Demchenko, Y., Koeroo, O., de Laat, C. & Sagehaug, H.,
2008. Extending XACML authorisation model to
support policy obligations handling in distributed
applications. In Proceedings of the 6th International
Workshop on Middleware for Grid Computing, ACM.
EC.Directive 95/46/ECofthe European Parliament and of
the Council.,1995 (cited 2010). Available online from:
http://ec.europa.eu/justice/policies/privacy/law/index_e
n.htm#directive.
Gowadia, V., Scalavino, E., Lupu, E. & Aziz, B., 2008.
The Consequence Project, Deliverable D3.1: Models
and framework for Meta-data generation and policy
infrastructure. [Online] Available at: http://www.
consequenceproject.eu/ Deliverables_Y1/D3.1.pdf.
Gruber, T. R., 1995. Toward principles for the design of
ontologies used for knowledge sharing. International
Journal of Human-Computer Studies, 43(4-5),pp. 907--
928.
Horrocks, I. et al., 2004. SWRL: A Semantic Web Rule
Language Combining OWL and RuleML. [Online]
W3C Available at: http://www.w3.org/Submission
/SWRL/ [Accessed 2013].
Italian Personal Data Protection Code, 2003. Legislative
Decreeno. 196 of 30 June 2003. Online; 2003 (cited
2012). Available from: http://www.privacy.it/
privacycode-en.html.
Iversen A., Liddell K., Fear N., Hotopf M., Wessely S.
Consent, 2006. Confidentiality and the Data Protection
Act, British Medical Journal (Clinical Research Ed),
332 (7534):165–169.
Jeremy W. Bryans, John S. Fitzgerald, 2007. Formal
engineering of XACML access control policies in
VDM++, Proceedings of the formal engineering
methods 9th international conference on Formal
methods and software engineering, November 14-15,
Boca Raton, FL, USA.
Kolosvki, V. 2008. Logic-based Framework For Web
Access Control Policies, PhD Thesis, Digital
Repository at the University of Maryland, College
Park, Md.
Kolovski, V. & Hendler, J., 2008. XACML policy analysis
using description logics, [Online] Available at:
http://www.mindswap.org/kolovski/KolovskiXACM
LAnalysis- JCSSubmission.pd [Accessed 2012].
Kolovski, V., 2006. Formalizing XACML Using
Defeasible Description Logics. Technical Report TR-
233-11, University of Maryland, College Park.
Masi, M., Pugliese, R., Tiezzi, F., 2012. Formalisation and
Implementation of the XACML Access Control
Mechanism, In ESSoS. LNCS 7159, 60-74, Springer.
Matteucci, I., Petrocchi, M. & Sbodio, M.L., 2010.
CNL4DSA – a Controlled Natural Language for Data
Sharing Agreements, In Proceedings of the 2010 ACM
Symposium on Applied Computing, Sierre, Switzerland,
ACM.
McCullagh, K., 2006. Study of data protection:
harmonization or confusion? In Proceeding of the 21st
BILETA Conference: Globalisationand Harmonisation
in Technology Law, Malta.
Muppavarapu, V. & Chung, S.M., 2008. Semantic-Based
Access Control for Grid Data Resources in Open Grid
Services Architecture - Data Access and Integration
(OGSA-DAI), in 20th IEEE International Conference
on Tools with Artificia lIntelligence (ICTAI 2008),
Dayton, Ohio, USA, 2008. IEEE Computer Society.
OASIS XACML, 2005. eXtensible Access Control Markup
Language (XACML), Version 2.0 (2005), Available
online at http://docs.oasisopen.org/xacml/2.0/XACML-
2.0-OS NORMATIVE.zip.
OASIS XACML, 2013. eXtensible Access Control Markup
Language (XACML), Version 3.0, http://docs.oasis-
open.org /xacml/3.0/xacml-3.0-core-spec-os-en.pdf
[Accessed 2013].
OCSI: The Open Cloud Standards Incubator, 2010.
Architecture for Managing Clouds, White Paper from
the Open Cloud Standards Incubator 1.0, DMTF DSP-
IS0102, [Online] Available at: http://www.dmtf.org/
standards/published_ documents/DSP-IS0101_1.0.pdf.
Ontario, 2008. Freedom of Information and Protection of
Privacy Act, [Online] Available at: http://www.elaws.
gov.on.ca/html/statutes/english/elaws_statutes_90f31_e
.htm [Accessed 2013].
Powers, C., Adler, S. & Wishart, B., 2004. EPAL
Translation of the Freedom of Information and
Protection of Privacy Act, White Paper IBM Tivoli and
Information and Privacy Commissioner, Ontario.
Priebe et al., 2006. Mitigate Content-Related Risks With
Enterprise Rights Management. Trends. Forrester
Research.
Rahmouni H. B. , Solomonides T., Casassa Mont M, Shiu
S., 2010. Privacy compliance and enforcement on
European Healthgrids: an approach through ontology.
Philosophical Transactions of the RoyalSociety, 368:
pp 4057–4072.
Rahmouni H. B., Solomonides T., Mont M. Casassa, Shiu
S, Rahmouni M. A., 2011, Modeldriven Privacy
Compliance Decision Support for Medical Data
Sharing in Europe. Methods Inf Med. 2011 Aug
15;50(4):326–36.
Rahmouni, H. B., Solomonides, T., Casassa Mont, M. &
Shiu, S., 2011. Ontology Based Privacy Compliance
for Health Data Disclosure in Europe. PhD Thesis,
University of the West of England, Bristol, UK.
Sommer, D., Casassa Mont, M. & Pearson, S., 2008.
PRIME Architecture V3. Deliverable 14.2.d. [Online]
Available at: https://www.primeproject.eu/prime_
products/reports/arch/pub_del_D14.2.d_ec_WP14.2_v
3_Final.pdf [Accessed 2013]
Wang, K., Billington, D., Blee, J. & Antoniou, G., 2004.
Combining Description Logic and Defeasible Logic for
the Semantic Web. In Rules and Rule Markup
Languages for the Semantic Web: Third International
Workshop, RuleML. Hiroshima, Japan, Springer.
ASWRLBridgetoXACMLforCloudsPrivacyCompliantPolicies
37