{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:54:05Z","timestamp":1725792845427},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642551369"},{"type":"electronic","value":"9783642551376"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55137-6_17","type":"book-chapter","created":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T21:34:40Z","timestamp":1398980080000},"page":"214-223","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case"],"prefix":"10.1007","author":[{"given":"Svetlana","family":"Sapelova","sequence":"first","affiliation":[]},{"given":"Borka","family":"Jerman-Bla\u017ei\u010d","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"A Roadmap for a Pan-European eIDM Framework by 2010 (2010), \n                    \n                      http:\/\/ec.europa.eu\/information_society\/activities\/ict_psp\/documents\/eidm_roadmap_paper.pdf"},{"key":"17_CR2","unstructured":"Cavoukian, A.: A Foundation Framework for a Privacy by Design \u2013 Privacy Impact Assessment (2011), \n                    \n                      http:\/\/privacybydesign.ca\/content\/uploads\/2011\/11\/PbD-PIA-Foundational-Framework.pdf"},{"key":"17_CR3","unstructured":"Commission of the European Communities: i2010 eGovernment Action Plan, Brussels (2006), \n                    \n                      http:\/\/europa.eu\/legislation_summaries\/information_society\/strategies\/l24226j_en.htm"},{"key":"17_CR4","unstructured":"de Andrade, N.N.G.: Towards a European eID Regulatory Framework, Challenges in Constructing a Legal Framework for the Protection and Management of Electronic Identities. In: Gutwirth, S., et al. (eds.) European Data Protection: In Good Health? (2002)"},{"key":"17_CR5","unstructured":"Document on IDABC - Interoperability Activities, \n                    \n                      http:\/\/ec.europa.eu\/idabc\/en\/document\/5319\/5883.html"},{"key":"17_CR6","unstructured":"European Commission, How does the data protection reform strengthen citizens\u2019 rights? \n                    \n                      http:\/\/ec.europa.eu\/justice\/data-protection\/document\/review2012\/factsheets\/2_en.pdf"},{"key":"17_CR7","unstructured":"European Union (EU), Directive 2006\/123\/EC of the European Parliament and of the council on services in the internal market. Official Journal of European Communities of 23 November 1995, No L. 376, 36 (1995)"},{"key":"17_CR8","unstructured":"European Union (EU), Directive 95\/46\/EC of the European Parliament and of the Council on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data. Official Journal of the European Communities of 23 November 1995, No L. 281, 31 (1995)"},{"key":"17_CR9","unstructured":"FIDIS, Future of Identity in the Information Society, \n                    \n                      http:\/\/www.fidis.net\/"},{"key":"17_CR10","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-31668-5_2","volume-title":"Privacy and Identity Management for Life","author":"M. Hansen","year":"2012","unstructured":"Hansen, M.: Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol.\u00a0375, pp. 14\u201331. Springer, Heidelberg (2012)"},{"key":"17_CR11","unstructured":"Jori, A.: Data Protection Law \u2013 An Introduction. Privacy and privacy protection (2007), \n                    \n                      http:\/\/www.dataprotection.eu\/pmwiki\/pmwiki.php?n=Main.Privacy"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Lusoli, W., Maghiros, I., Bacigalupo, M.: eID policy in a turbulent environment: is there a need for a new regulatory framework? European Commission Joint Research Centre (2009)","DOI":"10.1007\/s12394-009-0011-9"},{"key":"17_CR13","unstructured":"Majava, J., Graux, H.: Common specifications for eID interoperability in the eGovernment context, eID Interoperability for PEGS. Technical Report, IDABC eGovernment eServices (2007)"},{"key":"17_CR14","unstructured":"Modinis-IDM, \n                    \n                      https:\/\/www.cosic.esat.kuleuven.be\/modinis-idm\/twiki\/bin\/view.cgi"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Otjacques, B., Hitzelberger, P., Feltz, F.: Identity Management and Data Sharing in the European Union. In: 39th Hawaii International Conference on System Sciences (2006)","DOI":"10.1109\/HICSS.2006.211"},{"key":"17_CR16","unstructured":"Personal Identifiable Information, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information"},{"issue":"2","key":"17_CR17","first-page":"189","volume":"8","author":"K. Stefanova","year":"2010","unstructured":"Stefanova, K., Kabakchieva, D., Nikolov, R.: Design Principles of Identity Management Architecture Development for Cross-Border eGovernment Services. Electronic Journal of e-Government\u00a08(2), 189\u2013202 (2010)","journal-title":"Electronic Journal of e-Government"},{"key":"17_CR18","unstructured":"Stern, M.: D5.8.3d Security Principles and Best Practices. STORK Deliverable (2011)"},{"key":"17_CR19","unstructured":"STORK, Secure identity across borders linked, \n                    \n                      https:\/\/www.eid-stork.eu\/"},{"key":"17_CR20","unstructured":"STORK2 \u2013 Secure identity across borders linked 2.0, \n                    \n                      https:\/\/www.eid-stork2.eu\/"},{"key":"17_CR21","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-642-20769-3_17","volume-title":"Privacy and Identity Management for Life","author":"S. Strau\u00df","year":"2011","unstructured":"Strau\u00df, S.: The Limits of Control \u2013 (Governmental) Identity Management from a Privacy Perspective. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol.\u00a0352, pp. 206\u2013218. Springer, Heidelberg (2011)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Svantesson, D., Clarke, R.: Privacy and consumer risks in cloud computing. Computer Law & Security Review, 391\u2013397 (2010)","DOI":"10.1016\/j.clsr.2010.05.005"},{"key":"17_CR23","unstructured":"Whittaker, Z.: Yes, U.S. authorities can spy on EU cloud data. Here\u2019s how, \n                    \n                      http:\/\/www.zdnet.com\/yes-u-s-authorities-can-spy-on-eu-cloud-data-heres-how-7000010653\/"},{"key":"17_CR24","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-31668-5_19","volume-title":"Privacy and Identity Management for Life","author":"H. Zwingelberg","year":"2012","unstructured":"Zwingelberg, H., Hansen, M.: Privacy Protection Goals and Their Implications for eID Systems. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol.\u00a0375, pp. 245\u2013260. Springer, Heidelberg (2012)"},{"key":"17_CR25","unstructured":"European Commission, Proposal for a Regulation of the European Parlament and of the Council, on the protection of individuals with regards to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels (2012)"},{"key":"17_CR26","unstructured":"Marchini, R.: Cloud Computing Under The European Commission, Proposed Regulation To Revise The EU Data Protection Framework. In: World Data Protection Report, vol.\u00a012, Bloomberg BNA (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Emerging Services and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55137-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T14:24:06Z","timestamp":1558880646000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55137-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642551369","9783642551376"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55137-6_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}