{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:20:50Z","timestamp":1755598850604,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750770"},{"type":"electronic","value":"9783030750787"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75078-7_48","type":"book-chapter","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:06:00Z","timestamp":1619773560000},"page":"479-490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The General Data Protection Regulation and Log Pseudonymization"],"prefix":"10.1007","author":[{"given":"Artur","family":"Varanda","sequence":"first","affiliation":[]},{"given":"Leonel","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Rog\u00e9rio Lu\u00eds de C.","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Adail","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Rabad\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"issue":"2","key":"48_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.clsr.2016.11.002","volume":"33","author":"L Bolognini","year":"2017","unstructured":"Bolognini, L., Bistolfi, C.: Pseudonymization and impacts of big (personal\/anonymous) data processing in the transition from the directive 95\/46\/EC to the new EU general data protection regulation. Comput. Law Secur. Rev. 33(2), 171\u2013181 (2017)","journal-title":"Comput. Law Secur. Rev."},{"key":"48_CR2","volume-title":"Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management","author":"A Chuvakin","year":"2012","unstructured":"Chuvakin, A., Schmidt, K., Phillips, C.: Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress Publishing, Rockland (2012)"},{"doi-asserted-by":"crossref","unstructured":"Gerhards, R.: The syslog protocol. RFC 5424, pp. 1\u201338 (2009)","key":"48_CR3","DOI":"10.17487\/rfc5424"},{"doi-asserted-by":"crossref","unstructured":"Ghiasvand, S., Ciorba, F.M.: Assessing data usefulness for failure analysis in anonymized system logs. In: 17th International Symposium on Parallel and Distributed Computing (ISPDC-2018) (2018)","key":"48_CR4","DOI":"10.1109\/ISPDC2018.2018.00031"},{"unstructured":"Hallam-Baker, P.M., Behlendorf, B.: Extended log file format: W3C working draft WD-logfile-960323 (1996). https:\/\/www.w3.org\/TR\/WD-logfile.html. Accessed 04 Apr 2021","key":"48_CR5"},{"key":"48_CR6","volume-title":"Network Forensics: Tracking Hackers Through Cyberspace","author":"J Ham","year":"2012","unstructured":"Ham, J., Davidoff, S.: Network Forensics: Tracking Hackers Through Cyberspace. Prentice Hall, Hoboken (2012)"},{"key":"48_CR7","doi-asserted-by":"publisher","DOI":"10.1036\/9780071701082","volume-title":"Security Information and Event Management (SIEM) Implementation","author":"A Harper","year":"2010","unstructured":"Harper, A., VanDyke, S., Blask, C., Harris, S., Miller, D.: Security Information and Event Management (SIEM) Implementation. McGraw-Hill, New York (2010). https:\/\/doi.org\/10.1036\/9780071701082"},{"doi-asserted-by":"crossref","unstructured":"Kasem-Madani, S., Meier, M., Wehner, M.: Towards a toolkit for utility and privacy-preserving transformation of semi-structured data using data pseudonymization. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology, pp. 163\u2013179 (2017)","key":"48_CR8","DOI":"10.1007\/978-3-319-67816-0_10"},{"doi-asserted-by":"crossref","unstructured":"Kent, K., Souppaya, M.P.: SP 800-92. guide to computer security log management. Technical report, Gaithersburg, MD, USA (2006)","key":"48_CR9","DOI":"10.6028\/NIST.SP.800-92"},{"doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: RFC2104: HMAC: keyed-hashing for message authentication (1997)","key":"48_CR10","DOI":"10.17487\/rfc2104"},{"unstructured":"NXLog Ltd. NXLog community edition reference manual (2018). https:\/\/nxlog.co\/docs\/nxlog-ce\/nxlog-reference-manual.html","key":"48_CR11"},{"issue":"1","key":"48_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-018-0098-z","volume":"10","author":"GK Neumann","year":"2019","unstructured":"Neumann, G.K., Grace, P., Burns, D., Surridge, M.: Pseudonymization risk analysis in distributed systems. J. Internet Serv. Appl. 10(1), 1\u201316 (2019)","journal-title":"J. Internet Serv. Appl."},{"doi-asserted-by":"crossref","unstructured":"Portillo-Dominguez, A.O., Ayala-Rivera, V.: Towards an efficient log data protection in software systems through data minimization and anonymization. In: Proceedings - 2019 7th International Conference in Software Engineering Research and Innovation. CONISOFT 2019, pp. 107\u2013115 (2019)","key":"48_CR13","DOI":"10.1109\/CONISOFT.2019.00024"},{"unstructured":"Sonntag, M.: Pseudonymizing log entries with time-selective disclosure. In: Workshops der INFORMATIK 2018 - Architekturen, Prozesse, Sicherheit und Nachhaltigkeit, K\u00f6llen Druck+Verlag GmbH, Bonn, pp. 119\u2013127 (2018)","key":"48_CR14"},{"doi-asserted-by":"crossref","unstructured":"Tachepun, C., Thammaboosadee, S.: A data masking guideline for optimizing insights and privacy under GDPR compliance. In: Proceedings of the 11th International Conference on Advances in Information Technology, pp. 1\u20139 (2020)","key":"48_CR15","DOI":"10.1145\/3406601.3406627"},{"unstructured":"The European Parliament and the Council of the European Union: Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46. The Official Journal of the European Union 59, 1\u201388 (2016)","key":"48_CR16"},{"key":"48_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-1913-2","volume-title":"Pro Linux System Administration","author":"J Turnbull","year":"2009","unstructured":"Turnbull, J., Matotek, D., Lieverdink, P.: Pro Linux System Administration. Apress, New York (2009). https:\/\/doi.org\/10.1007\/978-1-4302-1913-2"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75078-7_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T11:29:12Z","timestamp":1623324552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75078-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750770","9783030750787"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75078-7_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}