{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:57:24Z","timestamp":1725901044508},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642316678"},{"type":"electronic","value":"9783642316685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31668-5_3","type":"book-chapter","created":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T04:34:43Z","timestamp":1340858083000},"page":"32-44","source":"Crossref","is-referenced-by-count":1,"title":["Developing a Strategy for Automated Privacy Testing Suites"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Agrafiotis","sequence":"first","affiliation":[]},{"given":"Sadie","family":"Creese","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goldsmith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-14282-6_20","volume-title":"Privacy and Identity Management for Life","author":"I. Agrafiotis","year":"2010","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Reaching for Informed Revocation: Shutting Off the Tap on Personal Data. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol.\u00a0320, pp. 246\u2013258. Springer, Heidelberg (2010)"},{"key":"3_CR2","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-20769-3_22","volume-title":"Privacy and Identity Management for Life","author":"I. Agrafiotis","year":"2011","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0352, pp. 271\u2013282. Springer, Heidelberg (2011)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Armando, A., Carbone, R., Compagna, L., Li, K., Pellegrino, G.: Model-checking driven security testing of web-based applications. In: Third International Conference on Software Testing, Verification, and Validation Workshops (ICSTW), pp. 361\u2013370. IEEE (2010)","DOI":"10.1109\/ICSTW.2010.54"},{"key":"3_CR4","unstructured":"Mont, M.C., Pearson, S., Kounga, G., Shen, Y., Bramhall, P.: Privacy and identity management in europe: overview of existing assurance methods in the area of privacy and IT Security. Technical report, HP Labs, Bristol (2004)"},{"key":"3_CR5","unstructured":"http:\/\/www.encore-project.info"},{"issue":"1-2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0167-6423(96)00032-9","volume":"29","author":"J.C. Fernandez","year":"1997","unstructured":"Fernandez, J.C., Jard, C., J\u00e9ron, T., Viho, C.: An experiment in automatic generation of test suites for protocols with verification technology. Science of Computer Programming\u00a029(1-2), 123\u2013146 (1997)","journal-title":"Science of Computer Programming"},{"key":"3_CR7","unstructured":"British Computer Society Specialist Interest\u00a0Group in\u00a0Software Testing (BCS\u00a0SIGIST). Standard for software component testing. Technical report, British Computer Society, Working Draft 3.4 (2001)"},{"key":"3_CR8","unstructured":"Westin, A.F.: Privacy and freedom, London, vol.\u00a097 (1967)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Whitley, E.A.: Information privacy consent and the \u2018control\u2019 of personal data. Inform. Secur. Tech. Rep. (2009), doi:10.1016\/j.istr.2009.10.001","DOI":"10.1016\/j.istr.2009.10.001"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Life"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31668-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:43:20Z","timestamp":1620128600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31668-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316678","9783642316685"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31668-5_3","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}