user control of data privacy","display_name":"Identity management and privacy languages technologies: Improving user control of data privacy","publication_year":2009,"publication_date":"2009-03-06","ids":{"openalex":"https://openalex.org/W1662980175","doi":"https://doi.org/10.1007/978-3-8348-9283-6_5","mag":"1662980175"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9283-6_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_5","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041521725","display_name":"Jos\u00e9 Enrique L\u00f3pez Garc\u00eda","orcid":"https://orcid.org/0000-0003-2177-3937"},"institutions":[{"id":"https://openalex.org/I4210134591","display_name":"Telefonica Research and Development","ror":"https://ror.org/03qgzzb04","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210097190","https://openalex.org/I4210134591"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Jos\u00e9 Enrique L\u00f3pez Garc\u00eda","raw_affiliation_strings":["Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U"],"affiliations":[{"raw_affiliation_string":"Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","institution_ids":["https://openalex.org/I4210134591"]},{"raw_affiliation_string":"Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U","institution_ids":["https://openalex.org/I4210134591"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073617227","display_name":"Carlos Alberto Gil Garc\u00eda","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134591","display_name":"Telefonica Research and Development","ror":"https://ror.org/03qgzzb04","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210097190","https://openalex.org/I4210134591"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Carlos Alberto Gil Garc\u00eda","raw_affiliation_strings":["Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U"],"affiliations":[{"raw_affiliation_string":"Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","institution_ids":["https://openalex.org/I4210134591"]},{"raw_affiliation_string":"Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U","institution_ids":["https://openalex.org/I4210134591"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078646482","display_name":"\u00c1lvaro Armenteros Pacheco","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134591","display_name":"Telefonica Research and Development","ror":"https://ror.org/03qgzzb04","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210097190","https://openalex.org/I4210134591"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"\u00c1lvaro Armenteros Pacheco","raw_affiliation_strings":["Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U"],"affiliations":[{"raw_affiliation_string":"Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","institution_ids":["https://openalex.org/I4210134591"]},{"raw_affiliation_string":"Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U","institution_ids":["https://openalex.org/I4210134591"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071724510","display_name":"Pedro Luis Mu\u00f1oz Organero","orcid":null},"institutions":[{"id":"https://openalex.org/I4210134591","display_name":"Telefonica Research and Development","ror":"https://ror.org/03qgzzb04","country_code":"ES","type":"company","lineage":["https://openalex.org/I4210097190","https://openalex.org/I4210134591"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Pedro Luis Mu\u00f1oz Organero","raw_affiliation_strings":["Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U"],"affiliations":[{"raw_affiliation_string":"Network and services security department, Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U, Spain","institution_ids":["https://openalex.org/I4210134591"]},{"raw_affiliation_string":"Telef\u00f3nica Investigaci\u00f3n y Desarrollo S.A.U","institution_ids":["https://openalex.org/I4210134591"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041521725"],"corresponding_institution_ids":["https://openalex.org/I4210134591"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09922873,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"45","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.7445226907730103},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.7102321982383728},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6614824533462524},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6128439903259277},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5918128490447998},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5820804834365845},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5805903077125549},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5549418330192566},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5489219427108765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.502619743347168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4450482726097107},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44154250621795654},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.437139630317688},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.414043664932251},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3236660361289978},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10733386874198914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.058471739292144775}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.7445226907730103},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.7102321982383728},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6614824533462524},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6128439903259277},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5918128490447998},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5820804834365845},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5805903077125549},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5549418330192566},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5489219427108765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.502619743347168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4450482726097107},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44154250621795654},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.437139630317688},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.414043664932251},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3236660361289978},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10733386874198914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.058471739292144775},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9283-6_5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9283-6_5","pdf_url":null,"source":{"id":"https://openalex.org/S4306464255","display_name":"Vieweg+Teubner eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2008 Securing Electronic Business Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W2994243660","https://openalex.org/W2118333568","https://openalex.org/W2132024542","https://openalex.org/W2154524064","https://openalex.org/W576625533","https://openalex.org/W2187353989","https://openalex.org/W2549995367","https://openalex.org/W1965085458"],"abstract_inverted_index":{"The":[0],"identity":[1,62],"management":[2,63],"solutions":[3],"have":[4,73],"the":[5,25],"capability":[6,41],"to":[7,10,35,39,42],"bring":[8],"confidence":[9,15],"internet":[11],"services,":[12],"but":[13],"this":[14,36,72,77],"could":[16,33,85],"be":[17,86],"improved":[18],"if":[19],"user":[20],"has":[21],"more":[22],"control":[23],"over":[24],"privacy":[26,44,65],"policy":[27],"of":[28],"its":[29,40],"attributes.":[30],"Privacy":[31],"languages":[32],"help":[34],"task":[37],"due":[38],"define":[43],"policies":[45],"for":[46,70],"data":[47],"in":[48],"a":[49],"very":[50],"flexible":[51],"way.":[52],"So,":[53],"an":[54],"integration":[55],"problem":[56],"arises:":[57],"making":[58],"work":[59],"together":[60],"both":[61],"and":[64,82],"languages.":[66],"Despite":[67],"several":[68],"proposals":[69],"accomplishing":[71],"already":[74],"been":[75],"defined,":[76],"paper":[78],"suggests":[79],"some":[80],"topics":[81],"improvements":[83],"that":[84],"considered.":[87]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
