{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:05:27Z","timestamp":1775912727818,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030337513","type":"print"},{"value":"9783030337520","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-33752-0_1","type":"book-chapter","created":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T21:01:49Z","timestamp":1572037309000},"page":"3-23","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations"],"prefix":"10.1007","author":[{"given":"Lun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Joseph P.","family":"Near","sequence":"additional","affiliation":[]},{"given":"Neel","family":"Somani","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Low","sequence":"additional","affiliation":[]},{"given":"David","family":"Dao","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,23]]},"reference":[{"key":"1_CR1","unstructured":"The 18 biggest data breaches of the 21st century (2019). https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html . Accessed 23 May 2019"},{"key":"1_CR2","first-page":"737","volume":"96","author":"DJ Solove","year":"2017","unstructured":"Solove, D.J., Citron, D.K.: Risk and anxiety: a theory of data-breach harms. Tex. L. Rev. 96, 737 (2017)","journal-title":"Tex. L. Rev."},{"key":"1_CR3","unstructured":"Insider threat 2018 report (2019). https:\/\/www.ca.com\/content\/dam\/ca\/us\/files\/ebook\/insider-threat-report.pdf . Accessed 23 May 2019"},{"key":"1_CR4","first-page":"589","volume":"44","author":"LE Murdock","year":"1979","unstructured":"Murdock, L.E.: The use and abuse of computerized information: striking a balance between personal privacy interests and organizational information needs. Alb. L. Rev. 44, 589 (1979)","journal-title":"Alb. L. Rev."},{"key":"1_CR5","unstructured":"The EU general data protection regulation (GDPR) (2019). https:\/\/eugdpr.org\/ . Accessed 16 Apr 2019"},{"key":"1_CR6","unstructured":"California consumer privacy act (CCPA) (2019). https:\/\/www.caprivacy.org\/ . Accessed 16 Apr 2019"},{"key":"1_CR7","unstructured":"The family educational rights and privacy act of 1974 (FERPA) (2019). https:\/\/www.colorado.edu\/registrar\/students\/records\/ferpa . Accessed 16 Apr 2019"},{"key":"1_CR8","unstructured":"Health insurance portability and accountability act (HIPAA) (2109). https:\/\/searchhealthit.techtarget.com\/definition\/HIPAA . Accessed 16 Apr 2019"},{"key":"1_CR9","unstructured":"Google keeps your data forever - unlocking the future transparency of your past (2019). www.siliconvalleywatcher.com\/google-keeps-your-data-forever--unlocking-the-future-transparency-of-your-past\/ . Accessed 30 May 2019"},{"key":"1_CR10","unstructured":"Extract, transform, load (2019). https:\/\/en.wikipedia.org\/wiki\/Extract,_transform,_load . Accessed 30 May 2019"},{"issue":"6","key":"1_CR11","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1145\/362384.362685","volume":"13","author":"EF Codd","year":"1970","unstructured":"Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13(6), 377\u2013387 (1970)","journal-title":"Commun. ACM"},{"key":"1_CR12","unstructured":"Chodorow, K.: MongoDB: the definitive guide: powerful and scalable data storage. O\u2019Reilly Media, Inc. (2013)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Shvachko, K., Kuang, H., Radia, S., Chansler, R., et al.: The hadoop distributed file system. In: MSST, vol. 10, pp. 1\u201310 (2010)","DOI":"10.1109\/MSST.2010.5496972"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Oper. Syst. Rev. 44(2), 35\u201340 (2010)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"issue":"10\u201310","key":"1_CR16","first-page":"95","volume":"10","author":"M Zaharia","year":"2010","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: Cluster computing with working sets. HotCloud 10(10\u201310), 95 (2010)","journal-title":"HotCloud"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Sen, S., Guha, S., Datta, A., Rajamani, S.K., Tsai, J., Wing, J.M.: Bootstrapping privacy compliance in big data systems. In: 2014 IEEE Symposium on Security and Privacy, pp. 327\u2013342. IEEE (2014)","DOI":"10.1109\/SP.2014.28"},{"key":"1_CR18","unstructured":"Formal concept analysis (2019). https:\/\/en.wikipedia.org\/wiki\/Formal_concept_analysis . Accessed 30 May 2019"},{"key":"1_CR19","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"2015","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer, Heidelberg (2015)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Mavroeidis, V., Vishi, K., Jensen, M.: Privacy issues and data protection in big data: a case study analysis under GDPR. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5027\u20135033. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622621"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Renaud, K., Shepherd, L.A.: How to make privacy policies both GDPR-compliant and usable. In: 2018 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/CyberSA.2018.8551442"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"tyy001","DOI":"10.1093\/cybsec\/tyy001","volume":"4","author":"E Politou","year":"2018","unstructured":"Politou, E., Alepis, E., Patsakis, C.: Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions. J. Cybersecur. 4(1), tyy001 (2018)","journal-title":"J. Cybersecur."},{"key":"1_CR23","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-99951-7_2","volume-title":"Perspectives in Business Informatics Research","author":"J Tom","year":"2018","unstructured":"Tom, J., Sing, E., Matulevi\u010dius, R.: Conceptual representation of the GDPR: model and application directions. In: Zdravkovic, J., Grabis, J., Nurcan, S., Stirna, J. (eds.) BIR 2018. LNBIP, vol. 330, pp. 18\u201328. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99951-7_2"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Hanson, C., Berners-Lee, T., Kagal, L., Sussman, G.J., Weitzner, D.: Data-purpose algebra: modeling data usage policies. In: Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), pp. 173\u2013177. IEEE (2007)","DOI":"10.1109\/POLICY.2007.14"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Tschantz, M.C., Datta, A., Wing, J.M.: Formalizing and enforcing purpose restrictions in privacy policies. In: 2012 IEEE Symposium on Security and Privacy, pp. 176\u2013190. IEEE (2012)","DOI":"10.1109\/SP.2012.21"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Chowdhury, O., et al.: Privacy promises that can be kept: a policy analysis method with application to the hipaa privacy rule. In: Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, pp. 3\u201314. ACM (2013)","DOI":"10.1145\/2462410.2462423"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Lam, P.E., Mitchell, J.C., Scedrov, A., Sundaram, S., Wang, F.: Declarative privacy policy: finite models and attribute-based encryption. In: Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium, pp. 323\u2013332. ACM (2012)","DOI":"10.1145\/2110363.2110401"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-662-57932-9_2","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII","author":"A Gerl","year":"2018","unstructured":"Gerl, A., Bennani, N., Kosch, H., Brunie, L.: LPL, towards a GDPR-compliant privacy language: formal definition and\u00a0usage. In: Hameurlain, A., Wagner, R. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII. LNCS, vol. 10940, pp. 41\u201380. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-57932-9_2"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-08867-9_9","volume-title":"Computer Aided Verification","author":"O Chowdhury","year":"2014","unstructured":"Chowdhury, O., Jia, L., Garg, D., Datta, A.: Temporal mode-checking for runtime monitoring of privacy policies. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 131\u2013149. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_9"},{"key":"1_CR30","unstructured":"Symul, L., Wac, K., Hillard, P., Salathe, M.: Assessment of menstrual health status and evolution through mobile apps for fertility awareness, bioRxiv (2019). https:\/\/www.biorxiv.org\/content\/early\/2019\/01\/28\/385054"},{"key":"1_CR31","doi-asserted-by":"crossref","unstructured":"Liu, B.: Predicting pregnancy using large-scale data from a women\u2019s health tracking mobile application. arXiv preprint arXiv:1812.02222 (2018)","DOI":"10.1145\/3308558.3313512"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1093\/emph\/eoy018","volume":"2018","author":"Alexandra Alvergne","year":"2018","unstructured":"Alvergne, A., Vlajic Wheeler, M., H\u00f6gqvist Tabor, V.: Do sexually transmitted infections exacerbate negative premenstrual symptoms? Insights from digital health. In: Evolution, Medicine, and Public Health, vol. 2018, no. 1, pp. 138\u2013150, July 2018. https:\/\/doi.org\/10.1093\/emph\/eoy018","journal-title":"Evolution, Medicine, and Public Health"}],"container-title":["Lecture Notes in Computer Science","Heterogeneous Data Management, Polystores, and Analytics for Healthcare"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33752-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,26]],"date-time":"2021-01-26T03:45:21Z","timestamp":1611632721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33752-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030337513","9783030337520"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33752-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Poly","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Polystores and Other Systems for Heterogeneous Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Los Angeles, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"poly2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/poly19","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}