{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T22:03:38Z","timestamp":1767909818643,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319983783","type":"print"},{"value":"9783319983790","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98379-0_4","type":"book-chapter","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T09:23:06Z","timestamp":1536139386000},"page":"45-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Provenance Model for the European Union General Data Protection Regulation"],"prefix":"10.1007","author":[{"given":"Benjamin E.","family":"Ujcich","sequence":"first","affiliation":[]},{"given":"Adam","family":"Bates","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"4_CR1","unstructured":"Council of the European Union, Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation). Official J. Eur. Union L 119, 1\u201388 (2016)"},{"issue":"6","key":"4_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30056-3","volume":"2016","author":"C Tankard","year":"2016","unstructured":"Tankard, C.: What the GDPR means for businesses. Netw. Secur. 2016(6), 5\u20138 (2016)","journal-title":"Netw. Secur."},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Bartolini, C., Muthuri, R., Santos, C.: Using ontologies to model data protection requirements in workflows. In: Otake, M., Kurahashi, S., Ota, Y., Satoh, K., Bekki, D. (eds.) New Frontiers in Artificial Intelligence. JSAI-isAI 2015. LNCS, vol. 10091, pp. 233\u2013248. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-50953-2_17","DOI":"10.1007\/978-3-319-50953-2_17"},{"key":"4_CR4","unstructured":"Vijayan, J.: 6 ways to prepare for the EU\u2019s GDPR. InformationWeek, September 2016"},{"key":"4_CR5","unstructured":"Ashford, W.: Much GDPR prep is a waste of time, warns PwC, ComputerWeekly, October 2017"},{"key":"4_CR6","unstructured":"Martin, A., Lyle, J., Namilkuo, C.: Provenance as a security control. In: Proceedings of the Theory and Practice of Provenance 2012. USENIX (2012)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-66284-8_28","volume-title":"Computer Safety, Reliability, and Security","author":"P Bonatti","year":"2017","unstructured":"Bonatti, P., Kirrane, S., Polleres, A., Wenning, R.: Transparent personal data processing: the road ahead. In: Tonetta, S., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2017. LNCS, vol. 10489, pp. 337\u2013349. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66284-8_28"},{"key":"4_CR8","unstructured":"Pandit, H.J., Lewis, D.: Modelling provenance for GDPR compliance using linked open data vocabularies. In: Proceedings of Society, Privacy and the Semantic Web - Policy and Technology 2017 (2017)"},{"key":"4_CR9","unstructured":"World Wide Web Consortium, PROV-DM: The PROV data model, April 2013. https:\/\/www.w3.org\/TR\/prov-dm\/"},{"key":"4_CR10","unstructured":"Council of the European Union, Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 (Data Protection Directive), Official J. Eur. Union L 281, 31\u201350 (1995)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Basin, D., Debois, S., Hildebrandt, T.: On purpose and by necessity: compliance under the GDPR. In: Proceedings of Financial Cryptography and Data Security 2018, March 2018","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-46963-8_1","volume-title":"Current Trends in Web Engineering","author":"H Gjermundr\u00f8d","year":"2016","unstructured":"Gjermundr\u00f8d, H., Dionysiou, I., Costa, K.: privacyTracker: a privacy-by-design GDPR-compliant framework with verifiable data traceability controls. In: Casteleyn, S., Dolog, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9881, pp. 3\u201315. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46963-8_1"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Aldeco-P\u00e9rez, R., Moreau, L.: Provenance-based auditing of private data use. In: Proceedings of Visions of Computer Science 2008, pp. 141\u2013152 (2008)","DOI":"10.14236\/ewic\/VOCS2008.13"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Bier, C.: How usage control and provenance tracking get together - A data protection perspective. In: Proceedings of IEEE 4th International Workshop on Data Usage Management, pp. 13\u201317, May 2013","DOI":"10.1109\/SPW.2013.24"},{"key":"4_CR15","unstructured":"Bates, A., Tian, D., Butler, K.R.B., Moyer, T.: Trustworthy whole-system provenance for the Linux kernel. In: Proceedings of USENIX Security 2015, pp. 319\u2013334 (2015)"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TCC.2015.2489211","volume":"5","author":"T Pasquier","year":"2017","unstructured":"Pasquier, T., Singh, J., Eyers, D., Bacon, J.: CamFlow: managed data-sharing for cloud services. IEEE Trans. Cloud Comput. 5(3), 472\u2013484 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Bates, A., et al.: Transparent web service auditing via network provenance functions. In: Proceedings of the 26th International Conference on World Wide Web, pp. 887\u2013895 (2017)","DOI":"10.1145\/3038912.3052640"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98379-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T14:02:09Z","timestamp":1571839329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98379-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983783","9783319983790"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98379-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}