{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:37:14Z","timestamp":1730299034136,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/spw.2015.22","type":"proceedings-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T16:03:24Z","timestamp":1437581004000},"page":"151-158","source":"Crossref","is-referenced-by-count":58,"title":["PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology"],"prefix":"10.1109","author":[{"given":"Nicolas","family":"Notario","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Crespo","sequence":"additional","affiliation":[]},{"given":"Yod-Samuel","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Del Alamo","sequence":"additional","affiliation":[]},{"given":"Daniel Le","family":"Metayer","sequence":"additional","affiliation":[]},{"given":"Thibaud","family":"Antignac","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Kung","sequence":"additional","affiliation":[]},{"given":"Inga","family":"Kroener","sequence":"additional","affiliation":[]},{"given":"David","family":"Wright","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2011","key":"ref39","article-title":"ISO\/IEC 29100:2011 Information technology - Security techniques - Privacy framework"},{"journal-title":"Privacy by Design","year":"0","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_2"},{"journal-title":"Trust Driven Strategies for Privacy by Design Inria Research Report hal-01112856 version 1","year":"2015","author":"antignac","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2517968.2517971"},{"article-title":"Software architecture in practice","year":"2013","author":"bass","key":"ref30"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/978-3-319-06749-0_2","article-title":"PEARs: Privacy Enhancing Architectures","volume":"8450","author":"kung","year":"2014","journal-title":"Privacy Technologies and Policy Lect Notes Comput Sci"},{"journal-title":"Communicating and Mobile Systems The N-calculus","year":"1999","author":"milner","key":"ref36"},{"year":"2013","key":"ref35","article-title":"ISO\/IEC 15118: 20 13 Road vehicles - Communication protocol between electric vehicles and grid"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ESPRE.2014.6890523"},{"key":"ref27","article-title":"Web Content Accessibility Guidelines (WCAG) 2.0","author":"caldwell","year":"2008","journal-title":"W3C Recommendation 11 December 2008 World Wide Web Consortium (W3C)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06749-0_1"},{"year":"0","key":"ref2"},{"journal-title":"On the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012)0011 -C7–0025\/2012-2012\/0011(COD))","year":"0","key":"ref1"},{"year":"0","key":"ref20","article-title":"ISO\/IEC 29134 WD Information technology - Security techniques - Privacy impact assessment - Guidelines"},{"journal-title":"Annex to the Opinion 9\/2011 on the revised Industry Proposal","year":"2011","key":"ref22"},{"journal-title":"Privacy Management Reference Model and Methodology (PMRM) Version 1 0","year":"2013","author":"sabo","key":"ref21"},{"journal-title":"Guide to the Systems Engineering Body of Knowledge","year":"0","key":"ref24"},{"journal-title":"Methodology For Privacy Risk Management","year":"2012","key":"ref23"},{"journal-title":"Joint Task Force Transformation Initiative Interagency Working Group NIST Special Publication 800–53 Security and Privacy Controls for Federal Information Systems and Organizations Revision 4","year":"2013","author":"blank","key":"ref26"},{"key":"ref25","article-title":"D 1.2: Privacy and Security-by-design Methodology","author":"garc\u00eda","year":"2014","journal-title":"PRIPARE"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.29"},{"journal-title":"Privacy online A report to Congress","year":"1998","author":"pitofsky","key":"ref11"},{"year":"2013","key":"ref40","article-title":"ISO\/IEC 29101: 2013 Information technology - Security techniques - Privacy architecture framework"},{"key":"ref12","first-page":"31","article-title":"on the protection of individuals with regard to the processing of personal data and on the free movement of such data","volume":"1995","year":"1995","journal-title":"Off J Eur Union"},{"journal-title":"Recommendation of the OECD Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data","year":"2013","key":"ref13"},{"year":"0","key":"ref14","article-title":"Top 10 Privacy Risks Project"},{"journal-title":"Privacy Impact Assessment Guideline Bonn Bundesamt für Sicherheit in der Informationstechnik (BSI)","year":"2011","author":"oetzel","key":"ref15"},{"journal-title":"Federal Information Processing Standards Publication 31","year":"1974","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2543-0_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.002"},{"journal-title":"Recommendations for a privacy impact assessment framework for the European Union","year":"2012","author":"de hert","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"article-title":"Engineering privacy by design","year":"0","author":"g\u00fcrses","key":"ref3"},{"journal-title":"Privacy and Data Protection by Design-from policy to engineering Heraklion","year":"2015","author":"danezis","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2014.944730"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2633029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2413498"},{"journal-title":"ProVerif Cryptographic protocol verifier in the formal model","year":"0","author":"blanchet","key":"ref49"},{"journal-title":"PRIP ARE D 1 2 Privacy and Security-by-design Methodology","year":"2014","key":"ref9"},{"key":"ref46","first-page":"63","article-title":"Commission Recommendation of 10 October 2014 on the Data Protection Impact Assessment Template for Smart Grid and Smart Metering Systems (20141724\/EU)","volume":"1995","year":"2001","journal-title":"Off J Eur Union"},{"year":"0","key":"ref45"},{"journal-title":"Architecture Tradeoff Analysis Method","year":"0","key":"ref48"},{"journal-title":"Cost Benefit Analysis Method (CBAM)","year":"0","key":"ref47"},{"journal-title":"Privacy by Design Documentation for Software Engineers Version 1 0 (PbD-SE)","year":"0","author":"cavoukian","key":"ref42"},{"year":"0","key":"ref41","article-title":"ISO\/IEC 29151 WD Code of practice for PII protection"},{"year":"0","key":"ref44"},{"journal-title":"Draft standardisation request addressed to the European standardisation organisations in support of the implementation of privacy management in the design and development and in the production and service provision processes of security technologies","article-title":"Enterprise And Industry Directorate-General","year":"2014","key":"ref43"}],"event":{"name":"2015 IEEE Security and Privacy Workshops (SPW)","start":{"date-parts":[[2015,5,21]]},"location":"San Jose, CA","end":{"date-parts":[[2015,5,22]]}},"container-title":["2015 IEEE Security and Privacy Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7160794\/7163193\/07163219.pdf?arnumber=7163219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T17:17:02Z","timestamp":1599758222000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7163219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/spw.2015.22","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}