{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:48:37Z","timestamp":1729648117347,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/cloudcom.2016.0063","type":"proceedings-article","created":{"date-parts":[[2017,1,26]],"date-time":"2017-01-26T18:11:33Z","timestamp":1485454293000},"page":"360-365","source":"Crossref","is-referenced-by-count":4,"title":["Supporting Model-Based Privacy Analysis by Exploiting Privacy Level Agreements"],"prefix":"10.1109","author":[{"given":"Amir Shayan","family":"Ahmadian","sequence":"first","affiliation":[]},{"given":"Jan","family":"Jurjens","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.5071532"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/jebr.2009040104"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44618-4_29"},{"key":"ref11","first-page":"489","article-title":"Security modelling for electronic commerce: The Common Electronic Purse Specifications","author":"jurjens","year":"2001","journal-title":"First IFIP Conference on e-Commerce e-Business and e-Government (I3E)"},{"key":"ref12","first-page":"93","article-title":"Modelling audit security for smart-card payment schemes with UMLsec","author":"j\u00fcrjens","year":"2001","journal-title":"16th International Conference on Information Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989840"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-147-6.ch009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1217010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140508"},{"key":"ref18","article-title":"Key issues of a formally based process model for security engineering","author":"breu","year":"2003","journal-title":"Sixteenth International Conference “Software & Systems Engineering & their Applications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0141-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.72"},{"year":"0","key":"ref4"},{"journal-title":"International Organization for Standardization Geneva Switzerland ISO 27001 2013","article-title":"ISO\/IEC 27001 Information Security Management System (ISMS) standard","year":"2013","key":"ref27"},{"journal-title":"Vision project","year":"2016","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11554578_2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-010-0154-z"},{"journal-title":"Secure Systems Development with UML","year":"2005","author":"j\u00fcrjens","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368228"},{"year":"2011","key":"ref7","article-title":"UML 2.4.1 Superstructure Specification"},{"year":"0","key":"ref2","article-title":"Privacy Level Agreement [V2]: A compliance tool for providing cloud services in the european union"},{"journal-title":"CARiSMA","year":"2016","key":"ref9"},{"year":"2010","key":"ref1","article-title":"Personal data in the cloud: The importance of trust"},{"key":"ref20","article-title":"Council of the European Union “Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"l 281","author":"parliament","year":"1995","journal-title":"Official Journal of the European Union"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02843-4_7"},{"key":"ref21","article-title":"Regulation (EU) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data","volume":"l 119","year":"2016","journal-title":"Official Journal of the European Union"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.356"},{"key":"ref26","first-page":"80","author":"ahmadian","year":"2016","journal-title":"Supporting the Security Certification and Privacy Level Agreements in the Context of Clouds"},{"key":"ref25","first-page":"84","author":"jin","year":"2012","journal-title":"RABAC Role-Centric Attribute-Based Access Control"}],"event":{"name":"2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)","start":{"date-parts":[[2016,12,12]]},"location":"Luxembourg, Luxembourg","end":{"date-parts":[[2016,12,15]]}},"container-title":["2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7823365\/7830561\/07830704.pdf?arnumber=7830704","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:39:44Z","timestamp":1506980384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7830704\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cloudcom.2016.0063","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}