{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:54:34Z","timestamp":1726361674648},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319471655"},{"type":"electronic","value":"9783319471662"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47166-2_65","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T18:07:34Z","timestamp":1475604454000},"page":"942-957","source":"Crossref","is-referenced-by-count":18,"title":["A Privacy-Aware Conceptual Model for Handling Personal Data"],"prefix":"10.1007","author":[{"given":"Thibaud","family":"Antignac","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"65_CR1","unstructured":"Abe, A., Simpson, A.: Formal models for privacy. In: EDBT\/ICDT Workshops. CEUR Workshop Proceedings, vol. 1558 (2016). CEUR-WS.org"},{"issue":"4","key":"65_CR2","first-page":"701","volume":"16","author":"J Bambauer","year":"2014","unstructured":"Bambauer, J., Muralidhar, K., Sarathy, R.: Fool\u2019s gold: an illustrated critique of differential privacy. Vanderbilt J. Entert. Tech. Law 16(4), 701\u2013755 (2014)","journal-title":"Vanderbilt J. Entert. Tech. Law"},{"key":"65_CR3","doi-asserted-by":"crossref","unstructured":"Cavoukian, A.: Privacy by design: origins, meaning, and prospects. In: Privacy Protection Measures and Technologies in Business Organisation: Aspects and Standards, p. 170 (2011)","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"issue":"5","key":"65_CR4","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1145\/1067625.806556","volume":"11","author":"E Cohen","year":"1977","unstructured":"Cohen, E.: Information transmission in computational systems. SIGOPS Oper. Syst. Rev. 11(5), 133\u2013139 (1977)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"65_CR5","unstructured":"D\u2019Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y.A., Bourka, A.: Privacy by design in big data. ENISA report, December 2015"},{"key":"65_CR6","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le M\u00e9tayer, D., Tirtea, R., Schiffner, S.: Privacy and data protection by design. ENISA report, January 2015"},{"issue":"1","key":"65_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2010","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3\u201332 (2010)","journal-title":"Requirements Eng."},{"key":"65_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential Privacy: Now it\u2019s Getting Personal. In: POPL 2015, pp. 69\u201381. ACM (2015)","DOI":"10.1145\/2775051.2677005"},{"key":"65_CR10","unstructured":"European Commission: Proposal for a general data protection regulation. In: Codecision Legislative Procedure for a Regulation 2012\/0011 (COD). European Commission, Brussels, Belgium, January 2012"},{"key":"65_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/b95112","volume-title":"Coloured Petri Nets: Modelling and Validation of Concurrent Systems","author":"K Jensen","year":"2009","unstructured":"Jensen, K., Kristensen, L.M.: Coloured Petri Nets: Modelling and Validation of Concurrent Systems. Springer Science & Business Media, Heidelberg (2009)"},{"key":"65_CR12","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: ACM SIGMOD 2009, pp. 19\u201330. ACM (2009)","DOI":"10.1145\/1559845.1559850"},{"issue":"9","key":"65_CR13","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson, S., Mont, M.C.: Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput. 44(9), 60\u201368 (2011)","journal-title":"IEEE Comput."},{"key":"65_CR14","unstructured":"Petri, C.A.: Kommunikation mit automaten. Ph.D. thesis, Institut f\u00fcr instrumentelle Mathematik, Bonn (1962)"},{"volume-title":"Threat Modeling: Designing for Security","year":"2014","author":"A Shostack","key":"65_CR15","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"issue":"2","key":"65_CR16","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1147\/sj.132.0115","volume":"13","author":"WP Stevens","year":"1974","unstructured":"Stevens, W.P., Myers, G.J., Constantine, L.L.: Structured design. IBM Syst. J. 13(2), 115\u2013139 (1974)","journal-title":"IBM Syst. J."},{"key":"65_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"MC Tschantz","year":"2009","unstructured":"Tschantz, M.C., Wing, J.M.: Formal methods for privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1\u201315. Springer, Heidelberg (2009)"},{"key":"65_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-31456-3_12","volume-title":"Privacy Technologies and Policy","author":"P Tsormpatzoudi","year":"2016","unstructured":"Tsormpatzoudi, P., Berendt, B., Coudert, F.: Privacy by design: from research and policy to practice\u2013 the challenge of multi-disciplinarity. In: Berendt, B., et al. (eds.) APF 2015. LNCS, vol. 9484, pp. 199\u2013212. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-31456-3_12"},{"key":"65_CR19","doi-asserted-by":"crossref","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. In: Harvard Law Review, pp. 193\u2013220 (1890)","DOI":"10.2307\/1321160"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47166-2_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T04:10:43Z","timestamp":1568434243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47166-2_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471655","9783319471662"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47166-2_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}