{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:47:09Z","timestamp":1726408029572},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030459888"},{"type":"electronic","value":"9783030459895"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45989-5_11","type":"book-chapter","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:10:08Z","timestamp":1587683408000},"page":"130-141","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Toward GDPR Compliance in IoT Systems"],"prefix":"10.1007","author":[{"given":"Sahar","family":"Allegue","sequence":"first","affiliation":[]},{"given":"Mouna","family":"Rhahla","sequence":"additional","affiliation":[]},{"given":"Takoua","family":"Abdellatif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,24]]},"reference":[{"key":"11_CR1","unstructured":"GDPR. \nhttps:\/\/gdpr-info.eu\/\n\n. Acessed 22 Aug 2019"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-540-88808-6_2","volume-title":"Rule Representation, Interchange and Reasoning on the Web","author":"D Luckham","year":"2008","unstructured":"Luckham, D.: The power of events: an introduction to complex event processing in distributed enterprise systems. In: Bassiliades, N., Governatori, G., Paschke, A. (eds.) RuleML 2008. LNCS, vol. 5321, p. 3. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88808-6_2"},{"key":"11_CR3","volume-title":"Event Processing in Action","author":"O Etzion","year":"2010","unstructured":"Etzion, O., Niblett, P.: Event Processing in Action, 1st edn. Manning Publications, Greenwich (2010)","edition":"1"},{"key":"11_CR4","unstructured":"Verma, H., Jain, M., Goel, K., Vikram, A., Verma, G.: Smart home system based on Internet of Things. In: 3rd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 2073\u20132075. IEEE, New Delhi (2016)"},{"issue":"3","key":"11_CR5","first-page":"254","volume":"2","author":"P Pham","year":"2019","unstructured":"Pham, P.: The applicability of the GDPR to the Internet of Things. J. Data Prot. Priv. 2(3), 254\u2013263 (2019)","journal-title":"J. Data Prot. Priv."},{"key":"11_CR6","unstructured":"Vargas, J.C.: Blockchain-based consent manager for GDPR compliance. In: Open Identity Summit 2019. Gesellschaft f\u00fcr Informatik, Bonn (2019)"},{"key":"11_CR7","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union. L119, 1\u201388 (2016)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Seo, J., Kim, K., Park, M., Park, M., Lee, K.: An analysis of economic impact on IoT under GDPR. In: 2017 International Conference on Information and Communication Technology Convergence (ICTC), pp. 879\u2013881. IEEE, Jeju, South Korea (2017)","DOI":"10.1109\/ICTC.2017.8190804"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1016\/j.clsr.2018.02.002","volume":"34","author":"S Wachter","year":"2018","unstructured":"Wachter, S.: Normative challenges of identification in the Internet of Things: privacy, profiling, discrimination, and the GDPR. Comput. Law Secur. Rev. 34(3), 436\u2013449 (2018)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1080\/17579961.2018.1527479","volume":"10","author":"S Wachter","year":"2018","unstructured":"Wachter, S.: The GDPR and the Internet of Things: a three-step transparency model. Law Innov. Technol. 10(2), 266\u2013294 (2018)","journal-title":"Law Innov. Technol."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Cunche, M., Le Metayer, D., Morel, V.: Enhancing transparency and consent in the IoT. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 116\u2013119. IEEE, London, UK (2018)","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Chen, C., Fu, H., Sung, T., Wang, P., Jou, E., Feng, M.: Complex event processing for the Internet of Things and its applications. In: 2014 IEEE International Conference on Automation Science and Engineering (CASE), pp. 1144\u20131149. IEEE, Taipei, Taiwan (2014)","DOI":"10.1109\/CoASE.2014.6899470"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Jun, C., Chi, C.: Design of complex event-processing IDS in Internet of Things. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 226\u2013229. IEEE, Zhangjiajie, China (2014)","DOI":"10.1109\/ICMTMA.2014.57"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5121\/ijccsa.2017.7602","volume":"7","author":"M Kaya","year":"2017","unstructured":"Kaya, M., Cetin-Kaya, Y.: Complex event processing using IOT devices based on Arduino. Int. J. Cloud Comput. Serv. Architect. IJCCSA 7, 13\u201324 (2017)","journal-title":"Int. J. Cloud Comput. Serv. Architect. IJCCSA"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Nocera, F., Di Noia, T., Mongiello, M., Di Sciascio, E.: Semantic IoT middleware-enabled mobile complex event processing for integrated pest management. In: 7th International Conference on Cloud Computing and Services Science (2017)","DOI":"10.5220\/0006369506380645"},{"key":"11_CR16","series-title":"Modeling and Optimization in Science and Technologies","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-09177-8_11","volume-title":"Modeling and Processing for Next-Generation Big-Data Technologies","author":"M Strohbach","year":"2015","unstructured":"Strohbach, M., Ziekow, H., Gazis, V., Akiva, N.: Towards a big data analytics framework for iot and smart city applications. In: Xhafa, F., Barolli, L., Barolli, A., Papajorgji, P. (eds.) Modeling and Processing for Next-Generation Big-Data Technologies. MOST, vol. 4, pp. 257\u2013282. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-09177-8_11"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-030-41568-6_14","volume-title":"Risks and Security of Internet and Systems","author":"M Rhahla","year":"2020","unstructured":"Rhahla, M., Allegue, S., Abdellatif, T.: A framework for GDPR compliance in big data systems. In: Kallel, S., Cuppens, F., Cuppens-Boulahia, N., Hadj Kacem, A. (eds.) CRiSIS 2019. LNCS, vol. 12026, pp. 211\u2013226. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-41568-6_14"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Boubeta-Puig, J., Ortiz, G., Medina-Bulo, I.: Approaching the Internet of Things through integrating SOA and complex event processing. In: Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, pp. 304\u2013323. IGI Global (2014)","DOI":"10.4018\/978-1-4666-5884-4.ch014"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3991\/ijoe.v11i2.3842","volume":"11","author":"L Lan","year":"2015","unstructured":"Lan, L., Wang, B., Zhang, L., Shi, R., Li, F.: An event-driven service-oriented architecture for Internet of Things service execution. Int. J. Online Eng. (iJOE) 11, 4 (2015)","journal-title":"Int. J. Online Eng. (iJOE)"},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MCE.2016.2590099","volume":"5","author":"P Corcoran","year":"2016","unstructured":"Corcoran, P., Datta, K.: Mobile-edge computing and the Internet of Things for consumers: extending cloud computing and services to the edge of the network. IEEE Consum. Electron. Mag. 5(4), 73\u201374 (2016)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"11_CR21","unstructured":"Esper. \nhttp:\/\/www.espertech.com\/\n\n. Accessed 19 Aug 2019"},{"key":"11_CR22","unstructured":"Flink Gelly API. \nhttps:\/\/flink.apache.org\/news\/2015\/08\/24\/introducing-flink-gelly.html\n\n. Accessed 29 Aug 2019"},{"key":"11_CR23","unstructured":"WSO2 CEP. \nhttps:\/\/wso2.com\/products\/complex-event-processor\/\n\n. Accessed 19 Aug 2019"},{"key":"11_CR24","unstructured":"Kibana. \nhttps:\/\/www.elastic.co\/fr\/products\/kibana\n\n. Accessed 19 Aug 2019"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Apache Flink. \nhttps:\/\/ci.apache.org\/projects\/flink\/flink-docs-release-1.8\/\n\n. Accessed 19 Aug 2019","DOI":"10.1007\/978-3-319-63962-8_303-1"},{"key":"11_CR26","unstructured":"Platform for Privacy Preferences (P3P). \nhttps:\/\/www.w3.org\/P3P\/\n\n. Accessed 26 Aug 2019"},{"key":"11_CR27","unstructured":"Security Assertion Markup Language (SAML). \nhttp:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.html\n\n. Accessed 26 Aug 2019"},{"key":"11_CR28","unstructured":"EXtensible Access Control Markup Language (XACML). \nhttp:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html\n\n. Accessed 26 Aug 2019"},{"key":"11_CR29","unstructured":"Dynamic Tables. \nhttps:\/\/ci.apache.org\/projects\/flink\/flink-docs-stable\/dev\/table\/streaming\/dynamic_tables.html\n\n. Accessed 27 Aug 2019"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-91764-1_4","volume-title":"Service-Oriented Computing \u2013 ICSOC 2017 Workshops","author":"T Abdellatif","year":"2018","unstructured":"Abdellatif, T., Bozga, M.: An end-to-end security model for adaptive service-oriented applications. In: Braubach, L., Murillo, J.M., Kaviani, N., Lama, M., Burgue\u00f1o, L., Moha, N., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10797, pp. 43\u201354. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-91764-1_4"},{"key":"11_CR31","unstructured":"Java-vault-driver. \nhttps:\/\/bettercloud.github.io\/vault-java-driver\/\n\n. Accessed 26 Aug 2019"},{"issue":"1","key":"11_CR32","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s40860-018-0054-5","volume":"4","author":"A Crabtree","year":"2018","unstructured":"Crabtree, A., et al.: Building accountability into the Internet of Things: the IoT databox model. J. Reliable Intell. Environ. 4(1), 39\u201355 (2018). \nhttps:\/\/doi.org\/10.1007\/s40860-018-0054-5","journal-title":"J. Reliable Intell. Environ."},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Rhahla, M., Abdellatif, T., Attia, R., Berrayana, W.: A GDPR controller for IoT systems: application to e-Health. In: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) (2019)","DOI":"10.1109\/WETICE.2019.00044"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-030-12942-2_23","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"K Rantos","year":"2019","unstructured":"Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., Papanikolaou, A., Kritsas, A.: ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology. In: Lanet, J.-L., Toma, C. (eds.) SECITC 2018. LNCS, vol. 11359, pp. 300\u2013313. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-12942-2_23"},{"key":"11_CR35","unstructured":"Vault. \nhttps:\/\/www.vaultproject.io\n\n. Accessed 01 Aug 2019"},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Dhillon, A., Majumdar, S., St-Hilaire, M., El-Haraki, A.: A mobile complex event processing system for remote patient monitoring. In: IEEE International Congress on Internet of Things (ICIOT) (2018)","DOI":"10.1109\/ICIOT.2018.00034"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing \u2013 ICSOC 2019 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45989-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T23:12:15Z","timestamp":1587683535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45989-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030459888","9783030459895"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45989-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Service-Oriented Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsoc-laas.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conftool pro","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7 posters + 2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}