{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:27:36Z","timestamp":1764174456039,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_13","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T16:44:29Z","timestamp":1513874669000},"page":"189-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A UML Profile for Privacy-Aware Data Lifecycle Models"],"prefix":"10.1007","author":[{"given":"Majed","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Simpson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"13_CR1","unstructured":"Alshammari, M., Simpson, A.C.: Personal Data Management for Privacy Engineering: An Abstract Personal Data Lifecycle Model (2017). https:\/\/www.cs.ox.ac.uk\/publications\/publication10942-abstract.html"},{"key":"13_CR2","unstructured":"American Institute of Certified Public Accountants and Canadian Institute of Chartered Accountants (AICPA\/CICA): Generally Accepted Privacy Principles (2009). https:\/\/www.cippguide.org\/2010\/07\/01\/generally-accepted-privacy-principles-gapp\/"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1007\/978-3-319-47166-2_65","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"T Antignac","year":"2016","unstructured":"Antignac, T., Scandariato, R., Schneider, G.: A privacy-aware conceptual model for handling personal data. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 942\u2013957. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_65"},{"key":"13_CR4","unstructured":"Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: PrETP: privacy-preserving electronic toll pricing. In: Proceedings of the 19th USENIX Security Symposium, pp. 63\u201378 (2010)"},{"key":"13_CR5","unstructured":"Cavoukian, A.: Creation of a Global Privacy Standard (2006). https:\/\/www.ipc.on.ca\/images\/Resources\/gps.pdf"},{"key":"13_CR6","unstructured":"Cavoukian, A.: Privacy by design... take the challenge. Office of the Information and Privacy Commissioner of Ontario (2009)"},{"issue":"1","key":"13_CR7","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s12394-009-0012-8","volume":"1","author":"C Diaz","year":"2008","unstructured":"Diaz, C., Kosta, E., Dekeyser, H., Kohlweiss, M., Nigusse, G.: Privacy preserving electronic petitions. Identity Inf. Soc. 1(1), 203\u2013219 (2008)","journal-title":"Identity Inf. Soc."},{"issue":"3","key":"13_CR8","first-page":"25","volume":"14","author":"S G\u00fcrses","year":"2011","unstructured":"G\u00fcrses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011)","journal-title":"Comput. Priv. Data Prot."},{"key":"13_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"J-H Hoepman","year":"2014","unstructured":"Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 446\u2013459. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_38"},{"key":"13_CR10","unstructured":"Joyee De, S., Le M\u00e9tayer, D.: A refinement approach for the reuse of privacy risk analysis results. In: Proceedings of the Fifth ENISA Annual Privacy Forum (APF 2017), pp. 73\u2013109. \u00d6sterreichische Computer Gesellschaft (2017)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 \u2014 The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending uml for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_32"},{"key":"13_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/b137706","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b137706"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Mart\u00edn, Y.S., Del Alamo, J.M., Yelmo, J.C.: Engineering privacy requirements valuable lessons from another realm. In: 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pp. 19\u201324. IEEE (2014)","DOI":"10.1109\/ESPRE.2014.6890523"},{"key":"13_CR14","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"HF Nissenbaum","year":"2009","unstructured":"Nissenbaum, H.F.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)"},{"key":"13_CR15","unstructured":"Object Management Group: OMG Unified Modeling Language (OMG UML) (2015). http:\/\/www.omg.org\/spec\/UML\/"},{"issue":"2","key":"13_CR16","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"MC Oetzel","year":"2014","unstructured":"Oetzel, M.C., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126\u2013150 (2014)","journal-title":"Eur. J. Inf. Syst."},{"issue":"3","key":"13_CR17","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D.J.: A taxonomy of privacy. Univ. Pa. Law Rev. 154(3), 477\u2013564 (2006)","journal-title":"Univ. Pa. Law Rev."},{"key":"13_CR18","unstructured":"The European Commission: The European Electronic Toll Service (EETS): 2011 Guide for the Application of the Directive on the Interoperability of Electronic Road Toll Systems (2011). http:\/\/ec.europa.eu\/transport\/themes\/its\/road\/application_areas\/electronic_pricing_and_payment_en"},{"key":"13_CR19","unstructured":"The European Union: Official Journal of the European Communities: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:31995L0046&from=EN"},{"key":"13_CR20","unstructured":"The European Union: Official Journal of the European Communities: Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (2002). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32002L0058&from=EN"},{"key":"13_CR21","unstructured":"The European Union: Official Journal of the European Communities: Directive 2004\/52\/EC Of the European Parliament and of the Council of 29 April 2004 on the interoperability of electronic road toll systems in the Community (2004). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32004L0052R%2801%29&from=EN"},{"key":"13_CR22","unstructured":"The European Union: Official Journal of the European Communities: Commission Decision 2009\/750\/EC of 6 October 2009 on the definition of the European Electronic Toll Service and its technical elements (2009). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32009D0750"},{"key":"13_CR23","unstructured":"The European Union: Official Journal of the European Union: General Data Protection Regulation (2016). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32016R0679"},{"key":"13_CR24","unstructured":"United States Department of Health, Education and Welfare: Secretary\u2019s Advisory Committee on Automated Personal Data Systems: Records, Computers and the Rights of Citizens: Report. MIT Press, Cambridge (1973)"},{"issue":"1","key":"13_CR25","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","volume":"28","author":"D Wright","year":"2012","unstructured":"Wright, D.: The state of the art in privacy impact assessment. Comput. Law Secur. Rev. 28(1), 54\u201361 (2012)","journal-title":"Comput. Law Secur. Rev."}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T17:47:07Z","timestamp":1603561627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}