{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:37:11Z","timestamp":1730223431821,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1109\/globecom54140.2023.10437389","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T19:45:36Z","timestamp":1708976736000},"page":"3300-3305","source":"Crossref","is-referenced-by-count":0,"title":["Modelling Technique for GDPR-Compliance: Toward a Comprehensive Solution"],"prefix":"10.1109","author":[{"given":"Naila","family":"Azam","sequence":"first","affiliation":[{"name":"School of Computing Science, University of Glasgow,United Kingdom"}]},{"given":"Anna Lito","family":"Michala","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow,United Kingdom"}]},{"given":"Shuja","family":"Ansari","sequence":"additional","affiliation":[{"name":"James Watt School of Engineering, University of Glasgow,United Kingdom"}]},{"given":"Nguyen B.","family":"Truong","sequence":"additional","affiliation":[{"name":"School of Computing Science, University of Glasgow,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2022.3227336"},{"issue":"CW685","key":"ref3","article-title":"Linddun privacy threat modeling: a tutorial","author":"Wuyts","year":"2015","journal-title":"CW Reports"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0195-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s21144816"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00941-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00047"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3375762"},{"volume-title":"General data protection regulation (gdpr) in european union: from proposal to implementation","year":"2021","author":"Budryt\u0117","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3192721"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32213-7_14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70241-4_16"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.09.026"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16289-3_15"},{"issue":"79","key":"ref18","first-page":"1","article-title":"Swrl: A semantic web rule language combining owl and ruleml","volume":"21","author":"Horrocks","year":"2004","journal-title":"W3C Member submission"},{"article-title":"Gdpr data interoperability model","volume-title":"23rd EURAS Annual Standardisation Conference","author":"Pandit","key":"ref19"},{"issue":"1","key":"ref20","first-page":"82","article-title":"A stride-based threat model for telehealth systems","volume":"8","author":"Abomhara","year":"2015","journal-title":"Norsk informasjonssikkerhetskonferanse (NISK)"},{"key":"ref21","volume-title":"Internet, Telematics, and Health","volume":"36","author":"Sosa-Iudicissa","year":"1997"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/diagnostics4030104"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068403001674"}],"event":{"name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","start":{"date-parts":[[2023,12,4]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2023,12,8]]}},"container-title":["GLOBECOM 2023 - 2023 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10436708\/10436716\/10437389.pdf?arnumber=10437389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T21:30:53Z","timestamp":1710365453000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10437389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/globecom54140.2023.10437389","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]}}}