{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T18:11:48Z","timestamp":1759515108759,"version":"3.38.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,4]]},"DOI":"10.1109\/csnet64211.2024.10851761","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:01Z","timestamp":1738089301000},"page":"263-267","source":"Crossref","is-referenced-by-count":2,"title":["Regulatory Compliance Verification: A Privacy Preserving Approach"],"prefix":"10.1109","author":[{"given":"Massimo","family":"Morello","sequence":"first","affiliation":[{"name":"Eotvos Lorand University,Department of Computer Algebra,Budapest,Hungary"}]},{"given":"Petri","family":"Sainio","sequence":"additional","affiliation":[{"name":"University of Turku,Department of Computing,Finland"}]},{"given":"Mohammed","family":"Alshawki","sequence":"additional","affiliation":[{"name":"Eotvos Lorand University,Department of Computer Algebra,Budapest,Hungary"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03146-6_175"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2397-5_58"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.12681\/eadd\/52052"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/AISPE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2016.01.01"},{"key":"ref6","article-title":"The evolution of cyber threat intelligence (cti): 2019 sans cti survey","volume-title":"SANS Institute","author":"Brown","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3677"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2019.08.033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916234"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/VJIKMS-05-2019-0064"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-03-2019-0119"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/fi14010011"},{"volume-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation)","year":"2016","key":"ref13"},{"journal-title":"Soc 2 description criteria","year":"2018","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-53r5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITNAC55475.2022.9998348"},{"key":"ref17","first-page":"129","article-title":"Attribute-based encryption with veri-fiable outsourced decryption","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","author":"Sahai","year":"2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"volume-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation)","year":"2016","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16815-4_35"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET55527.2022.9872711"},{"article-title":"What is cloud computing?","volume-title":"InfoWorld","year":"2014","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00049"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES51467.2021.00013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2999559"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3100152"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3585538"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1171"},{"journal-title":"A technology acceptance model for empirically testing new end-user information systems","year":"1985","author":"Davis","key":"ref29"}],"event":{"name":"2024 8th Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2024,12,4]]},"location":"Paris, France","end":{"date-parts":[[2024,12,6]]}},"container-title":["2024 8th Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851715\/10851472\/10851761.pdf?arnumber=10851761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:20Z","timestamp":1740595400000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/csnet64211.2024.10851761","relation":{},"subject":[],"published":{"date-parts":[[2024,12,4]]}}}