{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:31:48Z","timestamp":1766579508481},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2020,9,1]]},"DOI":"10.1109\/mitp.2020.2973852","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T20:40:54Z","timestamp":1599770454000},"page":"81-89","source":"Crossref","is-referenced-by-count":21,"title":["Enterprise API Security and GDPR Compliance: Design and Implementation Perspective"],"prefix":"10.1109","volume":"22","author":[{"given":"Fatima","family":"Hussain","sequence":"first","affiliation":[{"name":"Royal Bank of Canada"}]},{"given":"Rasheed","family":"Hussain","sequence":"additional","affiliation":[{"name":"Innopolis University"}]},{"given":"Brett","family":"Noye","sequence":"additional","affiliation":[{"name":"Royal Bank of Canada"}]},{"given":"Salah","family":"Sharieh","sequence":"additional","affiliation":[{"name":"Royal Bank of Canada"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Greenhouse, EU compliance, and the general data protection regulation (GDPR)","year":"2018"},{"key":"ref11","article-title":"Tackling GDPR compliance before time runs out","year":"2018"},{"key":"ref12","article-title":"How is lever supporting our customers GDPR compliance efforts?","year":"2018"},{"key":"ref13","article-title":"GDPR compliance steps","year":"2018"},{"key":"ref14","article-title":"Rights of the data subject","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3086512.3086513"},{"key":"ref16","article-title":"Guidelines on automated individual decision-making and profiling for the purposes of regulation","author":"justice","year":"2018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915605575"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1093\/ijlit\/eax010","article-title":"Data localization laws: Trade barriers or legitimate responses to cyber security risks, or both?","volume":"25","author":"selby","year":"0","journal-title":"Proc Int J Law Inf Technol"},{"key":"ref19","article-title":"Machine learning with personal data","author":"kamarinou","year":"2016","journal-title":"Queen Mary School of Law Legal Studies Research"},{"key":"ref4","article-title":"How to make your product GDPR compliant","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.11.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3267357.3267368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3274152"},{"key":"ref8","first-page":"15","article-title":"Privacyguide: Towards an implementation of the EU GDPR on internet privacy policy evaluation","author":"tesfay","year":"0","journal-title":"Proc ACM Int Workshop Secur Privacy Anal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2629432"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1109\/NTPE.2019.9778101","article-title":"Current state of API security and machine learning","author":"hussain","year":"2019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biombioe.2017.04.005"},{"key":"ref9","article-title":"Comply with GDPR","year":"2019"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.42"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6294\/9194371\/09194432.pdf?arnumber=9194432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T20:21:09Z","timestamp":1668716469000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9194432\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":20,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2020.2973852","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"value":"1520-9202","type":"print"},{"value":"1941-045X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}