{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:12Z","timestamp":1740099252085,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047702"},{"type":"electronic","value":"9783030047719"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_46","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T17:02:53Z","timestamp":1544029373000},"page":"609-616","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A UML Profile for Privacy Enforcement"],"prefix":"10.1007","author":[{"given":"Javier Luis","family":"C\u00e1novas Izquierdo","sequence":"first","affiliation":[]},{"given":"Juli\u00e1n","family":"Salas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Ahmadian, A.S., Peldszus, S., Ramadan, Q., J\u00fcrjens, J.: Model-based privacy and security analysis with carisma. In: Foundations of Software Engineering, pp. 989\u2013993 (2017)","DOI":"10.1145\/3106237.3122823"},{"key":"46_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-61482-3_13","volume-title":"Modelling Foundations and Applications","author":"Amir Shayan Ahmadian","year":"2017","unstructured":"Ahmadian, A.S., Str\u00fcber, D., Riediger, V., J\u00fcrjens, J.: Model-based privacy analysis in industrial ecosystems. In: European Conference on Modelling Foundations and Applications, pp. 215\u2013231 (2017)"},{"key":"46_CR3","doi-asserted-by":"crossref","unstructured":"Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA. In: Workshop on Software Engineering for Secure Systems, pp. 40\u201346 (2009)","DOI":"10.1109\/IWSESS.2009.5068457"},{"key":"46_CR4","first-page":"189","volume-title":"Computer Security","author":"Majed Alshammari","year":"2017","unstructured":"Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models. In: International Workshop on Computer Security, pp. 189\u2013209 (2017)"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications. In: International Conference on Computer and Information Technology, pp. 371\u2013378 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.53"},{"key":"46_CR6","unstructured":"Busch, M.: Evaluating & engineering: an approach for the development of secure web applications (2016)"},{"key":"46_CR7","first-page":"18","volume-title":"Lecture Notes in Computer Science","author":"Nicodemos Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: International Workshop on Policies for Distributed Systems and Networks, pp. 18\u201338 (2001)"},{"key":"46_CR8","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"Jaap-Henk Hoepman","year":"2014","unstructured":"Hoepman, J.: Privacy design strategies - (extended abstract). In: International Conference on Systems Security and Privacy Protection, pp. 446\u2013459 (2014)"},{"key":"46_CR9","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u226aUML\u226b 2002 \u2014 The Unified Modeling Language","author":"Jan J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: 5th International Conference on the Unified Modeling Language, pp. 412\u2013425 (2002)"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A conceptual model for privacy policies with consent and revocation requirements. In: International Summer School on Privacy and Identity Management for Life, pp. 258\u2013270 (2010)","DOI":"10.1007\/978-3-642-20769-3_21"},{"key":"46_CR11","first-page":"31","volume":"13(3), 24:1\u201324","author":"Q Ni","year":"2010","unstructured":"Ni, Q., et al.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3), 24:1\u201324, 31 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"46_CR12","unstructured":"OASIS: Extensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml . Accessed April 2018"},{"key":"46_CR13","unstructured":"OMG: Unified Modeling Language. https:\/\/www.omg.org\/spec\/UML\/2.5\/ . Accessed April 2018"},{"issue":"3","key":"46_CR14","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s11786-018-0344-6","volume":"12","author":"Juli\u00e1n Salas","year":"2018","unstructured":"Salas, J., Domingo-Ferrer, J.: Some basics on privacy techniques, anonymization and their big data challenges. Mathematics in Computer Science (2018, in press)","journal-title":"Mathematics in Computer Science"},{"key":"46_CR15","unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report (1998)"},{"issue":"1","key":"46_CR16","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s41019-015-0001-x","volume":"1","author":"J Soria-Comas","year":"2016","unstructured":"Soria-Comas, J., Domingo-Ferrer, J.: Big data privacy: challenges to privacy principles and models. Data Sci. Eng. 1(1), 21\u201328 (2016)","journal-title":"Data Sci. Eng."},{"key":"46_CR17","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-55783-0_2","volume-title":"Privacy and Identity Management. Facing up to Next Steps","author":"V Torra","year":"2016","unstructured":"Torra, V., Navarro-Arribas, G.: Big data privacy and anonymization. In: Lehmann, A., Whitehouse, D., Fischer-H\u00fcbner, S., Fritsch, L., Raab, C. (eds.) Privacy and Identity 2016. IAICT, vol. 498, pp. 15\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-55783-0_2"}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:53:13Z","timestamp":1573055593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}