{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:17Z","timestamp":1771661057968,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_64","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"967-985","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secondary Use Prevention in Large-Scale Data Lakes"],"prefix":"10.1007","author":[{"given":"Shizra","family":"Sultan","sequence":"first","affiliation":[]},{"given":"Christian D.","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-030-34770-3_24","volume-title":"Internet Science","author":"M Derakhshannia","year":"2019","unstructured":"Derakhshannia, M., Gervet, C., Hajj-Hassan, H., Laurent, A., Martin, A.: Life and death of data in data lakes: preserving data usability and responsible governance. In: El. Yacoubi, S., Bagnoli, F., Pacini, G. (eds.) INSCI 2019. LNCS, vol. 11938, pp. 302\u2013309. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34770-3_24"},{"key":"64_CR2","doi-asserted-by":"crossref","unstructured":"Hai, R., Geisler, S., Quix, C.: Constance: an intelligent data lake system. In: Proceedings of the 2016 International Conference on Management of Data (SIGMOD \u201916) (2016)","DOI":"10.1145\/2882903.2899389"},{"key":"64_CR3","unstructured":"Christoph, Q., Hai, R., Vatov, I.: GEMMS: A Generic and Extensible Metadata Management System for Data Lakes. CAiSE Forum (2016)"},{"key":"64_CR4","unstructured":"Van den Hoven, J., Blaauw, M., Pieters, W., Warnier, M.: Privacy and information technology. In: Zalta, E.N. (ED.) The Stanford Encyclopaedia of Philosophy, Winter 2019 Edition (2019)"},{"key":"64_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-662-55433-3_3","volume-title":"Semantic Applications","author":"R Wenning","year":"2018","unstructured":"Wenning, R., Kirrane, S.: Compliance using metadata. In: Hoppe, T., Humm, B., Reibold, A. (eds.) Semantic Applications, pp. 31\u201345. Springer Berlin Heidelberg, Berlin, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-55433-3_3"},{"key":"64_CR6","unstructured":"Responsibility of the controller (2018). https:\/\/gdpr-info.eu\/chapter-4\/"},{"key":"64_CR7","unstructured":"Simon, et al.: Summary of Key Findings from California Privacy Survey. Goodwin Simon Strategic Research, CCPA (2019)"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Nogueira, I.D., Romdhane, M., Darmont, J.: Modeling data lake metadata with a data vault. In: Proceedings of the 22nd International Database Engineering & Applications Symposium (IDEAS 2018) (201)","DOI":"10.1145\/3216122.3216130"},{"key":"64_CR9","unstructured":"Baum, D.: Cloud Data Lakes For Dummies\u00ae, Snowflake Special Edition. John Wiley & Sons, Hoboken (2020). http:\/\/staging.itupdate.com.au\/assets\/snowflake\/snowflake-cloud-data-lakes-for-dummies-special-edition.pdf"},{"issue":"1","key":"64_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1097198X.2019.1569186","volume":"22","author":"L He Li","year":"2019","unstructured":"He Li, L., He, W.: The impact of GDPR on global technology development. J. Glob. Inf. Technol. Manag. 22(1), 1\u20136 (2019). https:\/\/doi.org\/10.1080\/1097198X.2019.1569186","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Bertino, E., Zhou, L., Ooi, B.C., Meng, X.: Purpose based access control for privacy protection in database systems. In: Database Systems for Advanced Applications. DASFAA (2005)","DOI":"10.1007\/11408079_2"},{"key":"64_CR12","doi-asserted-by":"crossref","unstructured":"Kabir, M.E., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3) (2011)","DOI":"10.1016\/j.eswa.2010.07.057"},{"key":"64_CR13","unstructured":"Kabir, M.E., Wang, H.: Conditional purpose-based access control model for privacy protection. In: Proceedings of the Twentieth Australasian Conference on Australasian Database , vol. 92 (ADC \u201909) (2009)"},{"issue":"6","key":"64_CR14","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/TDSC.2015.2497680","volume":"14","author":"P Colombo","year":"2017","unstructured":"Colombo, P., Ferrari, E.: Enhancing MongoDB with purpose-based access control. IEEE Trans. Depend. Secure Comput. 14(6), 591\u2013604 (2017). https:\/\/doi.org\/10.1109\/TDSC.2015.2497680","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"8","key":"64_CR15","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.jcss.2014.04.017","volume":"80","author":"H Wang","year":"2014","unstructured":"Wang, H., Sun, L., Bertino, E.: Building access control policy model for privacy preserving and testing policy conflicting problems. J. Comput. Syst. Sci. 80(8), 1493\u20131503 (2014). https:\/\/doi.org\/10.1016\/j.jcss.2014.04.017","journal-title":"J. Comput. Syst. Sci."},{"key":"64_CR16","unstructured":"World Wide Web Consortium (W3C). A platform for Privacy Preferences (P3P). http:\/\/www.w3.org\/P3P\/"},{"key":"64_CR17","unstructured":"Miller, J.A.: Smart Cities Are Harnessing the Power of Data Lakes for Social Good. Accessed 16 Aug 2019. www.nutanix.com\/theforecastbynutanix\/technology\/smart-cities-harnessing-power-of-data-lakes-for-social-good"},{"issue":"2","key":"64_CR18","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1080\/13658816.2019.1673397","volume":"34","author":"W Li","year":"2020","unstructured":"Li, W., Batty, M., Goodchild, M.F.: \u2019Real-time GIS for smart cities\u2019. Int. J. Geogr. Inf. Sci. 34(2), 311\u2013324 (2020)","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"64_CR19","series-title":"Modeling and Optimization in Science and Technologies","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-319-09177-8_11","volume-title":"Modeling and Processing for Next-Generation Big-Data Technologies","author":"M Strohbach","year":"2015","unstructured":"Strohbach, M., Ziekow, H., Gazis, V., Akiva, N.: Towards a big data analytics framework for IoT and smart city applications. In: Xhafa, F., Barolli, L., Barolli, A., Papajorgji, P. (eds.) Modeling and Processing for Next-Generation Big-Data Technologies. MOST, vol. 4, pp. 257\u2013282. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-09177-8_11"},{"issue":"5","key":"64_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3239566","volume":"51","author":"V Moustaka","year":"2019","unstructured":"Moustaka, V., Vakali, A., Anthopoulos, L.: A systematic review for smart city data analytics. ACM Comput. Surv. 51(5), 1\u201341 (2019). https:\/\/doi.org\/10.1145\/3239566","journal-title":"ACM Comput. Surv."},{"key":"64_CR21","unstructured":"Guidelines 1\/2020 on processing personal data in the context of connected vehicles and mobility-related applications (2020). https:\/\/edpb.europa.eu\/sites\/edpb\/files\/consultation\/edpb_guidelines_202001_connectedvehicles.pdf"},{"key":"64_CR22","unstructured":"Lawfulness of processing (2018). https:\/\/gdpr-info.eu\/art-6-gdpr\/"},{"key":"64_CR23","doi-asserted-by":"crossref","unstructured":"Suriarachchi, I., Beth, P.: A case for integrated provenance in data lakes. In: Crossing Analytics Systems (2016)","DOI":"10.1109\/eScience.2016.7870919"},{"key":"64_CR24","doi-asserted-by":"crossref","unstructured":"Suriarachchi, I., Beth, P.: Crossing analytics systems: a case for integrated provenance in data lakes. In: 2016 IEEE 12th International Conference on e-Science (e-Science), Baltimore, MD, pp. 349\u2013354 (2016)","DOI":"10.1109\/eScience.2016.7870919"},{"key":"64_CR25","doi-asserted-by":"publisher","unstructured":"Basin, D., Debois, S., Hildebrandt, T.: On purpose and by necessity: compliance under the GDPR. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 20\u201337. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_2","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"64_CR26","doi-asserted-by":"crossref","unstructured":"Gupta, M., Patwa, F., Sandhu, R.: An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem (2018)","DOI":"10.1145\/3180457.3180463"},{"key":"64_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-319-16462-5_38","volume-title":"Provenance and Annotation of Data and Processes","author":"W Oliveira","year":"2015","unstructured":"Oliveira, W., de Oliveira, D., Braganholo, V.: Experiencing PROV-Wf for provenance interoperability in SWfMSs. In: Lud\u00e4scher, B., Plale, B. (eds.) IPAW 2014. LNCS, vol. 8628, pp. 294\u2013296. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16462-5_38"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:19Z","timestamp":1771657999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_64","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}