{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:00Z","timestamp":1759331820117,"version":"3.40.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877742","type":"print"},{"value":"9783031877759","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87775-9_12","type":"book-chapter","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:24:34Z","timestamp":1745943874000},"page":"139-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Privacy Modeling and\u00a0Enhancement Methodology for\u00a0JCAS-Enabled Railway Applications"],"prefix":"10.1007","author":[{"given":"Yevhen","family":"Zolotavkin","sequence":"first","affiliation":[]},{"given":"Prajnamaya","family":"Dass","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,30]]},"reference":[{"key":"12_CR1","unstructured":"IEEE\/ISO\/IEC International Standard for Software, systems and enterprise-Architecture description, pp. 1\u201374 (2022). ISO\/IEC\/IEEE 42010:2022(E)"},{"key":"12_CR2","unstructured":"ISO\/IEC International Standard \u2013 Information technology \u2013 Security techniques \u2013 Guidelines for privacy impact assessment, pp. 1\u201343 (2023). ISO\/IEC 29134:2023(E)"},{"key":"12_CR3","unstructured":"ISO\/IEC International Standard -Information security, cybersecurity and privacy protection - Privacy operationalisation model and method for engineering (POMME), pp. 1\u201336 (2024). ISO\/IEC 27561:2024(en)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Ahmadian, A.S., Str\u00fcber, D., Riediger, V., J\u00fcrjens, J.: Supporting privacy impact assessment by model-based privacy analysis. In: Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC\u201918, pp. 1467\u20131474 (2018)","DOI":"10.1145\/3167132.3167288"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Altaf, A., Faily, S., Dogan, H., Thron, E., Mylonas, A.: Integrated design framework for facilitating systems-theoretic process analysis. In: Computer Security. ESORICS 2021 International Workshops, pp. 58\u201373 (2022)","DOI":"10.1007\/978-3-030-95484-0_4"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Buede, D., Miller, W.: The Engineering Design of Systems: Models and Methods. Wiley Series in Systems Engineering and Management. Wiley (2009)","DOI":"10.1002\/9780470413791"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dass, P., Ujjwal, S., Novotny, J., Zolotavkin, Y., Laaroussi, Z., K\u00f6psell, S.: Addressing privacy concerns in joint communication and sensing for 6G networks: challenges and prospects. In: Annual Privacy Forum, pp. 87\u2013111. Springer (2024)","DOI":"10.1007\/978-3-031-68024-3_5"},{"key":"12_CR8","unstructured":"Gennari, J., Garlan, D.: Measuring attack surface in software architecture (CMU-ISR-11-121). Carnegie Mellon University (2012)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1002\/j.2334-5837.2021.00826.x","volume":"31","author":"M Hause","year":"2021","unstructured":"Hause, M., Kihlstr\u00f6m, L.O.: Using the security views in UAF. INCOSE Int. Symp. 31(1), 64\u201379 (2021)","journal-title":"INCOSE Int. Symp."},{"key":"12_CR10","unstructured":"Lohn, A.J.: Defense in Depth: The Basics of Blockade and Delay. arXiv (2019)"},{"key":"12_CR11","volume-title":"An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF","author":"N Mayer","year":"2017","unstructured":"Mayer, N., Aubert, J., Grandry, E., Feltus, C., Goettelmann, E.: An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF. IAF and DoDAF. arXiv, ArchiMate (2017)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Mollaeefar, M., Ranise, S.: Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the GDPR. Comput. Secur. 129, 103206 (2023)","DOI":"10.1016\/j.cose.2023.103206"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Panda, S., Panaousis, E., Loukas, G., Kentrotis, K.: Privacy impact assessment of cyber attacks on connected and autonomous vehicles. In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES \u201923 (2023)","DOI":"10.1145\/3600160.3605073"},{"key":"12_CR14","unstructured":"Theeg, G., Vlasenko, S.: Railway Signalling and Interlocking International Compendium, 3rd edition edn. Edition Eurailpress (2019)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"19625","DOI":"10.1109\/ACCESS.2024.3360864","volume":"12","author":"S Wairimu","year":"2024","unstructured":"Wairimu, S., Iwaya, L.H., Fritsch, L., Lindskog, S.: On the evaluation of privacy impact assessment and privacy risk assessment methodologies: a systematic literature review. IEEE Access 12, 19625\u201319650 (2024)","journal-title":"IEEE Access"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"30845","DOI":"10.1109\/ACCESS.2021.3059488","volume":"9","author":"T Wild","year":"2021","unstructured":"Wild, T., Braun, V., Viswanathan, H.: Joint design of communication and sensing for beyond 5G and 6G systems. IEEE Access 9, 30845\u201330857 (2021)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87775-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:24:45Z","timestamp":1745943885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87775-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877742","9783031877759"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87775-9_12","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"30 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}