{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:23:07Z","timestamp":1743045787623,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417622"},{"type":"electronic","value":"9783319417639"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_21","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"312-326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Automated Log Audits for Privacy Compliance Validation: A Literature Survey"],"prefix":"10.1007","author":[{"given":"Jenni","family":"Reuben","sequence":"first","affiliation":[]},{"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"21_CR1","unstructured":"Databases in onesearch. http:\/\/www.kau.se\/sites\/default\/files\/Dokument\/subpage\/2012\/06\/databaser_i_onesearch_pdf_18607.pdf"},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-0-387-77996-6_4","volume-title":"Policies and Research in Identity Management","author":"R Accorsi","year":"2008","unstructured":"Accorsi, R.: Automated privacy audits to complement the notion of control for identity management. In: de Leeuw, E., Fischer-H\u00fcbner, S., Tseng, J., Borking, J. (eds.) Policies and Research in Identity Management, vol. 261, pp. 39\u201348. Springer, US (2008)"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Accorsi, R., Stocker, T.: Automated privacy audits based on pruning of log data. In: 12th Enterprise Distributed Object Computing Conference Workshops. IEEE (2008)","DOI":"10.1109\/EDOCW.2008.18"},{"key":"21_CR4","unstructured":"Bace, J., Rozwell, C.: Understanding the Components of Compliance. Research G00137902. Gartner (2006)"},{"issue":"3","key":"21_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/BF00156457","volume":"18","author":"K Bailey","year":"1984","unstructured":"Bailey, K.: A three-level measurement model. Qual. Quantity 18(3), 225\u2013245 (1984)","journal-title":"Qual. Quantity"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-32885-5_8","volume-title":"Business Process Management","author":"S Banescu","year":"2012","unstructured":"Banescu, S., Petkovi\u0107, M., Zannone, N.: Measuring privacy compliance using fitness metrics. In: Barros, A., Gal, A., Kindler, E. (eds.) BPM 2012. LNCS, vol. 7481, pp. 114\u2013119. Springer, Heidelberg (2012)"},{"key":"21_CR7","unstructured":"Bhattacharya, J., Dass, R., Kapoor, V., Chakraborti, D., Gupta, S.: Privdam: Privacy Violation Detection and Monitoring Using Data Mining (2005). http:\/\/hdl.handle.net\/11718\/1881"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1136\/amiajnl-2011-000217","volume":"18","author":"A Boxwala","year":"2011","unstructured":"Boxwala, A., Kim, J., Grillo, J., Ohno-Machado, L.: Using statistical and machine learning to help institutions detect suspicious access to electronic health records. J. Am. Med. Inform. Assoc. 18(4), 498\u2013505 (2011)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Butin, D., Le M\u00e9tayer, D.: Log Analysis for Data Protection Accountability (Extended Version). Research report no. 8432, INRIA (2013)","DOI":"10.1007\/978-3-319-06410-9_12"},{"key":"21_CR10","unstructured":"Cavoukian, A.: The Security-privacy Paradox: Issues, Misconceptions and Strategies. Technical report, Information Privacy Commission\/Ontario and Deloitte & Touche (2003)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., Malin, B.: Detection of anomalous insiders in collaborative environments via relational analysis of access logs. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 63\u201374. ACM, 21\u201323 February 2011","DOI":"10.1145\/1943513.1943524"},{"key":"21_CR12","unstructured":"Duffy, E.: Facilitating Patient and Administrator Analyses of Electronic Health Record Accesses. Master thesis, University of Illinois at Urbana-Champaign (2013)"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14778\/2047485.2047486","volume":"5","author":"D Fabbri","year":"2011","unstructured":"Fabbri, D., LeFevre, K.: Explanation-based auditing. Proc. VLDB Endowment 5(1), 1\u201312 (2011)","journal-title":"Proc. VLDB Endowment"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Garg, D., Jia, L., Datta, A.: Policy auditing over incomplete logs: theory, implementation and applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 151\u2013162. ACM (2011)","DOI":"10.1145\/2046707.2046726"},{"key":"21_CR15","unstructured":"Gupta, S.: Modeling and Detecting Anomalous Topic Access in EMR Audit logs. Master thesis, University of Illinois at Urbana-Champaign (2013)"},{"issue":"3","key":"21_CR16","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1002\/(SICI)1099-1174(199809)7:3<125::AID-ISAF146>3.0.CO;2-L","volume":"7","author":"S Heatley","year":"1998","unstructured":"Heatley, S., Otto, J.: Data mining computer audit logs to detect computer misuse. Int. J. Intell. Syst. Account. Finance Manag. 7(3), 125\u2013134 (1998)","journal-title":"Int. J. Intell. Syst. Account. Finance Manag."},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Kahmer, M., Gilliot, M., Muller, G.: Automating privacy compliance with expdt. In: E-Commerce Technology and the 5th IEEE Conference on Enterprise Computing, E-Commerce and E-Services, 10th IEEE International Conference on E-Commerce Technology, pp. 87\u201394, July 2008","DOI":"10.1109\/CECandEEE.2008.122"},{"key":"21_CR18","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Joint Technical report 0400011t.1, Keele University and Empirical Software Engineering National ICT Australia Ltd (2004)"},{"issue":"3","key":"21_CR19","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"R Nickerson","year":"2013","unstructured":"Nickerson, R., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22(3), 336\u2013359 (2013)","journal-title":"Eur. J. Inf. Syst."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Sackmann, S., K\u00e4hmer, M., Gilliot, M., Lowis, L.: A classification model for automating compliance. In: 10th IEEE International Conference on E-Commerce Technology (CEC 2008) \/ 5th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2008), pp. 79\u201386 (2008)","DOI":"10.1109\/CECandEEE.2008.99"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Samavi, R., Consens, M.P.: L2TAP+SCIP: an audit-based privacy framework leveraging linked data. In: 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 719\u2013726. ICST \/ IEEE (2012)","DOI":"10.4108\/icst.collaboratecom.2012.250607"},{"issue":"5","key":"21_CR22","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1108\/10662240410566953","volume":"14","author":"HS Venter","year":"2004","unstructured":"Venter, H.S., Olivier, M.S., Eloff, J.H.: Pids: a privacy intrusion detection system. Internet Res. 14(5), 360\u2013365 (2004)","journal-title":"Internet Res."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T19:36:23Z","timestamp":1656790583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_21","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}