{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:16:35Z","timestamp":1761059795649,"version":"3.40.4"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118505"},{"type":"electronic","value":"9783319118512"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_2","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T10:55:22Z","timestamp":1410000922000},"page":"17-32","source":"Crossref","is-referenced-by-count":15,"title":["Privacy Architectures: Reasoning about Data Minimisation and Integrity"],"prefix":"10.1007","author":[{"given":"Thibaud","family":"Antignac","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-06749-0_1","volume-title":"Privacy Technologies and Policy","author":"T. Antignac","year":"2014","unstructured":"Antignac, T., Le M\u00e9tayer, D.: Privacy by design: From technologies to architectures. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol.\u00a08450, pp. 1\u201317. Springer, Heidelberg (2014)"},{"key":"2_CR2","unstructured":"Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-Preserving electronic toll pricing. In: Proc. of the 19th USENIX Security Symp., USA, pp. 63\u201378 (2010)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J., Nissenbaum, H.: Privacy and contextual integrity: framework and applications. In: 2006 IEEE Symposium on Security and Privacy, pp. 15\u2013198 (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"2_CR4","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. SEI series in Software Engineering. Addison-Wesley (2012)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-17714-9_10","volume-title":"Information Systems Security","author":"M.Y. Becker","year":"2010","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: A Practical Generic Privacy Language. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol.\u00a06503, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst.\u00a08, 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Cohen, M., Dam, M.: A complete axiomatization of knowledge and cryptography. In: 22nd Annual IEEE Symp. on Logic in Comp. Science, pp. 77\u201388 (2007)","DOI":"10.1109\/LICS.2007.4"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12980-3_18","volume-title":"Towards Trustworthy Elections","author":"S. Delaune","year":"2010","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols: A taster. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 289\u2013309. Springer, Heidelberg (2010)"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s12394-009-0012-8","volume":"1","author":"C. Diaz","year":"2009","unstructured":"Diaz, C., Kosta, E., Dekeyser, H., Kohlweiss, M., Girma, N.: Privacy preserving electronic petitions. Identity in the Information Society\u00a01(1), 203\u2013209 (2009)","journal-title":"Identity in the Information Society"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"2_CR11","unstructured":"European Parliament: European parliament legislative resolution of 12 march 2014 on the proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. General Data Protection Regulation, Ordinary legislative procedure: first reading (March 2014)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.: Reasoning About Knowledge. MIT Press (2004)","DOI":"10.7551\/mitpress\/5803.001.0001"},{"key":"2_CR13","unstructured":"Fournet, C., Kohlweiss, M., Danezis, G., Luo, Z.: Zql: A compiler for privacy-preserving data processing. In: Proc. of the 22Nd USENIX Conference on Security, USA, pp. 163\u2013178 (2013)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22444-7_15","volume-title":"Security and Trust Management","author":"F.D. Garcia","year":"2011","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 226\u2013238. Springer, Heidelberg (2011)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Glasgow, J., MacEwen, G., Panangaden, P.: A logic for reasoning about security. In: Proc. of the 3rd Computer Security Foundations Workshop, pp. 2\u201313 (1990)","DOI":"10.1109\/CSFW.1990.128180"},{"key":"2_CR16","unstructured":"G\u00fcrses, S., Troncoso, C., Diaz, C.: Engineering Privacy by Design. Presented at the Computers, Privacy & Data Protection Conf. (2011)"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1324249.1324273","volume-title":"Proc. of the 11th Conf. on Th. Aspects of Rationality and Knowl.","author":"J.Y. Halpern","year":"2007","unstructured":"Halpern, J.Y., Pucella, R.: Dealing with logical omniscience. In: Proc. of the 11th Conf. on Th. Aspects of Rationality and Knowl., pp. 169\u2013176. ACM, USA (2007)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-01465-9_10","volume-title":"Formal Aspects in Security and Trust","author":"W. Jonge de","year":"2009","unstructured":"de Jonge, W., Jacobs, B.: Privacy-Friendly electronic traffic pricing via commits. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 143\u2013161. Springer, Heidelberg (2009)"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-54069-1_3","volume-title":"Privacy Technologies and Policy","author":"F. Kerschbaum","year":"2014","unstructured":"Kerschbaum, F.: Privacy-preserving computation. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol.\u00a08319, pp. 41\u201354. Springer, Heidelberg (2014)"},{"issue":"6","key":"2_CR20","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing\u00a013(6), 391\u2013399 (2009)","journal-title":"Personal and Ubiquitous Computing"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-01465-9_11","volume-title":"Formal Aspects in Security and Trust","author":"D. M\u00e9tayer Le","year":"2009","unstructured":"Le M\u00e9tayer, D.: A Formal Privacy Management Framework. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 162\u2013176. Springer, Heidelberg (2009)"},{"key":"2_CR22","first-page":"95","volume-title":"Proc. of the 3rd ACM Conference on Data and Application Security and Privacy","author":"D. M\u00e9tayer Le","year":"2013","unstructured":"Le M\u00e9tayer, D.: Privacy by design: A formal framework for the analysis of architectural choices. In: Proc. of the 3rd ACM Conference on Data and Application Security and Privacy, pp. 95\u2013104. ACM, USA (2013)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Maffei, M., Pecina, K., Reinert, M.: Security and privacy by declarative design. In: IEEE 26th Computer Security Foundations Symposium, pp. 81\u201396 (2013)","DOI":"10.1109\/CSF.2013.13"},{"key":"2_CR24","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-38490-5_41","volume-title":"Advanced Information Systems Engineering Workshops","author":"V. Manousakis","year":"2013","unstructured":"Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: Bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol.\u00a0148, pp. 455\u2013465. Springer, Heidelberg (2013)"},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Comm.\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Comm."},{"issue":"4","key":"2_CR26","first-page":"989","volume":"14","author":"D.K. Mulligan","year":"2012","unstructured":"Mulligan, D.K., King, J.: Bridging the gap between privacy and design. University of Pennsylvania Journal of Constitutional Law\u00a014(4), 989\u20131034 (2012)","journal-title":"University of Pennsylvania Journal of Constitutional Law"},{"issue":"1-2","key":"2_CR27","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"2_CR28","unstructured":"Pucella, R.: Deductive algorithmic knowledge. CoRR cs.AI\/0405038 (2004)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-Preserving smart metering. Technical report MSR-TR-2010-150, Microsoft Research (2010)","DOI":"10.1145\/2046556.2046564"},{"key":"2_CR30","unstructured":"Ryan, M.D., Smyth, B.: Applied pi calculus. In: Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, vol.\u00a05, pp. 112\u2013142. IOS Press (2011)"},{"issue":"2","key":"2_CR31","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MS.2006.58","volume":"23","author":"M. Shaw","year":"2006","unstructured":"Shaw, M., Clements, P.: The golden age of software architecture. IEEE Softw.\u00a023(2), 31\u201339 (2006)","journal-title":"IEEE Softw."},{"issue":"1","key":"2_CR32","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering\u00a035(1), 67\u201382 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"M.C. Tschantz","year":"2009","unstructured":"Tschantz, M.C., Wing, J.M.: Formal methods for privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol.\u00a05850, pp. 1\u201315. Springer, Heidelberg (2009)"},{"key":"2_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1111348.1111349","volume-title":"Proc. of the 2004 Workshop on Secure Web Service, SWS 2004","author":"T. Yu","year":"2004","unstructured":"Yu, T., Li, N., Ant\u00f3n, A.I.: A formal semantics for P3P. In: Proc. of the 2004 Workshop on Secure Web Service, SWS 2004, pp. 1\u20138. ACM, USA (2004)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:17:35Z","timestamp":1746368255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}