{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:15:31Z","timestamp":1730211331246,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Research Council of Norway","doi-asserted-by":"publisher","award":["248113"],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919687","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"112-129","source":"Crossref","is-referenced-by-count":7,"title":["DPL: A Language for GDPR Enforcement"],"prefix":"10.1109","author":[{"given":"Farzane","family":"Karami","sequence":"first","affiliation":[{"name":"University of Oslo,Dept. of Informatics,Oslo,Norway"}]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[{"name":"ETH Zurich,Dept. of Computer Science,Zurich,Switzerland"}]},{"given":"Einar Broch","family":"Johnsen","sequence":"additional","affiliation":[{"name":"University of Oslo,Dept. of Informatics,Oslo,Norway"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57959-7","author":"voigt","year":"2017","journal-title":"The EU General Data Protection Regulation (GDPR) A Practical Guide"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref15"},{"key":"ref14","first-page":"122","article-title":"Temporal logic with past is exponentially more succinct","volume":"79","author":"markey","year":"2003","journal-title":"BULLETIN-European Association for Theoretical Computer Science"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"journal-title":"All About Maude-A High-Performance Logical Framework How to Specify Program and Verify Systems in Rewriting Logic","year":"2007","author":"clavel","key":"ref11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90182-F"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.20"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2014.89"},{"key":"ref1","first-page":"1","article-title":"Regulation 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"l119","year":"2016","journal-title":"Official Journal of the European Union"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0023-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063998"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03418-4_28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"journal-title":"Akka Concurrency","year":"2013","author":"wyatt","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.019"},{"journal-title":"A Theory of Distributed Objects Asynchrony Mobility Groups Components","year":"2005","author":"caromel","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.28"},{"key":"ref3","first-page":"302","article-title":"Language-based enforcement of privacy policies","author":"hayati","year":"2004","journal-title":"International Workshop on Privacy Enhancing Technologies"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13464-2_8"},{"key":"ref5","first-page":"142","article-title":"ABS: A core language for abstract behavioral specification","author":"johnsen","year":"2010","journal-title":"International Symposium on Formal Methods for Components and Objects"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919687.pdf?arnumber=9919687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:17:00Z","timestamp":1699485420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919687","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}