{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:02:51Z","timestamp":1743051771884,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642384899"},{"type":"electronic","value":"9783642384905"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38490-5_41","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T08:50:35Z","timestamp":1371718235000},"page":"455-465","source":"Crossref","is-referenced-by-count":7,"title":["Privacy in the Cloud: Bridging the Gap between Design and Implementation"],"prefix":"10.1007","author":[{"given":"Vassilis","family":"Manousakis","sequence":"first","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]},{"given":"Evangelia","family":"Kavakli","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"Cloud Security Alliance, Top Threats to Cloud Computing V1.0, \n                    \n                      https:\/\/cloudsecurityalliance.org\/topthreats\/csathreats.v1.0.pdf\n                    \n                    \n                   (retrieved September 22, 2012)"},{"key":"41_CR2","unstructured":"Heiser, J., Nicolett, M.: Assessing the Security Risks of Cloud Computing, white paper, Gartner group, ID Number: G00157782 (June 3, 2008)"},{"issue":"1","key":"41_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S. Subashini","year":"2010","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications\u00a034(1), 1\u201311 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"41_CR4","unstructured":"Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, \n                    \n                      https:\/\/cloudsecurityalliance.org\/guidance\/csaguide.v3.0.pdf\n                    \n                    \n                   (retrieved September 22, 2012)"},{"key":"41_CR5","unstructured":"Draft, EU Directive for Security issues in Cloud Computing (2012)"},{"key":"41_CR6","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: PriS Methodology: Incorporating Privacy Requirements into the System Design Process. In: Mylopoulos, J., Spafford, G. (eds.) Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference \u2013 Symposium on Requirements Engineering for Information Security. IEEE CPS, Paris (2005)"},{"issue":"3","key":"41_CR7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C. Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: The PriS method. Requirements Engineering\u00a013(3), 241\u2013255 (2008)","journal-title":"Requirements Engineering"},{"issue":"1","key":"41_CR8","first-page":"3","volume":"6","author":"C. Kalloniatis","year":"2010","unstructured":"Kalloniatis, C., Kavakli, E., Kontellis, E.: PRIS tool: A case tool for privacy-oriented Requirements Engineering. Journal of Information Systems Security\u00a06(1), 3\u201319 (2010)","journal-title":"Journal of Information Systems Security"},{"issue":"2","key":"41_CR9","first-page":"140","volume":"16","author":"E. Kavakli","year":"2006","unstructured":"Kavakli, E., Kalloniatis, C., Loucopoulos, P., Gritzalis, S.: Incorporating Privacy Requirements into the System Design Process: The PriS Conceptual Framework. Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice\u00a016(2), 140\u2013158 (2006)","journal-title":"Internet Research, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice"},{"key":"41_CR10","unstructured":"Kalloniats, C., Kavakli, E., Gritzalis, S.: Dealing with Privacy Issues during the System Design Process. In: 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, December 18-21, pp. 18\u201321 (2005)"},{"key":"41_CR11","unstructured":"Mouratidis, H., Kalloniatis, C., Islam, S., Huget, M.P., Gritzalis, S.: Aligning Security and Privacy to support the development of Secure Information Systems. Journal of Universal Computer Science (2012)"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension Of The Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering (2007)","DOI":"10.1142\/S0218194007003240"},{"issue":"8","key":"41_CR13","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1016\/j.is.2007.03.002","volume":"32","author":"Mouratidis","year":"2007","unstructured":"Mouratidis, Giorgini, P.: Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst.\u00a032(8), 1166\u20131183 (2007)","journal-title":"Inf. Syst."},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Wei, L., et al.: Managing Security of Virtual Machine Images in a Cloud Environment (2009)","DOI":"10.1145\/1655008.1655021"},{"key":"41_CR15","unstructured":"Microsoft Technical report: Privacy in the cloud computing era, a Microsoft perspective, Microsoft Corp, Redmond, USA (November 2009)"},{"key":"41_CR16","unstructured":"Sonehara, N., et al.: Isolation in Cloud Computing and Privacy \u2013 Enhancing Technologies \u2013 Suitability of Privacy \u2013 Enchancing Technologies for Separating Data Usage in Business Processes, National Institute of Informatics, Chiyoda-Ku, Tokyo (2005)"},{"key":"41_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, O.Q., et al.: How To Track Your Data: The Case for Cloud Computing Provenance, HP Laboratories, HPL-2012-11 (2012)","DOI":"10.1109\/CloudCom.2011.66"},{"key":"41_CR18","unstructured":"Viswanathan, A., Neuman, B.C.: A survey of isolation techniques. Draft Copy, University of Southern California"},{"key":"41_CR19","doi-asserted-by":"crossref","unstructured":"Singh, M.D., et al.: A cryptography based privacy preserving solution to mine cloud a data, Infosys Technologies Limited, Bangalore, India (2010)","DOI":"10.1145\/1754288.1754302"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38490-5_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:15:14Z","timestamp":1558379714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38490-5_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384899","9783642384905"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38490-5_41","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}