{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:05:44Z","timestamp":1773792344723,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1109\/icecs.2007.4511073","type":"proceedings-article","created":{"date-parts":[[2008,5,5]],"date-time":"2008-05-05T16:21:05Z","timestamp":1210004465000},"page":"641-644","source":"Crossref","is-referenced-by-count":3,"title":["Trustworthiness: safety, security and privacy issues"],"prefix":"10.1109","author":[{"given":"J.","family":"Gorski","sequence":"first","affiliation":[{"name":"Gdansk University of Technology, Gdank, Poland"}]},{"given":"G.","family":"Golaszewski","sequence":"additional","affiliation":[{"name":"Gdansk University of Technology, Gdank, Poland"}]},{"given":"J.","family":"Miler","sequence":"additional","affiliation":[{"name":"Gdansk University of Technology, Gdank, Poland"}]},{"given":"M.","family":"Piechowka","sequence":"additional","affiliation":[{"name":"Gdansk University of Technology, Gdank, Poland"}]},{"given":"H.","family":"Baldus","sequence":"additional","affiliation":[{"name":"Philips Research Europe, Aachen, Germany"}]}],"member":"263","reference":[{"key":"ref10","year":"0","journal-title":"RiskGuide tool homepage"},{"key":"ref11","year":"0","journal-title":"EU Directive 95\/46\/EC the Data Protection Directive"},{"key":"ref12","year":"2002","journal-title":"Directive 2002\/58\/EC of the European Parilament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector"},{"key":"ref13","year":"0","journal-title":"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data"},{"key":"ref14","article-title":"HIPAA Privacy Rule, Health Insurance Portability and Accountability Act","year":"0","journal-title":"U S Department of Health & Human Services"},{"key":"ref15","article-title":"Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process","author":"caralli","year":"0","journal-title":"CMU\/SEI-2007-TR-012"},{"key":"ref16","article-title":"The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software","author":"howard","year":"2006"},{"key":"ref17","year":"2006","journal-title":"OWASP"},{"key":"ref18","article-title":"HIPAA Security Rule, Health Insurance Portability and Accountability Act","year":"0","journal-title":"U S Department of Health & Human Services"},{"key":"ref19","year":"0","journal-title":"ISO\/IEC 15408&#x2013;2005-Information technology - Security techniques Evaluation criteria for IT security Part 1 & Part 2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2004.08.005"},{"key":"ref3","article-title":"Trust-IT - a framework for trust cases","author":"g\u00f3rski","year":"0","journal-title":"Workshop on Assurance Cases for Security - The Metrics Challenge DSN 2007 The 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"},{"key":"ref6","article-title":"Supporting compliance with safety standards by trust case templates","author":"cyra","year":"2007","journal-title":"ESREL"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2007.44"},{"key":"ref8","year":"0"},{"key":"ref7","year":"2006","journal-title":"TCT User Manual Information Assurance Group Gdansk University of Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3381-8_7"},{"key":"ref1","article-title":"Angel system & platform architecture","author":"bruynen","year":"0"},{"key":"ref9","article-title":"A Service-Oriented Approach to the Identification of IT Risk","author":"miler","year":"2005","journal-title":"Proc of 1st IEEE Intern Conference on Technologies for Homeland Security and Safety TEHOSS'2005"},{"key":"ref20","article-title":"Key Management for Mobile Sensor Networks","author":"sanchez","year":"2005","journal-title":"Mobile Ad-hoc Networks and Sensors Workshop (MADNES 2005)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.2"}],"event":{"name":"2007 14th IEEE International Conference on Electronics, Circuits and Systems","location":"Marrakech, Morocco","start":{"date-parts":[[2007,12,11]]},"end":{"date-parts":[[2007,12,14]]}},"container-title":["2007 14th IEEE International Conference on Electronics, Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4456901\/4510892\/04511073.pdf?arnumber=4511073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:21:06Z","timestamp":1773778866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4511073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icecs.2007.4511073","relation":{},"subject":[],"published":{"date-parts":[[2007,12]]}}}