{"id":"https://openalex.org/W1921007510","doi":"https://doi.org/10.3233/jcs-2008-16203","title":"Privacy policy enforcement in enterprises with identity management solutions","display_name":"Privacy policy enforcement in enterprises with identity management solutions","publication_year":2008,"publication_date":"2008-01-29","ids":{"openalex":"https://openalex.org/W1921007510","doi":"https://doi.org/10.3233/jcs-2008-16203","mag":"1921007510"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2008-16203","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-16203","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055694969","display_name":"Marco Casassa Mont","orcid":"https://orcid.org/0009-0004-7611-6947"},"institutions":[{"id":"https://openalex.org/I4210156325","display_name":"Hewlett-Packard (United Kingdom)","ror":"https://ror.org/05g4mtv59","country_code":"GB","type":"company","lineage":["https://openalex.org/I1324840837","https://openalex.org/I4210156325"]},{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]}],"countries":["GB","US"],"is_corresponding":true,"raw_author_name":"Marco Casassa Mont","raw_affiliation_strings":["Hewlett-Packard Labs, Filton Road, Stoke Gifford, Bristol, BS34 8QZ, UK. E-mail: marco.casassa-mont@hp.com","(Correspd. Tel.: +44 117 3128795; Fax: +44 117 3129250; E-mail: marco.casassa-mont@hp.com) Hewlett-Packard Labs, Filton Road, Stoke Gifford, Bristol, BS34 8QZ, UK. E-mail: marco.casassa-mont@hp.co ...#TAB#"],"affiliations":[{"raw_affiliation_string":"Hewlett-Packard Labs, Filton Road, Stoke Gifford, Bristol, BS34 8QZ, UK. E-mail: marco.casassa-mont@hp.com","institution_ids":["https://openalex.org/I4210156325"]},{"raw_affiliation_string":"(Correspd. Tel.: +44 117 3128795; Fax: +44 117 3129250; E-mail: marco.casassa-mont@hp.com) Hewlett-Packard Labs, Filton Road, Stoke Gifford, Bristol, BS34 8QZ, UK. E-mail: marco.casassa-mont@hp.co ...#TAB#","institution_ids":["https://openalex.org/I1324840837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068042458","display_name":"Robert Thyne","orcid":null},"institutions":[{"id":"https://openalex.org/I4210127415","display_name":"Hewlett-Packard (Canada)","ror":"https://ror.org/0333dtq15","country_code":"CA","type":"company","lineage":["https://openalex.org/I1324840837","https://openalex.org/I4210127415"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Robert Thyne","raw_affiliation_strings":["Hewlett-Packard (Canada Co.), 901 King Street West, Toronto, M5V 3H5, Canada. E-mail: Robert.thyne@hp.com"],"affiliations":[{"raw_affiliation_string":"Hewlett-Packard (Canada Co.), 901 King Street West, Toronto, M5V 3H5, Canada. E-mail: Robert.thyne@hp.com","institution_ids":["https://openalex.org/I4210127415"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055694969"],"corresponding_institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I4210156325"],"apc_list":null,"apc_paid":null,"fwci":5.1827,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.94856243,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"16","issue":"2","first_page":"133","last_page":"163"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.688887357711792},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6483907103538513},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6139280200004578},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6072051525115967},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5887697339057922},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.5701261162757874},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5647479295730591},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.51887047290802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4735414385795593},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4679765999317169},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.46324622631073},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4528735876083374},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.42338189482688904},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.42236456274986267},{"id":"https://openalex.org/keywords/business-process","display_name":"Business process","score":0.4211776852607727},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3231489658355713},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.27369213104248047},{"id":"https://openalex.org/keywords/work-in-process","display_name":"Work in process","score":0.16403567790985107},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.13035953044891357},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.10366353392601013}],"concepts":[{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.688887357711792},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6483907103538513},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6139280200004578},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6072051525115967},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5887697339057922},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.5701261162757874},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5647479295730591},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.51887047290802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4735414385795593},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4679765999317169},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.46324622631073},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4528735876083374},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.42338189482688904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.42236456274986267},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.4211776852607727},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3231489658355713},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.27369213104248047},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.16403567790985107},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.13035953044891357},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.10366353392601013},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2008-16203","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-16203","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1484037459","https://openalex.org/W1533455393","https://openalex.org/W1538310672","https://openalex.org/W1544517608","https://openalex.org/W1559739109","https://openalex.org/W1568555283","https://openalex.org/W1588245570","https://openalex.org/W1780373960","https://openalex.org/W2000933114","https://openalex.org/W2100719963","https://openalex.org/W2115958335","https://openalex.org/W2127837371","https://openalex.org/W2506501777","https://openalex.org/W2914418376"],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W2994243660","https://openalex.org/W2127837371","https://openalex.org/W2118333568","https://openalex.org/W2132024542","https://openalex.org/W2465865879","https://openalex.org/W2154524064","https://openalex.org/W576625533","https://openalex.org/W4247085996"],"abstract_inverted_index":{"People":[0],"are":[1,82],"usually":[2],"asked":[3],"by":[4,68],"enterprises":[5,45,94],"to":[6,11,24,32,84,88,95,126,146],"disclose":[7],"their":[8,26,59],"personal":[9,42,111],"information":[10,23],"access":[12],"web":[13],"services":[14],"and":[15,50,86,134,143,198],"engage":[16],"in":[17,36,73,75,102,118,153],"business":[18,27],"interactions.":[19],"Enterprises":[20,113],"need":[21],"this":[22],"enable":[25],"processes.":[28],"This":[29,138,187],"is":[30,66,161,189],"unlikely":[31],"change,":[33],"at":[34],"least":[35],"the":[37,104,148,165],"foreseeable":[38],"future.":[39],"When":[40],"collecting":[41],"d":[43],"ata,":[44],"must":[46],"satisfy":[47],"privacy":[48,78,99,107,128,151,158],"laws":[49],"policies":[51,108,152],"along":[52,163],"with":[53,97,164,178],"addressing":[54],"people's":[55],"expectations":[56],"on":[57,109],"how":[58],"data":[60],"should":[61,130],"be":[62],"handled.":[63],"Currently":[64],"much":[65],"done":[67],"means":[69],"of":[70,77,106,150,157,168,176],"manual":[71],"processes,":[72],"particular":[74,103],"terms":[76],"enforcement:":[79],"these":[80,98,136],"processes":[81],"prone":[83],"mistakes":[85],"hard":[87],"comply":[89],"with.":[90],"Automation":[91],"can":[92],"help":[93],"deal":[96],"management":[100,120,129,185],"issues,":[101],"enforcement":[105,149,160],"collected":[110],"data.":[112],"have":[114],"already":[115],"been":[116],"investing":[117],"identity":[119,184],"solutions:":[121],"they":[122],"require":[123],"that":[124],"approaches":[125],"automate":[127,147],"keep":[131],"into":[132],"account":[133],"leverage":[135],"solutions.":[137],"paper":[139],"discusses":[140],"our":[141,195],"research":[142],"development":[144],"work":[145],"enterprises.":[154],"Our":[155],"model":[156],"policy":[159],"introduced":[162],"technical":[166],"details":[167],"a":[169,174,182],"related":[170],"prototype,":[171],"integrated":[172],"(as":[173],"proof":[175],"concept)":[177],"HP":[179],"Select":[180],"Access,":[181],"state-of-the-art":[183],"solution.":[186],"technology":[188],"currently":[190],"under":[191],"productisation.":[192],"We":[193],"discuss":[194],"current":[196],"results":[197],"next":[199],"steps.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
