{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:14:10Z","timestamp":1726409650898},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319602240"},{"type":"electronic","value":"9783319602257"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60225-7_16","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:37Z","timestamp":1495851997000},"page":"225-235","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Assessment Using Static Taint Analysis (Tool Paper)"],"prefix":"10.1007","author":[{"given":"Marcel","family":"von Maltitz","sequence":"first","affiliation":[]},{"given":"Cornelius","family":"Diekmann","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"16_CR1","unstructured":"Das Standard-Datenschutzmodell. Technical report, Konferenz der unabh\u00e4ngigen Datenschutzbeh\u00f6rden des Bundes und der L\u00e4nder, Darmstadt (2015). https:\/\/www.datenschutzzentrum.de\/uploads\/sdm\/SDM-Handbuch.pdf"},{"issue":"1","key":"16_CR2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/s11623-011-0009-y","volume":"35","author":"K Bock","year":"2011","unstructured":"Bock, K., Rost, M.: Privacy by design und die neuen schutzziele. DuD 35(1), 30\u201335 (2011)","journal-title":"DuD"},{"key":"16_CR3","unstructured":"Cavoukian, A.: Creation of a Global Privacy Standard, November 2006, Revised October 2009. https:\/\/www.ipc.on.ca\/images\/resources\/gps.pdf"},{"key":"16_CR4","unstructured":"Cavoukian, A.: Privacy by Design \u2013 The 7 Foundational Principles, January 2011. https:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/7foundationalprinciples.pdf"},{"key":"16_CR5","unstructured":"Chair of Network Architectures, Services, TUM: MeasrDroid. http:\/\/www.droid.net.in.tum.de\/"},{"key":"16_CR6","unstructured":"Common Criteria: Part 3: Security assurance components. Common Criteria for Information Technology Security Evaluation CCMB-2012-09-003(Version 3.1 Revision 4), September 2012"},{"key":"16_CR7","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Metayer, D.L., Tirtea, R., Schiffner, S.: Privacy and data protection by design \u2013 from policy to engineering. Technical report, ENISA (2015)"},{"issue":"5","key":"16_CR8","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D Denning","year":"1976","unstructured":"Denning, D.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Diekmann, C., Korsten, A., Carle, G.: Demonstrating topoS: theorem-prover-based synthesis of secure network configurations. In: 11th International Conference on Network and Service Management (CNSM), pp. 366\u2013371, November 2015","DOI":"10.1109\/CNSM.2015.7367384"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Diekmann, C., Michaelis, J., Haslbeck, M., Carle, G.: Verified iptables firewall analysis. In: IFIP Networking 2016, Vienna, Austria, May 2016","DOI":"10.1109\/IFIPNetworking.2016.7497196"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-662-43613-4_9","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"C Diekmann","year":"2014","unstructured":"Diekmann, C., Posselt, S.-A., Niedermayer, H., Kinkelin, H., Hanka, O., Carle, G.: Verifying security policies using host attributes. In: \u00c1brah\u00e1m, E., Palamidessi, C. (eds.) FORTE 2014. LNCS, vol. 8461, pp. 133\u2013148. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-43613-4_9"},{"issue":"2","key":"16_CR12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM TOCS 32(2), 5 (2014)","journal-title":"ACM TOCS"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Feilkas, M., Ratiu, D., J\u00fcrgens, E.: The loss of architectural knowledge during system evolution: an industrial case study. In: ICPC, pp. 188\u2013197, May 2009","DOI":"10.1109\/ICPC.2009.5090042"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-15168-7_5","volume-title":"Social Informatics","author":"H Kinkelin","year":"2015","unstructured":"Kinkelin, H., Maltitz, M., Peter, B., Kappler, C., Niedermayer, H., Carle, G.: Privacy preserving energy management. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, vol. 8852, pp. 35\u201342. Springer, Cham (2015). doi: 10.1007\/978-3-319-15168-7_5"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Murray, T., Matichuk, D., Brassil, M., Gammie, P., Bourke, T., Seefried, S., Lewis, C., Gao, X., Klein, G.: seL4: from general purpose to a proof of information flow enforcement. In: IEEE S&P, pp. 415\u2013429, May 2013","DOI":"10.1109\/SP.2013.35"},{"key":"16_CR16","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-Order Logic","author":"T Nipkow","year":"2016","unstructured":"Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle\/HOL: A Proof Assistant for Higher-Order Logic. LNCS, vol. 2283. Springer, Heidelberg (2016). http:\/\/isabelle.in.tum.de\/"},{"issue":"6","key":"16_CR17","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s11623-009-0072-9","volume":"33","author":"M Rost","year":"2009","unstructured":"Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele \u2013 revisited. Datenschutz und Datensicherheit DuD 33(6), 353\u2013358 (2009)","journal-title":"Datenschutz und Datensicherheit DuD"},{"key":"16_CR18","unstructured":"Tromer, E., Schuster, R.: DroidDisintegrator: intra-application information flow control in Android apps (extended version). In: ASIA CCS 2016, pp. 401\u2013412. ACM (2016). http:\/\/www.cs.tau.ac.il\/~tromer\/disintegrator\/disintegrator.pdf"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60225-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T05:20:01Z","timestamp":1569388801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60225-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319602240","9783319602257"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60225-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}