{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:37:13Z","timestamp":1762522633474,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870096"},{"type":"electronic","value":"9783030870102"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87010-2_1","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T21:52:34Z","timestamp":1631224354000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4021-4137","authenticated-orcid":false,"given":"Lelio","family":"Campanile","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3664-3759","authenticated-orcid":false,"given":"Pasquale","family":"Cantiello","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2089-975X","authenticated-orcid":false,"given":"Mauro","family":"Iacono","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5226-2326","authenticated-orcid":false,"given":"Fiammetta","family":"Marulli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6415-1180","authenticated-orcid":false,"given":"Michele","family":"Mastroianni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain - or - rewriting history in Bitcoin and friends. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 111\u2013126 (2017). https:\/\/doi.org\/10.1109\/EuroSP.2017.37","DOI":"10.1109\/EuroSP.2017.37"},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSEC.2020.3012059","volume":"19","author":"L Campanile","year":"2021","unstructured":"Campanile, L., Iacono, M., Levis, A.H., Marulli, F., Mastroianni, M.: Privacy regulations, smart roads, blockchain, and liability insurance: putting technologies to work. IEEE Secur. Priv. 19(1), 34\u201343 (2021). https:\/\/doi.org\/10.1109\/MSEC.2020.3012059","journal-title":"IEEE Secur. Priv."},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Campanile, L., Iacono, M., Marulli, F., Mastroianni, M.: Privacy regulations challenges on data-centric and IoT systems: a case study for smart vehicles. In: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, vol. 1, AI4EIoTs, pp. 507\u2013518. INSTICC, SciTePress (2020). https:\/\/doi.org\/10.5220\/0009839305070518","DOI":"10.5220\/0009839305070518"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Campanile, L., Iacono, M., Marulli, F., Mastroianni, M.: Designing a GDPR compliant blockchain-based IoV distributed information tracking system. Inf. Process. Manag. 58(3), 102511 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102511","DOI":"10.1016\/j.ipm.2021.102511"},{"key":"1_CR5","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s: Blockchain and the GDPR: solutions for a responsible use of the blockchain in the context of personal data. https:\/\/www.cnil.fr\/en\/blockchain-and-gdpr-solutions-responsible-use-blockchain-context-personal-data"},{"key":"1_CR6","unstructured":"Council of European Union: General Data Protection Regulation (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"issue":"6\u201310","key":"1_CR7","first-page":"71","volume":"2","author":"M Crosby","year":"2016","unstructured":"Crosby, M., Pattanayak, P., Verma, S., Kalyanaraman, V., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6\u201310), 71 (2016)","journal-title":"Appl. Innov."},{"key":"1_CR8","unstructured":"EY: EY Global Information security Survey 2018\u201319 (2019). https:\/\/assets.ey.com\/content\/dam\/ey-sites\/ey-com\/en_ca\/topics\/advisory\/ey-global-information-security-survey-2018-19.pdf"},{"key":"1_CR9","unstructured":"French Data Protection Authority (CNIL): Privacy Impact Assessment (PIA) - Knowledge Bases (2018). https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil-pia-3-en-knowledgebases.pdf"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"50593","DOI":"10.1109\/ACCESS.2021.3069877","volume":"9","author":"AB Haque","year":"2021","unstructured":"Haque, A.B., Islam, A.K.M.N., Hyrynsalmi, S., Naqvi, B., Smolander, K.: GDPR compliant blockchains-a systematic literature review. IEEE Access 9, 50593\u201350606 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3069877","journal-title":"IEEE Access"},{"key":"1_CR11","unstructured":"Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. Cryptology ePrint Archive, Report 1998\/010 (1998). https:\/\/eprint.iacr.org\/1998\/010"},{"issue":"10","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N.: Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10), 1027\u20131038 (2017)","journal-title":"Telecommun. Policy"},{"key":"1_CR13","volume-title":"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments","author":"D Landoll","year":"2011","unstructured":"Landoll, D.: The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, 2nd edn. Second Edition. CRC Press Inc, Boca Raton (2011)","edition":"2"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.future.2020.06.037","volume":"112","author":"E Politou","year":"2020","unstructured":"Politou, E., Alepis, E., Patsakis, C., Casino, F., Alazab, M.: Delegated content erasure in IPFs. Future Gener. Comput. Syst. 112, 956\u2013964 (2020)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR15","unstructured":"Puddu, I., Dmitrienko, A., Capkun, S.: $$\\mu $$chain: How to forget without hard forks. IACR Cryptology ePrint Archive (IACR), February 2017. https:\/\/eprint.iacr.org\/2017\/106"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Rieger, A., Guggenmos, F., Lockl, J., Fridgen, G., Urbach, N.: Building a blockchain application that complies with the EU General Data Protection Regulation. MIS Q. Executive 18(4), 263\u2013279 (2019). https:\/\/doi.org\/10.17705\/2msqe.00020","DOI":"10.17705\/2msqe.00020"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Shi, S., He, D., Li, L., Kumar, N., Khan, M.K., Choo, K.K.R.: Applications of blockchain in ensuring the security and privacy of electronic health record systems: a survey. Comput. Secur. 97, 101966 (2020)","DOI":"10.1016\/j.cose.2020.101966"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Verizon Enterprise: 2019 data breach investigation report (2019). https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report.pdf","DOI":"10.1016\/S1361-3723(19)30060-0"},{"issue":"22","key":"1_CR19","doi-asserted-by":"publisher","first-page":"4731","DOI":"10.3390\/app9224731","volume":"9","author":"X Zheng","year":"2019","unstructured":"Zheng, X., Zhu, Y., Si, X.: A survey on challenges and progresses in blockchain technologies: a performance and security perspective. Appl. Sci. 9(22), 4731 (2019)","journal-title":"Appl. Sci."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87010-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T17:56:21Z","timestamp":1632506181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87010-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870096","9783030870102"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87010-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}