{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:26:43Z","timestamp":1764174403004,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319649993"},{"type":"electronic","value":"9783319650005"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65000-5_3","type":"book-chapter","created":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T22:15:06Z","timestamp":1502230506000},"page":"40-56","source":"Crossref","is-referenced-by-count":21,"title":["PE-BPMN: Privacy-Enhanced Business Process Model and Notation"],"prefix":"10.1007","author":[{"given":"Pille","family":"Pullonen","sequence":"first","affiliation":[]},{"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Bogdanov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,10]]},"reference":[{"key":"3_CR1","unstructured":"Privacy management reference model and methodology (PMRM) version 1.0. OASIS Committee Specification 02 (2016). http:\/\/docs.oasis-open.org\/pmrm\/PMRM\/v1.0\/cs02\/PMRM-v1.0-cs02.html"},{"issue":"C","key":"3_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.is.2013.12.006","volume":"47","author":"R Accorsi","year":"2015","unstructured":"Accorsi, R., Lehmann, A., Lohmann, N.: Information leak detection in business process models. Inf. Syst. 47(C), 244\u2013257 (2015)","journal-title":"Inf. Syst."},{"issue":"4","key":"3_CR3","first-page":"93","volume":"4","author":"O Altuhhova","year":"2013","unstructured":"Altuhhova, O., Matulevi\u010dius, R., Ahmed, N.: An extension of business process model and notification for security risk management. IJISMD 4(4), 93\u2013113 (2013)","journal-title":"IJISMD"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Ayed, G.B., Ghernaouti-Helie, S.: Processes view modeling of identity-related privacy business interoperability: considering user-supremacy federated identity technical model and identity contract negotiation. In: 2012 Proceedings of the ASONAM (2012)","DOI":"10.1109\/ASONAM.2012.162"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313\u2013317. AFIPS Press (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-662-46803-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"E Boyle","year":"2015","unstructured":"Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 337\u2013367. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46803-6_12"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Brucker, A.D., Hang, I., L\u00fcckemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access control requirements in business processes. In: Proceedings of the SACMAT 2012, pp. 123\u2013126. ACM (2012)","DOI":"10.1145\/2295136.2295160"},{"key":"3_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-33155-8_9","volume-title":"Business Process Model and Notation","author":"Y Cherdantseva","year":"2012","unstructured":"Cherdantseva, Y., Hilton, J., Rana, O.: Towards SecureBPMN - aligning BPMN with the information assurance and security domain. In: Mendling, J., Weidlich, M. (eds.) BPMN 2012. LNBIP, vol. 125, pp. 107\u2013115. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33155-8_9"},{"key":"3_CR9","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-H., Metayer, D.L., Tirtea, R., Schiffner, S.: Privacy and data protection by design-from policy to engineering. Technical report, European Union Agency for Network and Information Security (2015)"},{"issue":"6","key":"3_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"2006","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644\u2013654 (2006)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"3_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-319-46263-9_4","volume-title":"Graphical Models for Security","author":"M Dumas","year":"2016","unstructured":"Dumas, M., Garc\u00eda-Ba\u00f1uelos, L., Laud, P.: Differential privacy analysis of data processing workflows. In: Kordy, B., Ekstedt, M., Kim, D.S. (eds.) GraMSec 2016. LNCS, vol. 9987, pp. 62\u201379. Springer, Cham (2016). doi: 10.1007\/978-3-319-46263-9_4"},{"key":"3_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.: Fundamentals of Business Process Management. Springer, Heidelberg (2013)"},{"key":"3_CR13","unstructured":"Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016). http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"3_CR14","unstructured":"Joint Task Force and Transformation Initiative: Security and privacy controls for federal information systems and organizations. NIST Special Publication, 800:53 (2013)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 169\u2013178. ACM, New York (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"3_CR16","unstructured":"Greenberg, A.: Apple\u2019s \u2018Differential Privacy\u2019 is about collecting your data-but not your data. Wired (2016)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1\u201317 (2015)","journal-title":"Comput. Secur."},{"key":"3_CR18","unstructured":"ISO\/IEC DIS 29134: Information technology - security techniques - privacy impact assessment - guidelines. Technical report, International Organization for Standardization (2016)"},{"key":"3_CR19","unstructured":"Koorn, R., van Gils, H., ter Hart, J., Overbeek, P., Tellegen, R., Borking, J.: Privacy Enhancing Technologies, White Paper for Decision Makers. Ministry of the Interior and Kingdom Relations, The Netherlands (2004)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Ladha, W., Mehandjiev, N., Sampaio, P.: Modelling of privacy-aware business processes in BPMN to protect personal data. In: Proceedings of the 29th Annual ACM Symposium on Applied Computing, pp. 1399\u20131405 (2014)","DOI":"10.1145\/2554850.2555014"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: ARES 2009, pp. 41\u201349 (2009)","DOI":"10.1109\/ARES.2009.90"},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jsse.2012070101","volume":"3","author":"H Mouratidis","year":"2012","unstructured":"Mouratidis, H., Kalloniatis, C., Islam, S., Hudic, A., Zechner, L.: Model based process to support security and privacy requirements engineering. Int. J. Secur. Softw. Eng. 3(3), 1\u201322 (2012)","journal-title":"Int. J. Secur. Softw. Eng."},{"key":"3_CR23","unstructured":"OMG: Business Process Model and Notation (BPMN). http:\/\/www.omg.org\/spec\/BPMN\/2.0\/"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A Rodriguez","year":"2007","unstructured":"Rodriguez, A., Fernandez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745\u2013752 (2007)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Schleicher, D., Leymann, F., Schumm, D., Weidmann, M.: Compliance scopes: extending the BPMN 2.0 meta model to specify compliance requirements. In: SOCA 2010, pp. 1\u20138 (2010)","DOI":"10.1109\/SOCA.2010.5707154"},{"issue":"11","key":"3_CR26","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D.J.: A taxonomy of privacy. Univ. Pa. Law Rev. 154, 477\u2013564 (2006)","journal-title":"Univ. Pa. Law Rev."},{"key":"3_CR28","unstructured":"Weiss, M.A., Archick, K.: US-EU Data Privacy: From Safe Harbor to Privacy Shield. Congressional Research Service (2016)"}],"container-title":["Lecture Notes in Computer Science","Business Process Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65000-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:41:57Z","timestamp":1569976917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65000-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319649993","9783319650005"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65000-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}