{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:24Z","timestamp":1740098904732,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614816"},{"type":"electronic","value":"9783319614823"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61482-3_13","type":"book-chapter","created":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T07:38:38Z","timestamp":1497857918000},"page":"215-231","source":"Crossref","is-referenced-by-count":19,"title":["Model-Based Privacy Analysis in Industrial Ecosystems"],"prefix":"10.1007","author":[{"given":"Amir Shayan","family":"Ahmadian","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Str\u00fcber","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Riediger","sequence":"additional","affiliation":[]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,20]]},"reference":[{"key":"13_CR1","unstructured":"Personal data in the cloud: The importance of trust. Technical report, Fujitso Global Business Group, Tokyo 105-7123, Japan, September 2010"},{"key":"13_CR2","unstructured":"CARiSMA (2016). \nhttps:\/\/rgse.uni-koblenz.de\/carisma\/"},{"key":"13_CR3","unstructured":"The European Parliament and the Council of the European Union, Regulation (EU) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Official J. Eur. Union, vol. 199, pp 1\u201388 (April 2016)"},{"key":"13_CR4","unstructured":"VisiOn Project (2016). \nhttp:\/\/www.visioneuproject.eu\/"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Ahmadian, S., J\u00fcrjens, J.: Supporting model-based privacy analysis by exploiting privacy level agreements. In: 8th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2016) (2016)","DOI":"10.1109\/CloudCom.2016.0063"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-06749-0_1","volume-title":"Privacy Technologies and Policy","author":"T Antignac","year":"2014","unstructured":"Antignac, T., M\u00e9tayer, D.: Privacy by design: from technologies to architectures. In: Preneel, B., Ikonomou, D. (eds.) APF 2014. LNCS, vol. 8450, pp. 1\u201317. Springer, Cham (2014). doi:\n10.1007\/978-3-319-06749-0_1"},{"key":"13_CR7","first-page":"42","volume-title":"A Data Privacy Taxonomy","author":"K Barker","year":"2009","unstructured":"Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A Data Privacy Taxonomy, pp. 42\u201354. Springer, Heidelberg (2009)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications. In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 371\u2013378, October 2015","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.53"},{"key":"13_CR9","unstructured":"Breu, R., Burger, K., Hafner, M., J\u00fcrjens, J., Popp, G., Wimmel, G., Lotz, V.: Key issues of a formally based process model for security engineering. In: Sixteenth International Conference \u201cSoftware & Systems Engineering & Their Applications\u201d, Paris (2003)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Cavoukian, A., Chibba, M.: Advancing privacy and security in computing, networking and systems innovations through privacy by design. In: Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2\u20135 November 2009, Toronto, Ontario, Canada, pp. 358\u2013360 (2009)","DOI":"10.1145\/1723028.1723107"},{"key":"13_CR11","unstructured":"Cloud Security Alliance: Privacy Level Agreement [V2]: A Compliance Tool for Providing Cloud Services in the European Union (2013)"},{"issue":"5","key":"13_CR12","doi-asserted-by":"crossref","first-page":"823","DOI":"10.3233\/JCS-140508","volume":"22","author":"F Dupressoir","year":"2014","unstructured":"Dupressoir, F., Gordon, A.D., J\u00fcrjens, J., Naumann, D.A.: Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5), 823\u2013866 (2014). \nhttp:\/\/dx.doi.org\/10.3233\/JCS-140508","journal-title":"J. Comput. Secur."},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Ghazinour, K., Majedi, M., Barker, K.: A lattice-based privacy aware access control model. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 154\u2013159, August 2009","DOI":"10.1109\/CSE.2009.356"},{"key":"13_CR14","unstructured":"G\u00fcrses, S., Gonzalez Troncoso, C., Diaz, C.: Engineering privacy by design. In: Computers, Privacy & Data Protection (2011)"},{"issue":"7","key":"13_CR15","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1002\/spe.1131","volume":"43","author":"M Hafiz","year":"2013","unstructured":"Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exper. 43(7), 769\u2013787 (2013)","journal-title":"Softw. Pract. Exper."},{"key":"13_CR16","first-page":"446","volume-title":"Privacy Design Strategies","author":"JH Hoepman","year":"2014","unstructured":"Hoepman, J.H.: Privacy Design Strategies, pp. 446\u2013459. Springer, Heidelberg (2014)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Jin, X., Sandhu, R.S., Krishnan, R.: RABAC: role-centric attribute-based access control. In: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), pp. 84\u201396 (2012)","DOI":"10.1007\/978-3-642-33704-8_8"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-44618-4_29","volume-title":"CONCUR 2000 \u2014 Concurrency Theory","author":"J J\u00fcrjens","year":"2000","unstructured":"J\u00fcrjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 395\u2013409. Springer, Heidelberg (2000). doi:\n10.1007\/3-540-44618-4_29"},{"key":"13_CR19","unstructured":"J\u00fcrjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge, pp. 93\u2013108 (2001). Proceedings of the 16th International Conference on Information Security (SEC 2001). \nhttp:\/\/www.jurjens.de\/jan"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11554578_2","volume-title":"Foundations of Security Analysis and Design III","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, vol. 3655, pp. 42\u201377. Springer, Heidelberg (2005). doi:\n10.1007\/11554578_2"},{"key":"13_CR21","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"issue":"3","key":"13_CR22","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the PriS method. Requirements Eng. 13(3), 241\u2013255 (2008)","journal-title":"Requirements Eng."},{"key":"13_CR23","first-page":"41","volume-title":"Privacy-Preserving Computation","author":"F Kerschbaum","year":"2014","unstructured":"Kerschbaum, F.: Privacy-Preserving Computation, pp. 41\u201354. Springer, Heidelberg (2014)"},{"key":"13_CR24","unstructured":"Object Management Group (OMG): UML 2.5 Superstructure Specification (2011)"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp. 44\u201352, CLOUD 2009. IEEE Computer Society (2009)","DOI":"10.1109\/CLOUD.2009.5071532"},{"issue":"2","key":"13_CR26","first-page":"63","volume":"5","author":"S Pearson","year":"2009","unstructured":"Pearson, S., Allison, D.: A model-based privacy compliance checker. IJEBR 5(2), 63\u201383 (2009)","journal-title":"IJEBR"},{"issue":"1","key":"13_CR27","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00766-011-0141-0","volume":"17","author":"K Schneider","year":"2012","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., J\u00fcrjens, J.: Enhancing security requirements engineering by organisational learning. Requirements Eng. J. (REJ) 17(1), 35\u201356 (2012)","journal-title":"Requirements Eng. J. (REJ)"},{"issue":"7","key":"13_CR28","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/2209249.2209263","volume":"55","author":"S Spiekermann","year":"2012","unstructured":"Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38\u201340 (2012)","journal-title":"Commun. ACM"},{"issue":"1","key":"13_CR29","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67\u201382 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR30","first-page":"201","volume-title":"Using Purpose Lattices to Facilitate Customisation of Privacy Agreements","author":"W Staden van","year":"2007","unstructured":"van Staden, W., Olivier, M.S.: Using Purpose Lattices to Facilitate Customisation of Privacy Agreements, pp. 201\u2013209. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Modelling Foundations and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61482-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T07:43:57Z","timestamp":1497858237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61482-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614816","9783319614823"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61482-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}