{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:57:44Z","timestamp":1757779064674,"version":"3.40.3"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030616373"},{"type":"electronic","value":"9783030616380"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_19","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"337-359","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Inclusive Privacy Protections in the Cloud"],"prefix":"10.1007","author":[{"given":"Tanusree","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Di Giulio","sequence":"additional","affiliation":[]},{"given":"Masooda","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Bashir, M., Di Giulio, C., Kamhoua, C.A.: Certifications past and future: a future model for assigning certifications that incorporate lessons learned from past practices. In: Campbell, R.H., Kamhoua, C.A., Kwiat, K.A. (eds.) Assured Cloud Computing, pp. 277\u2013311. Wiley-IEEE Computer Society Press (2018)","DOI":"10.1002\/9781119428497.ch8"},{"issue":"3","key":"19_CR2","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1080\/07421222.2018.1481634","volume":"35","author":"A Benlian","year":"2018","unstructured":"Benlian, A., Kettinger, W.J., Sunyaev, A., Winkler, T.J., Guest Editors: The transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J. Manag. Inf. Syst. 35(3), 719\u2013739 (2018)","journal-title":"J. Manag. Inf. Syst."},{"key":"19_CR3","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft): Recommendations of the National Institute of Standards and Technology. Special Publication 800\u2013145 (draft), Gaithersburg, MD (2018). Published 28 September 2011, Updated 10 November 2018"},{"volume-title":"Rewired: Cybersecurity Governance","year":"2019","key":"19_CR4","unstructured":"Ellis, R., Mohan, V. (eds.): Rewired: Cybersecurity Governance. Wiley, Hoboken (2019)"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Lamps, J., Palmer, I., Sprabery, R.: WinWizard: expanding Xen with a LibVMI intrusion detection tool. In: Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, pp. 849\u2013856 (2014)","DOI":"10.1109\/CLOUD.2014.117"},{"key":"19_CR6","unstructured":"Guilloteau, S., Venkatesen, M.: Privacy in Cloud Computing. ITU-T Technology Watch Report March 2012 (2013)"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.clsr.2010.05.005","volume":"26","author":"D Svantesson","year":"2010","unstructured":"Svantesson, D., Clarke, R.: Privacy and consumer risks in cloud computing. Comput. Law Secur. Rev. 26(4), 391\u2013397 (2010)","journal-title":"Comput. Law Secur. Rev."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R.H., Bashir, M.N.: Cloud standards in comparison: are new security frameworks improving cloud security? In: Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, CA, pp. 50\u201357 (2017)","DOI":"10.1109\/CLOUD.2017.16"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Di Giulio, C., Kamhoua, C., Campbell, R.H., Sprabery, R., Kwiat, K., Bashir, M.N.: IT security and privacy standards in comparison: improving FedRAMP authorization for cloud service providers. In: Proceedings of the 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2017), pp. 1090\u20131099. IEEE Press, Piscataway, May 2017","DOI":"10.1109\/CCGRID.2017.137"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Di Giulio, C., Sprabery, R., Kamhoua, C., Kwiat, K., Campbell, R.H., Bashir, M.N.: Cloud security certifications: a comparison to improve cloud service provider security. In: Proceedings of the 2nd International Conference on Internet of Things and Cloud Computing (ICC 2017). ACM, New York (2017). Article 120, 12 pages","DOI":"10.1145\/3018896.3025169"},{"key":"19_CR11","unstructured":"McCallister, E., Grance, T., Scarfone, K.: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII). NIST Special Publication SP 800-122, National Institute of Standards and Technology, U.S. Department of Commerce (2010). \nhttps:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-122.pdf"},{"key":"19_CR12","unstructured":"Sharma, T., Bambenek, J.C., Bashir, M.: Preserving Privacy in Cyber-physical-social Systems: An Anonymity and Access Control Approach (2020)"},{"key":"19_CR13","unstructured":"Force, J.T.: Security and Privacy Controls for Information Systems and Organizations (No. NIST Special Publication (SP) 800-53 Rev. 5 (Draft)). National Institute of Standards and Technology (2017)"},{"key":"19_CR14","unstructured":"Idrissi, H.K., Kartit, A., El Marram, M.: A taxonomy and survey of cloud computing. In: 2013 National Security Days (JNS3), pp. 1\u20135. IEEE, April 2013"},{"issue":"1C","key":"19_CR15","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.procs.2015.03.087","volume":"45","author":"R Shaikh","year":"2015","unstructured":"Shaikh, R., Sasikumar, M.: Data classification for achieving security in cloud computing. Procedia Comput. Sci. 45(1C), 493\u2013498 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"19_CR16","unstructured":"Big Data Taxonomy. \nhttps:\/\/downloads.cloudsecurityalliance.org\/\n\n. Accessed 16 Mar 2020"},{"key":"19_CR17","unstructured":"Cavoukian, A.: Privacy by design: The 7 foundational principles. Information and privacy commissioner of Ontario, Canada, May 2009"},{"key":"19_CR18","unstructured":"IAPP - A Taxonomy of Privacy (Poster). \nhttps:\/\/iapp.org\/\n\n. Accessed 16 Mar 2020"},{"key":"19_CR19","unstructured":"Zorzo, S.D., Botelho, R.P., de\u2019Avila, P.M.: Taxonomy for privacy policies of social networks sites. Soc. Netw. (2013)"},{"key":"19_CR20","unstructured":"Ant\u00f3n, A.I., Earp, J.B.: A taxonomy for web site privacy requirements. North Carolina State University at Raleigh, Raleigh, NC (2001)"},{"key":"19_CR21","unstructured":"Miller, H.E.: Big-data in cloud computing: a taxonomy of risks (2013)"},{"issue":"7","key":"19_CR22","doi-asserted-by":"publisher","first-page":"190903","DOI":"10.1155\/2014\/190903","volume":"10","author":"Y Sun","year":"2014","unstructured":"Sun, Y., Zhang, J., Xiong, Y., Zhu, G.: Data security and privacy in cloud computing. Int. J. Distrib. Sens. Netw. 10(7), 190903 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Kang, M., Kwon, H.Y.: A study on the needs for enhancement of personal information protection in cloud computing security certification system. In: 2019 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE, January 2019","DOI":"10.1109\/PlatCon.2019.8669413"},{"issue":"4","key":"19_CR24","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431\u20131441 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"2","key":"19_CR25","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2016.26","volume":"14","author":"S Lins","year":"2016","unstructured":"Lins, S., Grochol, P., Schneider, S., Sunyaev, A.: Dynamic certification of cloud services: trust, but verify! IEEE Secur. Priv. 14(2), 66\u201371 (2016)","journal-title":"IEEE Secur. Priv."},{"key":"19_CR26","unstructured":"Lansing, J., Schneider, S., Sunyaev, A.: Cloud service certifications: measuring consumers\u2019 preferences for assurances. In: ECIS, p. 181, June 2013"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Katzan Jr, H.: On the privacy of cloud computing. Int. J. Manag. Inf. Syst. (IJMIS) 14(2) (2010)","DOI":"10.19030\/ijmis.v14i2.824"},{"key":"19_CR28","unstructured":"Abuhussein, A., Bedi, H., Shiva, S.: Evaluating security and privacy in cloud computing services: a stakeholder\u2019s perspective. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 388\u2013395. IEEE, December 2012"},{"issue":"2","key":"19_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2408776.2408789","volume":"56","author":"A Sunyaev","year":"2013","unstructured":"Sunyaev, A., Schneider, S.: Cloud services certification. Commun. ACM 56(2), 33\u201336 (2013)","journal-title":"Commun. ACM"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Ion, I., Sachdeva, N., Kumaraguru, P., \u010capkun, S.: Home is safer than the cloud! Privacy concerns for consumer cloud storage. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 1\u201320, July 2011","DOI":"10.1145\/2078827.2078845"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Karkouda, K., Nabli, A., Gargouri, F.: Privacy and availability in cloud data warehouse. In: Proceedings of the 10th International Conference on Education Technology and Computers, pp. 388\u2013391, October 2018","DOI":"10.1145\/3290511.3290580"},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Mowbray, M., Pearson, S.: A client-based privacy manager for cloud computing. In: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and MiddlewaRE, pp. 1\u20138, June 2009","DOI":"10.1145\/1621890.1621897"},{"issue":"1","key":"19_CR33","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2095266.2095270","volume":"41","author":"FS Grodzinsky","year":"2011","unstructured":"Grodzinsky, F.S., Tavani, H.T.: Privacy in \u201cthe cloud\u201d applying Nissenbaum\u2019s theory of contextual integrity. ACM SIGCAS Comput. Soc. 41(1), 38\u201347 (2011)","journal-title":"ACM SIGCAS Comput. Soc."},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44\u201352. IEEE, May 2009","DOI":"10.1109\/CLOUD.2009.5071532"},{"issue":"6","key":"19_CR35","doi-asserted-by":"publisher","first-page":"2763","DOI":"10.1007\/s11227-016-1953-y","volume":"73","author":"A Ghorbel","year":"2017","unstructured":"Ghorbel, A., Ghorbel, M., Jmaiel, M.: Privacy in cloud computing environments: a survey and research challenges. J. Supercomput. 73(6), 2763\u20132800 (2017). \nhttps:\/\/doi.org\/10.1007\/s11227-016-1953-y","journal-title":"J. Supercomput."},{"key":"19_CR36","doi-asserted-by":"crossref","unstructured":"Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105\u2013112. IEEE, November 2010","DOI":"10.1109\/SKG.2010.19"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647\u2013651. IEEE, March 2012","DOI":"10.1109\/ICCSEE.2012.193"},{"issue":"1","key":"19_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TETCI.2017.2764109","volume":"2","author":"T Wang","year":"2018","unstructured":"Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3\u201312 (2018)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"19_CR39","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comcom.2019.04.011","volume":"140","author":"J Domingo-Ferrer","year":"2019","unstructured":"Domingo-Ferrer, J., Farras, O., Ribes-Gonz\u00e1lez, J., S\u00e1nchez, D.: Privacy- preserving cloud computing on sensitive data: a survey of methods, products and challenges. Comput. Commun. 140, 38\u201360 (2019)","journal-title":"Comput. Commun."},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"Aloraini, A., Hammoudeh, M.: A survey on data confidentiality and privacy in cloud computing. In: Proceedings of the International Conference on Future Networks and Distributed Systems, pp. 1\u20137, July 2017","DOI":"10.1145\/3102304.3102314"},{"issue":"1","key":"19_CR41","first-page":"14","volume":"4","author":"SN Kumar","year":"2016","unstructured":"Kumar, S.N., Vajpayee, A.: A survey on secure cloud: security and privacy in cloud computing. Am. J. Syst. Softw. 4(1), 14\u201326 (2016)","journal-title":"Am. J. Syst. Softw."},{"key":"19_CR42","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2017.04.030","volume":"122","author":"J Werner","year":"2017","unstructured":"Werner, J., Westphall, C.M., Westphall, C.B.: Cloud identity management: a survey on privacy strategies. Comput. Netw. 122, 29\u201342 (2017)","journal-title":"Comput. Netw."},{"key":"19_CR43","doi-asserted-by":"crossref","unstructured":"Lar, S.U., Liao, X., Abbas, S.A.: Cloud computing privacy security global issues, challenges, mechanisms. In: 2011 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 1240\u20131245. IEEE, August 2011","DOI":"10.1109\/ChinaCom.2011.6158348"},{"key":"19_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-030-50309-3_35","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"T Sharma","year":"2020","unstructured":"Sharma, T., Bashir, M.: Privacy apps for smartphones: an assessment of users\u2019 preferences and limitations. In: Moallem, A. (ed.) HCII 2020. LNCS, vol. 12210, pp. 533\u2013546. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-50309-3_35"},{"key":"19_CR45","unstructured":"Tsai, J.: U.S. Patent Application No. 14\/984,830 (2017)"},{"issue":"2","key":"19_CR46","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.clsr.2017.09.002","volume":"34","author":"E Lachaud","year":"2018","unstructured":"Lachaud, E.: The general data protection regulation and the rise of certification as a regulatory instrument. Comput. Law Secur. Rev. 34(2), 244\u2013256 (2018)","journal-title":"Comput. Law Secur. Rev."},{"key":"19_CR47","unstructured":"Easton, C.R.: Information systems for crisis response and management: The EU data protection regulation, privacy by design and certification (2016)"},{"key":"19_CR48","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2017.09.012","volume":"72","author":"M Anisetti","year":"2018","unstructured":"Anisetti, M., Ardagna, C.A., Damiani, E., El Ioini, N., Gaudenzi, F.: Modeling time, probability, and configuration constraints for continuous cloud service certification. Comput. Secur. 72, 234\u2013254 (2018)","journal-title":"Comput. Secur."},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Asal, R., Damiani, E., Dimitrakos, T., El Ioini, N., Pahl, C.: Certification-based cloud adaptation. IEEE Trans. Serv. Comput. (2018)","DOI":"10.1109\/TSC.2018.2793268"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Teigeler, H., Lins, S., Sunyaev, A.: Drivers vs. inhibitors-what clinches continuous service certification adoption by cloud service providers? In: Proceedings of the 51st Hawaii International Conference on System Sciences, January 2018","DOI":"10.24251\/HICSS.2018.711"},{"key":"19_CR51","unstructured":"FedRAMP Security Assessment Framework. \nhttps:\/\/www.fedramp.gov\/assets\/resources\/\n\n. Accessed 17 Mar 2020"},{"key":"19_CR52","unstructured":"GDPR, General Provision. \nhttps:\/\/gdpr-info.eu\/chapter-1\/\n\n. Accessed 17 Mar 2020"},{"key":"19_CR53","unstructured":"NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, 16 January 2020. \nhttps:\/\/www.nist.gov\/privacy-framework"},{"key":"19_CR54","unstructured":"Privacy Policy Guidance Memorandum 2008-01, The Fair Information Practice Principles, 29 December 2008. \nhttps:\/\/www.dhs.gov\/publication\/privacy-policy-guidance-memorandum-2008-01-fair-information-practice-principles"},{"key":"19_CR55","unstructured":"General Data Protection Regulation (GDPR): Off. J. Eur. Union (2016). \nhttps:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679"},{"key":"19_CR56","unstructured":"Cloud Controls Matrix v3.0.1: Cloud Security Alliance, 3 August 2019. \nhttps:\/\/cloudsecurityalliance.org\/artifacts\/cloud-controls-matrix-v3-0-1\/"},{"key":"19_CR57","volume-title":"Understanding Privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)"},{"key":"19_CR58","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2005","unstructured":"Solove, D.J.: A taxonomy of privacy. Univ. Pa. Law. Rev. 154, 477 (2005)","journal-title":"Univ. Pa. Law. Rev."},{"key":"19_CR59","unstructured":"Privacy Act of 1974. The United States Department of Justice, 15 January 2020. \nhttps:\/\/www.justice.gov\/opcl\/privacy-act-1974"},{"key":"19_CR60","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1038\/s41591-020-0928-y","volume":"26","author":"T Sharma","year":"2020","unstructured":"Sharma, T., Bashir, M.: Use of apps in the COVID-19 responses and the loss of privacy protection. Nat. Med. 26, 1165\u20131167 (2020)","journal-title":"Nat. Med."},{"key":"19_CR61","doi-asserted-by":"crossref","unstructured":"Almtrf, A., Alagrash, Y., Zohdy, M.: Framework modeling for user privacy in cloud computing. In: 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0819\u20130826. IEEE, January 2019","DOI":"10.1109\/CCWC.2019.8666453"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:25:37Z","timestamp":1602631537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}