{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:35:11Z","timestamp":1740141311624,"version":"3.37.3"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836207"],"award-info":[{"award-number":["U1836207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Key R and D Program of China","award":["2018YFC0830900","2019YFE0103800"],"award-info":[{"award-number":["2018YFC0830900","2019YFE0103800"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/msec.2021.3078218","type":"journal-article","created":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T20:27:30Z","timestamp":1622492850000},"page":"37-43","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Compliance: Can Technology Come to the Rescue?"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9499-2108","authenticated-orcid":false,"given":"Wenqiang","family":"Ruan","sequence":"first","affiliation":[{"name":"Software School, Fudan University, Shanghai, ShangHai, China"}]},{"given":"Mingxin","family":"Xu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, Shanghai, China"}]},{"given":"Haoyang","family":"Jia","sequence":"additional","affiliation":[{"name":"Software School, Fudan University, Shanghai, Shanghai, China"}]},{"given":"Zhenhuan","family":"Wu","sequence":"additional","affiliation":[{"name":"The information center, Ministry of Justice of the People&#x0027;s Republic of China, Beijing, Beijing, China"}]},{"given":"LuShan","family":"Song","sequence":"additional","affiliation":[{"name":"Software School, Fudan University, Shanghai, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8663-436X","authenticated-orcid":false,"given":"Weili","family":"Han","sequence":"additional","affiliation":[{"name":"Software School, Fudan University, Shanghai, ShangHai, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMT.2009.11"},{"journal-title":"GDPR enforcement tracker","year":"2021","key":"ref11"},{"journal-title":"China&#x2019;s personal information protection law (PIPL) - data privacy in the land of big data","year":"2021","key":"ref12"},{"journal-title":"Information Security Technology Personal Information (PI) Security Specification (English translation)","year":"2020","author":"shi","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"journal-title":"SoK Training machine learning models over multiple sources with privacy preservation","year":"2020","author":"song","key":"ref15"},{"key":"ref16","first-page":"163","article-title":"I read but don&#x2019;t agree: Privacy policy benchmarking using machine learning and the EU GDPR","author":"tesfay","year":"0","journal-title":"Proc Companion Web Conf"},{"journal-title":"General Data Protection Regulation","year":"2019","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00086"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjghvnn"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21752-5_12"},{"journal-title":"FTC imposes $5 billion penalty and sweeping new privacy restrictions on Facebook","year":"2019","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3047307"},{"journal-title":"Digital Identity Guidelines","year":"2017","author":"grassi","key":"ref8"},{"journal-title":"Digital identity guidelines Authentication and lifecycle management [includes updates as of 03-02- 2020]","year":"2020","author":"grassi","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_33"},{"journal-title":"YouTube fined $170m for collecting children&#x2019;s personal data","year":"2019","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33752-0_1"}],"container-title":["IEEE Security &amp; Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/9475176\/09444564.pdf?arnumber=9444564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:22Z","timestamp":1652194342000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9444564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":20,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/msec.2021.3078218","relation":{},"ISSN":["1540-7993","1558-4046"],"issn-type":[{"type":"print","value":"1540-7993"},{"type":"electronic","value":"1558-4046"}],"subject":[],"published":{"date-parts":[[2021,7]]}}}