{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:25:48Z","timestamp":1766888748323},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_2","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T20:43:14Z","timestamp":1400100194000},"page":"18-29","source":"Crossref","is-referenced-by-count":16,"title":["PEARs: Privacy Enhancing ARchitectures"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Kung","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0011:FIN:EN:PDF"},{"key":"2_CR2","unstructured":"Privacy-by-Design, http:\/\/www.ipc.on.ca\/english\/Privacy\/Introduction-to-PbD\/"},{"key":"2_CR3","unstructured":"Kung, A.: ICT and Privacy: Barriers. In: Annual Privacy Forum, Limassol, Cyprus, October 10-11( 2012)"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.: Privacy Engineering. IEEE Transactions on Software Engineering\u00a035(1), 67\u201382 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR5","unstructured":"G\u00fcrses, S.F., Troncoso, C., Diaz, C.: Engineering Privacy-by-Design. Computers, Privacy & Data Protection (2011)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Kung, A., Freytag, J., Kargl, F.: Privacy-by-design in ITS applications. In: 2nd IEEE International Workshop on Data Security and Privacy in Wireless Networks, Lucca, Italy (June 20, 2011)","DOI":"10.1109\/WoWMoM.2011.5986166"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Wright, D., de Hert, P. (eds.): Privacy Impact Assessment. Series: Law, Governance and Technology Series, vol.\u00a06. Springer (2012)","DOI":"10.1007\/978-94-007-2543-0"},{"key":"2_CR8","unstructured":"PIAF: Privacy Impact Assessment Framework, http:\/\/www.piafproject.eu"},{"key":"2_CR9","unstructured":"CNIL methodology for privacy risk management, http:\/\/www.cnil.fr\/fileadmin\/documents\/en\/CNIL-ManagingPrivacyRisks-Methodology.pdf"},{"key":"2_CR10","unstructured":"EBIOS. Expression des Besoins et Identification des Objectifs de S\u00e9curit\u00e9, http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/EBIOS-1-GuideMethodologique-2010-01-25.pdf"},{"key":"2_CR11","unstructured":"OASIS. Organization for the Advancement of Structured Information, https:\/\/www.oasis-open.org\/"},{"key":"2_CR12","unstructured":"OASIS Privacy Management Reference Model (PMRM) Technical Committee, https:\/\/www.oasis-open.org\/committees\/pmrm\/charter.php"},{"issue":"5","key":"2_CR13","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TDSC.2010.71","volume":"8","author":"C. Troncoso","year":"2011","unstructured":"Troncoso, C., Danezis, G., Kosta, E., Balasch, J., Preneel, B.: PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance. IEEE Transactions on Dependable and Secure Computing\u00a08(5), 742\u2013755 (2011)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2_CR14","unstructured":"Balasch, J., Rial, A., Troncoso, C., Geuens, C., Preneel, B., Verbauwhede, I.: PrETP: Privacy-Preserving Electronic Toll Pricing (extended version). In: 19th USENIX Security Symposium"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-Preserving Smart Metering. In: Proceedings of the 2011 ACM Workshop on Privacy in the Electronic Society, WPES 2011, USA (October 17, 2011)","DOI":"10.1145\/2046556.2046564"},{"key":"2_CR16","unstructured":"ISO\/IEC\/IEEE 42010:2011, Systems and software engineering \u2014 Architecture description"},{"key":"2_CR17","unstructured":"Software Architecture Review and Assessment (SARA) Report, version 1.0, http:\/\/kruchten.com\/philippe\/architecture\/SARAv1.pdf (February 2002)"},{"key":"2_CR18","unstructured":"Software Architecture in Practice (3rd Edition), Len Bass, Paul Clementz, Rick Kazman. Addison-Wesley (2012)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Chung, E., Hong, J., et al.: Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. Patterns C1-C15, DIS2004 (2004)","DOI":"10.1145\/1013115.1013148"},{"key":"2_CR20","unstructured":"http:\/\/www.privacypatterns.org"},{"key":"2_CR21","unstructured":"http:\/\/www.teresa-project.org"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Anciaux, N., Benzine, M., Bouganim, L., Jacquemin, K., Pucheral, P., Yin, S.: Restoring the Patient Control over her Medical History. In: Proc. of the 21th IEEE International Symposium on Computer-Based Medical Systems (CBMS), Jyv\u00e4skyl\u00e4, Finland, pp. 132\u2013137 (June 2008)","DOI":"10.1109\/CBMS.2008.101"},{"issue":"1-2","key":"2_CR23","doi-asserted-by":"crossref","first-page":"25","DOI":"10.14778\/1920841.1920850","volume":"3","author":"Tristan Allard","year":"2010","unstructured":"Allard, T., Anciaux, N., Bouganim, L., Guo, Y., Le Folgoc, L., Nguyen, B., Pucheral, P., Ray, I., Ray, I., Yin, S.: Secure Personal Data Servers: A Vision Paper. In: Proc. of the 36th International Conference on Very Large Data Bases (VLDB), Singapore, PVLDB 3(1), 25\u201335 (September 2010)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"2_CR24","unstructured":"http:\/\/privacypatterns.org\/ , http:\/\/privacypatterns.org\/patterns\/Location-granularity"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: 28th International Conference on Very Large Data Bases, Hong Kong (August 2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"2_CR26","unstructured":"PRECIOSA, http:\/\/www.preciosa-project.org\/"},{"key":"2_CR27","unstructured":"Kargl, F., Schaub, F., Dietzel, S.: Mandatory Enforcement of Privacy Policies Using Trusted Computing Principles. Intelligent Information Privacy Management Symposium, Stanford University (AAAI 2010 Spring Symposia) (March 2010)"},{"key":"2_CR28","unstructured":"V2X Privacy Verifiable Architecture. Deliverable D7. Preciosa FP7 Project, http:\/\/www.preciosa-project.org\/ (November 2009)"},{"key":"2_CR29","unstructured":"Goldberg, R.: Architectural Principles for Virtual Computer Systems. PhD thesis, National Technical Information Service (February 1973)"},{"key":"2_CR30","unstructured":"OVERSEE, https:\/\/www.oversee-project.com\/"},{"key":"2_CR31","unstructured":"http:\/\/www.xtratum.org\/"},{"key":"2_CR32","unstructured":"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2010:207:FULL:EN:PDF"},{"key":"2_CR33","unstructured":"http:\/\/pripare.eu\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T09:20:06Z","timestamp":1565428806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}