{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:50:42Z","timestamp":1743108642991,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030799755"},{"type":"electronic","value":"9783030799762"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79976-2_11","type":"book-chapter","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T18:06:14Z","timestamp":1625162774000},"page":"190-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Enabled Software Architecture"],"prefix":"10.1007","author":[{"given":"Emilia","family":"Stefanova","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Dimov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,2]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Bachmann, F., Bass, L., Nord, R.: Modifiability tactics. Technical Report. Carnegie-Mellon University Pittsburgh. Software Engineering Institute (2007)","DOI":"10.21236\/ADA472581"},{"key":"11_CR2","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional (2013)"},{"key":"11_CR3","unstructured":"Bowman, C., Gesher, A., Grant, J. K., Slate, D., Lerner, E.: The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards. \u201cO\u2019Reilly Media, Inc.\u201d (2015)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Cardoso, R., Issarny, V.: Architecting pervasive computing systems for privacy: a survey. In: Sixth Working IEEE\/IFIP Conference on Software Architecture: WICSA 2007, 2007, Mumbai, Maharashtra, India, pp. 26 (2007)","DOI":"10.1109\/WICSA.2007.11"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering, vol. 1, pp. 647\u2013651. IEEE (2012)","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Hoepman, J.H.: Privacy design strategies. In: IFIP International Information Security Conference, pp. 446\u2013459. Springer, Heidelberg, June 2014. https:\/\/doi.org\/10.1007\/978-3-642-55415-5_38","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177\u2013189 (2004)","DOI":"10.1145\/990064.990087"},{"key":"11_CR8","unstructured":"Kumaraguru, P., Cranor, L., Lobo, J., Calo, S.: A survey of privacy policy languages. In: Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM (2007)"},{"key":"11_CR9","unstructured":"Lord, N.: What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance (2020). https:\/\/digitalguardian.com\/blog\/what-principle-least-privilege-polp-best-practice-information-security-and-compliance"},{"issue":"4","key":"11_CR10","doi-asserted-by":"publisher","first-page":"2936","DOI":"10.1109\/JIOT.2017.2761801","volume":"5","author":"SA Miraftabzadeh","year":"2017","unstructured":"Miraftabzadeh, S.A., Rad, P., Choo, K.K.R., Jamshidi, M.: A privacy-aware architecture at the edge for autonomous real-time identity reidentification in crowds. IEEE Internet Things J. 5(4), 2936\u20132946 (2017)","journal-title":"IEEE Internet Things J."},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.iot.2018.08.009","volume":"1","author":"D Mocrii","year":"2018","unstructured":"Mocrii, D., Chen, Y., Musilek, P.: IoT-based smart homes: a review of system architecture, software, communications, privacy and security. Internet Things 1, 81\u201398 (2018)","journal-title":"Internet Things"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4156\/anc.vol1.issue1.4","volume":"1","author":"E Noeparast","year":"2012","unstructured":"Noeparast, E., Ravanmehr, R.: A Novel Event-Oriented architecture for logging and auditing in distributed systems. Adv. Netw. Commun. 1, 36\u201344 (2012)","journal-title":"Adv. Netw. Commun."},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1515\/comp-2019-0005","volume":"9","author":"MMH Onik","year":"2019","unstructured":"Onik, M.M.H., Kim, C.S., Lee, N.Y., Yang, J.: Privacy-aware blockchain for personal data sharing and tracking. Open Comput. Sci. 9(1), 80\u201391 (2019)","journal-title":"Open Comput. Sci."},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.ins.2019.09.061","volume":"512","author":"C Perera","year":"2020","unstructured":"Perera, C., Barhamgi, M., Bandara, A.K., Ajmal, M., Price, B., Nuseibeh, B.: Designing privacy-aware internet of things applications. Inf. Sci. 512, 238\u2013257 (2020)","journal-title":"Inf. Sci."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Scott, J., Kazman, R.: Realizing and refining architectural tactics: Availability. Carnegie-Mellon Univ. Pittsburgh Pa Software Engineering Inst. (2009)","DOI":"10.21236\/ADA512459"},{"issue":"3","key":"11_CR16","doi-asserted-by":"publisher","first-page":"452","DOI":"10.3390\/electronics9030452","volume":"9","author":"F Semantha","year":"2020","unstructured":"Semantha, F., Azam, S., Yeo, K., Shanmugam, B.: A Systematic literature review on privacy by design in the healthcare sector. Electronics 9(3), 452 (2020). https:\/\/doi.org\/10.3390\/electronics9030452","journal-title":"Electronics"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Simmhan, Y., et al.: An analysis of security and privacy issues in smart grid software architectures on clouds. In IEEE 4th International Conference on Cloud Computing, pp. 582\u2013589 (2011)","DOI":"10.1109\/CLOUD.2011.107"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Wahlstrom, K., Ul-haq, A., Burmeister, O.: Privacy by design: a holochain exploration. Australas. J. Inf. Syst. 24 (2020). https:\/\/doi.org\/10.3127\/ajis.v24i0.2801","DOI":"10.3127\/ajis.v24i0.2801"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: A scalable and privacy-aware IoT service for live video analytics. In: Proceedings of the 8th ACM on Multimedia Systems Conference, pp. 38\u201349, June 2017","DOI":"10.1145\/3083187.3083192"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Wang, J., Amos, B., Das, A., Pillai, P., Sadeh, N., Satyanarayanan, M.: Enabling live video analytics with a scalable and privacy-aware framework. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 14(3s), 1\u201324 (2018)","DOI":"10.1145\/3209659"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Wong, R.Y., Mulligan, D.K.: Bringing design to the privacy table: Broadening \u201cdesign\u201d in \u201cprivacy by design\u201d through the lens of HCI. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201317 (2019)","DOI":"10.1145\/3290605.3300492"},{"key":"11_CR22","unstructured":"Principle of least privilege (POLP). Definition. https:\/\/searchsecurity.techtarget.com\/definition\/principle-of-least-privilege-POLP"},{"key":"11_CR23","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995. OJ CL 281, 0031\u20130050 (1995)"},{"key":"11_CR24","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79976-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T18:25:52Z","timestamp":1625163952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79976-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030799755","9783030799762"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79976-2_11","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sofia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bulgaria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}