{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:14:26Z","timestamp":1767064466659,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587925"},{"type":"electronic","value":"9783030587932"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58793-2_29","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"358-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Privacy-By-Design Architecture for Indoor Localization Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6862-7593","authenticated-orcid":false,"given":"Paolo","family":"Barsocchi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5502-303X","authenticated-orcid":false,"given":"Antonello","family":"Calabr\u00f2","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7238-2181","authenticated-orcid":false,"given":"Antonino","family":"Crivello","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3073-6217","authenticated-orcid":false,"given":"Said","family":"Daoudagh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4957-828X","authenticated-orcid":false,"given":"Francesco","family":"Furfari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3683-7158","authenticated-orcid":false,"given":"Michele","family":"Girolami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4223-8036","authenticated-orcid":false,"given":"Eda","family":"Marchetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"issue":"6","key":"29_CR1","doi-asserted-by":"publisher","first-page":"1886","DOI":"10.3390\/s18061886","volume":"18","author":"P Barsocchi","year":"2018","unstructured":"Barsocchi, P., Calabr\u00f2, A., Ferro, E., Gennaro, C., Marchetti, E., Vairo, C.: Boosting a low-cost smart home environment with usage and access control rules. Sensors 18(6), 1886 (2018)","journal-title":"Sensors"},{"key":"29_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-29238-6_1","volume-title":"Quality of Information and Communications Technology","author":"C Bartolini","year":"2019","unstructured":"Bartolini, C., Daoudagh, S., Lenzini, G., Marchetti, E.: GDPR-based user stories in the access control perspective. In: Piattini, M., Rupino da Cunha, P., Garc\u00eda Rodr\u00edguez de Guzm\u00e1n, I., P\u00e9rez-Castillo, R. (eds.) QUATIC 2019. CCIS, vol. 1010, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29238-6_1"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Bartolini, C., Daoudagh, S., Lenzini, G., Marchetti, E.: Towards a lawful authorized access: a preliminary GDPR-based authorized access. In: Proceedings of ICSOFT 2019, Prague, Czech Republic, 26\u201328 July 2019, pp. 331\u2013338 (2019)","DOI":"10.5220\/0007978703310338"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-662-58387-6_2","volume-title":"Financial Cryptography and Data Security","author":"D Basin","year":"2018","unstructured":"Basin, D., Debois, S., Hildebrandt, T.: On purpose and by necessity: compliance under the GDPR. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 20\u201337. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_2"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Calabr\u00f2, A., Marchetti, E., Moroni, D., Pieri, G.: A dynamic and scalable solution for improving daily life safety. In: Proceedings of APPIS 2019, pp. 1\u20136 (2019)","DOI":"10.1145\/3309772.3309796"},{"key":"29_CR6","unstructured":"Daoudagh, S., Marchetti, E.: A life cycle for authorization systems development in the GDPR perspective. In: Proceedings of the Fourth Italian Conference on Cyber Security (ITASEC), Ancona, Italy, 4\u20137 February 2020, pp. 128\u2013140 (2020)"},{"key":"29_CR7","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation). Official Journal of the European Union L119, 1\u201388, May 2016"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Furfari, F., Crivello, A., Barsocchi, P., Palumbo, F., Potort\u00ec, F.: What is next for indoor localisation? Taxonomy, protocols, and patterns for advanced location based services. In: Proceedings of IPIN 2019, pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/IPIN.2019.8911759"},{"key":"29_CR9","unstructured":"Gellman, B., Gribbons, J.M.: Edward snowden says motive behind leaks was to expose surveillance state (2013)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Georgiou, K., Constambeys, T., Laoudias, C., Petrou, L., Chatzimilioudis, G., Zeinalipour-Yazti, D.: Anyplace: a crowdsourced indoor information service. In: Proceedings of CMDM 2015, vol. 1, pp. 291\u2013294. IEEE (2015)","DOI":"10.1109\/MDM.2015.80"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-98385-1_13","volume-title":"Trust, Privacy and Security in Digital Business","author":"B Greaves","year":"2018","unstructured":"Greaves, B., Coetzee, M., Leung, W.S.: Access control requirements for physical spaces protected by virtual perimeters. In: Furnell, S., Mouratidis, H., Pernul, G. (eds.) TrustBus 2018. LNCS, vol. 11033, pp. 182\u2013197. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98385-1_13"},{"key":"29_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-981-15-0637-6_24","volume-title":"Fourth International Congress on Information and Communication Technology","author":"B Greaves","year":"2020","unstructured":"Greaves, B., Coetzee, M., Leung, W.S.: A comparison of indoor positioning systems for access control using virtual perimeters. In: Yang, X.-S., Sherratt, S., Dey, N., Joshi, A. (eds.) Fourth International Congress on Information and Communication Technology. AISC, vol. 1041, pp. 293\u2013302. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0637-6_24"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Haofeng, J., Xiaorui, G.: Wi-Fi secure access control system based on geo-fence. In: Proceedings of ISCC 2019, pp. 1\u20136 (2019)","DOI":"10.1109\/ISCC47284.2019.8969707"},{"issue":"11","key":"29_CR14","doi-asserted-by":"publisher","first-page":"3042","DOI":"10.1109\/TKDE.2015.2441724","volume":"27","author":"A Konstantinidis","year":"2015","unstructured":"Konstantinidis, A., Chatzimilioudis, G., Zeinalipour-Yazti, D., Mpeis, P., Pelekis, N., Theodoridis, Y.: Privacy-preserving indoor localization on smartphones. IEEE Trans. Knowl. Data Eng. 27(11), 3042\u20133055 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"29_CR15","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0, January 2013. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.adhoc.2018.03.011","volume":"75","author":"F Potort\u00ec","year":"2018","unstructured":"Potort\u00ec, F., Crivello, A., Girolami, M., Barsocchi, P., Traficante, E.: Localising crowds through Wi-Fi probes. Ad Hoc Netw. 75, 87\u201397 (2018)","journal-title":"Ad Hoc Netw."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Ramadan, Q., Salnitriy, M., Str\u00fcber, D., J\u00fcrjens, J., Giorgini, P.: From secure business process modeling to design-level security verification. In: Proceedings of MODELS 2017, pp. 123\u2013133. IEEE, September 2017","DOI":"10.1109\/MODELS.2017.10"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-66284-8_30","volume-title":"Computer Safety, Reliability, and Security","author":"S Ranise","year":"2017","unstructured":"Ranise, S., Siswantoro, H.: Automated legal compliance checking by security policy analysis. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2017. LNCS, vol. 10489, pp. 361\u2013372. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66284-8_30"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58793-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:32:04Z","timestamp":1619224324000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58793-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587925","9783030587932"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58793-2_29","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}