{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:24:40Z","timestamp":1749792280288,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031099168"},{"type":"electronic","value":"9783031099175"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-09917-5_22","type":"book-chapter","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T19:03:14Z","timestamp":1656615794000},"page":"325-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Configurable Per-Query Data Minimization for\u00a0Privacy-Compliant Web APIs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5543-0265","authenticated-orcid":false,"given":"Frank","family":"Pallas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-5287","authenticated-orcid":false,"given":"David","family":"Hartmann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9068-3260","authenticated-orcid":false,"given":"Paul","family":"Heinrich","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6782-8393","authenticated-orcid":false,"given":"Josefine","family":"Kipke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9076-9240","authenticated-orcid":false,"given":"Elias","family":"Gr\u00fcnewald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,1]]},"reference":[{"key":"22_CR1","unstructured":"Anderson, A., et al.: Extensible Access Control Markup Language (XACML) Version 1.0. OASIS (2003)"},{"key":"22_CR2","unstructured":"Art. 29 Data Protection Working Party: Opinion 05\/2014 on anonymisation techniques - wp216 (2014). https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp216_en.pdf"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Brito, G., Mombach, T., Valente, M.T.: Migrating to GraphQL: a practical assessment. In: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 140\u2013150 (2019). https:\/\/doi.org\/10.1109\/SANER.2019.8667986","DOI":"10.1109\/SANER.2019.8667986"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"22_CR5","unstructured":"European Data Protection Board: Guidelines 4\/2019 on article 25 - data protection by design and by default (2019). https:\/\/edpb.europa.eu\/sites\/default\/files\/consultation\/edpb_Guideline 4\/2019_201904_dataprotection_by_design_and_by_default.pdf"},{"key":"22_CR6","unstructured":"European Parliament and Council of the European Union: Regulation (EU) 2016\/679 of 27 April 2016. General Data Protection Regulation (2018)"},{"key":"22_CR7","unstructured":"Fielding, R.: Representational state transfer. Architectural Styles and the Design of Network-based Software Architecture, pp. 76\u201385 (2000)"},{"issue":"1","key":"22_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1093\/idpl\/ipz026","volume":"10","author":"M Finck","year":"2020","unstructured":"Finck, M., Pallas, F.: They who must not be identified-distinguishing personal from non-personal data under the GDPR. Int. Data Privacy Law 10(1), 11\u201336 (2020). https:\/\/doi.org\/10.1093\/idpl\/ipz026","journal-title":"Int. Data Privacy Law"},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1538909.1538911","volume":"34","author":"G Ghinita","year":"2009","unstructured":"Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans. Database Syst. (TODS) 34(2), 1\u201347 (2009)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Gruschka, N., Mavroeidis, V., Vishi, K., Jensen, M.: Privacy issues and data protection in big data: a case study analysis under GDPR. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 5027\u20135033. IEEE (2018)","DOI":"10.1109\/BigData.2018.8622621"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Gr\u00fcnewald, E., Pallas, F.: TILT: A GDPR-aligned transparency information language and toolkit for practical privacy engineering. In: Proceedings of the 2021 Conference on Fairness, Accountability, and Transparency. ACM, New York (2021). https:\/\/doi.org\/10.1145\/3442188.3445925","DOI":"10.1145\/3442188.3445925"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Gr\u00fcnewald, E., Wille, P., Pallas, F., Borges, M.C., Ulbricht, M.R.: TIRA: an OpenAPI extension and toolbox for GDPR transparency in RESTful architectures. In: 2021 International Workshop on Privacy Engineering. IEEE (2021)","DOI":"10.1109\/EuroSPW54576.2021.00039"},{"key":"22_CR13","unstructured":"Kostova, B., G\u00fcrses, S., Troncoso, C.: Privacy engineering meets software engineering. On the challenges of engineering privacy by design. arXiv:2007.08613 (2020)"},{"key":"22_CR14","doi-asserted-by":"publisher","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007). https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007). https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"22_CR16","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2021","unstructured":"Majeed, A., Lee, S.: Anonymization techniques for privacy preserving data publishing: a comprehensive survey. IEEE Access 9, 8512\u20138545 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700","journal-title":"IEEE Access"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Marques., J., Bernardino., J.: Analysis of data anonymization techniques. In: Proceedings of the 12th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - KEOD, pp. 235\u2013241. SciTePress (2020). https:\/\/doi.org\/10.5220\/0010142302350241","DOI":"10.5220\/0010142302350241"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Pallas, F., et al.: Towards application-layer purpose-based access control. In: 35th Symposium on Applied Computing, pp. 1288\u20131296. ACM (2020). https:\/\/doi.org\/10.1145\/3341105.3375764","DOI":"10.1145\/3341105.3375764"},{"issue":"8","key":"22_CR19","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.3390\/ijerph17082633","volume":"17","author":"AD Smith","year":"2020","unstructured":"Smith, A.D., Muli, A., Schwab, K.J., Hennegan, J.: National monitoring for menstrual health and hygiene: is the type of menstrual material used indicative of needs across 10 countries? Int. J. Environ. Res. Public Health 17(8), 2633 (2020)","journal-title":"Int. J. Environ. Res. Public Health"},{"issue":"05","key":"22_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002). https:\/\/doi.org\/10.1142\/S0218488502001648","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-00305-0_23","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"M-R Ulbricht","year":"2018","unstructured":"Ulbricht, M.-R., Pallas, F.: YaPPL - a lightweight privacy preference language for legally sufficient and automated consent provision in IoT scenarios. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Livraga, G., Rios, R. (eds.) DPM\/CBT -2018. LNCS, vol. 11025, pp. 329\u2013344. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00305-0_23"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-319-91764-1_23","volume-title":"Service-Oriented Computing \u2013 ICSOC 2017 Workshops","author":"M Vogel","year":"2018","unstructured":"Vogel, M., Weber, S., Zirpins, C.: Experiences on migrating RESTful web services to GraphQL. In: Braubach, L., et al. (eds.) ICSOC 2017. LNCS, vol. 10797, pp. 283\u2013295. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91764-1_23"},{"key":"22_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-33702-5_1","volume-title":"Service-Oriented Computing","author":"E Wittern","year":"2019","unstructured":"Wittern, E., Cha, A., Davis, J.C., Baudart, G., Mandel, L.: An empirical study of GraphQL schemas. In: Yangui, S., Bouassida Rodriguez, I., Drira, K., Tari, Z. (eds.) ICSOC 2019. LNCS, vol. 11895, pp. 3\u201319. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33702-5_1"},{"key":"22_CR24","unstructured":"Yang, F.: GraphQL role-based access control (RBAC) middleware (2018). https:\/\/github.com\/Canner\/graphql-rbac"},{"key":"22_CR25","unstructured":"Zavadlal, M.: GraphQL-Shield: a GraphQL tool to ease the creation of permission layer (2021). https:\/\/github.com\/maticzav\/graphql-shield"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-09917-5_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T19:06:24Z","timestamp":1656615984000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-09917-5_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031099168","9783031099175"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-09917-5_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"1 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icwe2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icwe2022.webengineering.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}