{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T01:11:15Z","timestamp":1776215475136,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030278120","type":"print"},{"value":"9783030278137","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_6","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:02:41Z","timestamp":1566169361000},"page":"78-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance"],"prefix":"10.1007","author":[{"given":"Luca","family":"Piras","sequence":"first","affiliation":[]},{"given":"Mohammed Ghazi","family":"Al-Obeidallah","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Praitano","sequence":"additional","affiliation":[]},{"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Beatriz","family":"Gallego-Nicasio Crespo","sequence":"additional","affiliation":[]},{"given":"Jean Baptiste","family":"Bernard","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Fiorani","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[]},{"given":"Andr\u00e8s Castillo","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Pavlidis","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"D\u2019Addario","sequence":"additional","affiliation":[]},{"given":"Giuseppe Giovanni","family":"Zorzino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"6_CR1","unstructured":"The Forrester New Wave $$^{{\\rm TM}}$$ . https:\/\/www.forrester.com\/report\/The%20Forrester%20New%20Wave%20GDPR%20And%20Privacy%20Management%20Software%20Q4%202018\/-\/E-RES142698"},{"key":"6_CR2","unstructured":"Privacy Tech Vendor Report. https:\/\/iapp.org\/resources\/article\/2018-privacy-tech-vendor-report\/"},{"key":"6_CR3","unstructured":"Regulation 2016\/679 and Directive 95\/46\/EC (GDPR) of the EU on the processing of personal data and on the free movement of such data (2016). https:\/\/publications.europa.eu\/en\/publication-detail\/-\/publication\/3e485e15-11bd-11e6-ba9a-01aa75ed71a1\/language-en"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2015.04.001","volume":"42","author":"EPS Capistrano","year":"2015","unstructured":"Capistrano, E.P.S., Chen, J.V.: Information privacy policies: the effects of policy characteristics and online experience. Comput. Stand. Interfaces 42, 24\u201331 (2015)","journal-title":"Comput. Stand. Interfaces"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. J. 16, 3\u201332 (2011)","journal-title":"Requir. Eng. J."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M., Meis, R.: Problem-based security requirements elicitation and refinement with pressure (2015)","DOI":"10.1007\/978-3-319-25579-8_18"},{"key":"6_CR7","unstructured":"Garcia: PRIPARE privacy by design methodology handbook. Technical report (2015)"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"4341","DOI":"10.1016\/j.asoc.2010.10.012","volume":"11","author":"C Kalloniatis","year":"2011","unstructured":"Kalloniatis, C., Belsis, P., Gritzalis, S.: A soft computing approach for privacy requirements engineering: the PRiS framework. Appl. Soft Comput. 11, 4341\u20134348 (2011)","journal-title":"Appl. Soft Comput."},{"key":"6_CR9","unstructured":"Mayer, N., Dubois, E., Matulevicius, R., Heymans, P.: Towards a measurement framework for security risk management"},{"key":"6_CR10","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543 (2008)","journal-title":"ISJLP"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-39417-6_16","volume-title":"Domain-Specific Conceptual Modeling","author":"H Mouratidis","year":"2016","unstructured":"Mouratidis, H., Argyropoulos, N., Shei, S.: Security requirements engineering for cloud computing: the secure tropos approach. In: Karagiannis, D., Mayr, H., Mylopoulos, J. (eds.) Domain-Specific Conceptual Modeling, pp. 357\u2013380. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39417-6_16"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-31811-0_1","volume-title":"Risks and Security of Internet and Systems","author":"M Pavlidis","year":"2016","unstructured":"Pavlidis, M., Mouratidis, H., Gonzalez-Perez, C., Kalloniatis, C.: Addressing privacy and trust issues in cultural heritage modelling. In: Lambrinoudakis, C., Gabillon, A. (eds.) CRiSIS 2015. LNCS, vol. 9572, pp. 3\u201316. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31811-0_1"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4018\/jsse.2012040102","volume":"3","author":"M Pavlidis","year":"2012","unstructured":"Pavlidis, M., Mouratidis, H., Islam, S.: Modelling security using trust based concepts. Int. J. Secure Softw. Eng. (IJSSE) 3, 36\u201353 (2012)","journal-title":"Int. J. Secure Softw. Eng. (IJSSE)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Piras, L., Dellagiacoma, D., Perini, A., Susi, A., Giorgini, P., Mylopoulos, J.: Design thinking and acceptance requirements for designing gamified software. In: 13th International Conference on Research Challenges in Information Science (RCIS). IEEE (2019)","DOI":"10.1109\/RCIS.2019.8876973"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.clsr.2017.03.027","volume":"33","author":"A Tsohou","year":"2017","unstructured":"Tsohou, A., Kosta, E.: Enabling valid informed consent for location tracking through privacy awareness of users: a process theory. Comput. Law Secur. Rev. 33, 434\u2013457 (2017)","journal-title":"Comput. Law Secur. Rev."},{"key":"6_CR16","unstructured":"Zheng, J., Gao, D.W., Lin, L.: Smart meters in smart grid: an overview. In: 2013 IEEE Green Technologies Conference (GreenTech) (2013)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T18:38:29Z","timestamp":1575571109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}