{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T18:29:42Z","timestamp":1759602582624,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031257339"},{"type":"electronic","value":"9783031257346"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25734-6_5","type":"book-chapter","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T16:03:22Z","timestamp":1677168202000},"page":"69-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Explanation of\u00a0Black Box AI for\u00a0GDPR Related Privacy Using Isabelle"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,24]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta, A.B., et al.: Explainable artificial intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI. Inf. Fusion 58, 82\u2013115 (2020)","journal-title":"Inf. Fusion"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Belle, V., Papantonis, I.: Principles and practice of explainable machine learning. CoRR, abs\/2009.11698 (2020)","DOI":"10.3389\/fdata.2021.688969"},{"key":"5_CR3","unstructured":"Bull, S.: London boroughs mapped and ranked by residents\u2019 credit scores - how money-savvy is your area? Accessed 22 July 2022"},{"key":"5_CR4","unstructured":"CHIST-ERA. Success: Secure accessibility for the internet of things (2016). http:\/\/www.chistera.eu\/projects\/success"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Gilpin, L.H., Bau, D., Yuan, B.Z., Bajwa, A., Specter, M.A., Kagal, L.: Explaining explanations: an approach to evaluating interpretability of machine learning. CoRR, abs\/1806.00069 (2018)","DOI":"10.1109\/DSAA.2018.00018"},{"key":"5_CR6","unstructured":"T.\u00a0is\u00a0Money. How well do your neighbours manage their money? Interactive map reveals average credit scores by postcode. https:\/\/www.thisismoney.co.uk\/money\/cardsloans\/article-3273996\/How-neighbours-manage-money-Interactive-map-reveals-average-credit-scores-postcode.html. Accessed 22 July 2022"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-67816-0_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"F Kamm\u00fcller","year":"2017","unstructured":"Kamm\u00fcller, F.: A proof calculus for attack trees in Isabelle. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomart\u00ed, J. (eds.) ESORICS\/DPM\/CBT 2017. LNCS, vol. 10436, pp. 3\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67816-0_1"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/978-3-030-01950-1_36","volume-title":"Information and Communications Security","author":"F Kamm\u00fcller","year":"2018","unstructured":"Kamm\u00fcller, F.: Attack trees in Isabelle. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 611\u2013628. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01950-1_36"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. In: IEEE Systems, Man and Cybernetics, SMC 2018. IEEE (2018)","DOI":"10.1109\/SMC.2018.00562"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Attack trees in Isabelle extended with probabilities for quantum cryptography. Comput. Secur. 87 (2019)","DOI":"10.1016\/j.cose.2019.101572"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Combining secure system design with risk assessment for IoT healthcare systems. In: Workshop on Security, Privacy, and Trust in the IoT, SPTIoT 2019, co-located with IEEE PerCom. IEEE (2019)","DOI":"10.1109\/PERCOMW.2019.8730776"},{"key":"5_CR12","unstructured":"Kamm\u00fcller, F.: Dependability engineering in Isabelle (2021). arXiv preprint, http:\/\/arxiv.org\/abs\/2112.04374"},{"key":"5_CR13","unstructured":"Kamm\u00fcller, F.: Explanation by automated reasoning using the Isabelle infrastructure framework (2021). arXiv preprint, http:\/\/arxiv.org\/abs\/2112.14809"},{"key":"5_CR14","unstructured":"Kamm\u00fcller, F.: Isabelle Insider and Infrastructure framework with Kripke strutures, CTL, attack trees, security refinement, and examples including IoT, GDPR, QKD, social networks, and credit scoring (2022). https:\/\/github.com\/flokam\/IsabelleAT"},{"key":"5_CR15","unstructured":"Kamm\u00fcller, F., Alvarado, C.M.: Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders (2021). arXiv preprint, http:\/\/arxiv.org\/abs\/2111.15425"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Kerber, M.: Applying the Isabelle insider framework to airplane security. Sci. Comput. Program. 206 (2021)","DOI":"10.1016\/j.scico.2021.102623"},{"key":"5_CR17","unstructured":"Kamm\u00fcller, F., Kerber, M., Probst, C.: Insider threats for auctions: Formal modeling, proof, and certified code. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8(1) (2017)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-66172-4_8","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"F Kamm\u00fcller","year":"2020","unstructured":"Kamm\u00fcller, F., Lutz, B.: Modeling and analyzing the corona-virus warning app with the Isabelle infrastructure framework. In: Garcia-Alfaro, J., Navarro-Arribas, G., Herrera-Joancomarti, J. (eds.) DPM\/CBT 2020. LNCS, vol. 12484, pp. 128\u2013144. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66172-4_8"},{"key":"5_CR19","unstructured":"Kamm\u00fcller, F., Nestmann, U.: Inter-blockchain protocols with the Isabelle infrastructure framework. In: Formal Methods for Blockchain, 2nd International Workshop, co-located with CAV 2020, Open Access Series in Informatics. Dagstuhl Publishing (2020, to appear)"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/3-540-48256-3_11","volume-title":"Theorem Proving in Higher Order Logics","author":"F Kamm\u00fcller","year":"1999","unstructured":"Kamm\u00fcller, F., Wenzel, M., Paulson, L.C.: Locales a sectioning concept for Isabelle. In: Bertot, Y., Dowek, G., Th\u00e9ry, L., Hirschowitz, A., Paulin, C. (eds.) TPHOLs 1999. LNCS, vol. 1690, pp. 149\u2013165. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48256-3_11"},{"key":"5_CR21","unstructured":"Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: Proceedings of the IEEE Symposium on Security and Privacy. IEEE (1999)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL \u2013 A Proof Assistant for Higher-Order Logic","year":"2002","unstructured":"Nipkow, T., Wenzel, M., Paulson, L.C. (eds.): Isabelle\/HOL \u2013 A Proof Assistant for Higher-Order Logic. LNCS, vol. 2283. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45949-9"},{"issue":"1","key":"5_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10676-010-9253-3","volume":"13","author":"W Pieters","year":"2011","unstructured":"Pieters, W.: Explanation and trust: what to tell the user in security and AI? Ethics Inf. Technol. 13(1), 53\u201364 (2011)","journal-title":"Ethics Inf. Technol."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Vigan\u00f3, L., Magazzeni, D.: Explainable security. In: IEEE European Symposium on Security and Privacy Workshops, EuroS &PW. IEEE (2020)","DOI":"10.1109\/EuroSPW51379.2020.00045"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Wachter, S., Mittelstadt, B., Russell, C.: Counterfactual explanations without opening the black box: automated decisions and the GDPR. Harvard J. Law Technol. 31(2) (2018)","DOI":"10.2139\/ssrn.3063289"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25734-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T16:04:40Z","timestamp":1677168280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25734-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031257339","9783031257346"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25734-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"24 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/deic.uab.cat\/conferences\/dpm\/dpm2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}