{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:52:44Z","timestamp":1761789164079,"version":"3.28.0"},"reference-count":65,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890932","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"129-138","source":"Crossref","is-referenced-by-count":30,"title":["Privacy-respecting digital investigation"],"prefix":"10.1109","author":[{"given":"Ali","family":"Dehghantanha","sequence":"first","affiliation":[]},{"given":"Katrin","family":"Franke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-012-0173-0"},{"key":"36","first-page":"677","article-title":"A framework to guide the implementation of proactive digital forensics in organizations","author":"grobler","year":"2010","journal-title":"Proc of ARES"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/IWISA.2010.5473291"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.15"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.008"},{"key":"38","first-page":"3s","article-title":"A system for the proactive, continuous, and efficient collection of digital forensic evidence","author":"shields","year":"2013","journal-title":"Journal of Digital Investigation 8 Special Issue for 11th Annual Digital Forensics Research Conference"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2012.6320452"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19050-6_13"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2010.57"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23602-0_21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9204-1"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.180"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13739-6_2"},{"key":"25","first-page":"27","article-title":"Towards a formal language for privacy options","author":"bethold","year":"0","journal-title":"Proc of Privacy and Identity Management for Life 2010 IFIP AICT 352"},{"key":"26","first-page":"1","article-title":"Understanding and protecting privacy: Formal semantics and principled audit mechanisms","author":"datta","year":"0","journal-title":"Proc of ICISS 2011 LNCS 7093"},{"journal-title":"US Health and Human Services HIPAA Enforcement","year":"2013","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.38"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2010.5471981"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25237-2_3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10609-012-9183-3"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.157"},{"journal-title":"EU's Anti-corruption Drive Hits Bulgaria Romania","year":"0","key":"7"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23556-6_1"},{"year":"0","key":"6"},{"journal-title":"Fighting Cyber-Crime and Protecting Privacy","year":"2012","key":"5"},{"key":"32","first-page":"28","article-title":"Strong and weak policy licensing","author":"may","year":"2009","journal-title":"Proceedings POLICY"},{"key":"4","first-page":"169","article-title":"Research on relevant problems of computer crime forensics","author":"guang","year":"0","journal-title":"Proc of ICCE2011 AISC 112"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_22"},{"year":"2013","key":"9"},{"year":"0","key":"8"},{"key":"59","article-title":"Protecting privacy in china-chapter 4: The legal protection of privacy in international practices: Potential as models for a chinese privacy protection regimen","author":"wang","year":"2011","journal-title":"International Standard"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2012.01.005"},{"journal-title":"Charter of Fundamental Rights of the European Union","year":"2000","key":"57"},{"key":"56","first-page":"480","article-title":"Privacy preserving keyword search over encrypted cloud data","author":"anathi","year":"2011","journal-title":"Proc of ACC"},{"journal-title":"European Community(EU)","article-title":"Directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","key":"19"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16342-5_12"},{"journal-title":"Financial Modernization Act of","year":"1999","key":"17"},{"key":"18","first-page":"258","article-title":"A conceptual model for privacy policies with consent and revocation requirements","author":"mont","year":"0","journal-title":"Privacy and Identity Management for Life 2010 IFIP AICT 352"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21750-0_4"},{"journal-title":"Australian Market &Social Research Privacy Principles","year":"2013","key":"16"},{"key":"13","first-page":"311","article-title":"A survey on privacy issues in digital forensics","volume":"1","author":"aminnezhad","year":"2012","journal-title":"International Journal of Cyber-Security and Digital Forensics (UCSDF"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31884-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.04.005"},{"key":"12","first-page":"48","article-title":"Digital forensics trends and future","volume":"2","author":"dezfouli","year":"2013","journal-title":"International Journal of Cyber-Security and Digital Forensics (UCSDF"},{"key":"21","first-page":"197","article-title":"Comparing random-based and k-naonymity-based algorithms for graph anonymization","author":"casas-roma","year":"0","journal-title":"Proc of MDAI 2012 LNAI 7647"},{"key":"20","first-page":"1619","article-title":"Effects of data anonymization on the data mining results","author":"buratovic","year":"2012","journal-title":"Proceedings of MIPRO"},{"key":"64","first-page":"627","article-title":"Beyond Orwell: The application of unmanned aircraft systems in domestic surveillance operations","volume":"74","author":"mcbride","year":"2009","journal-title":"Journal of Air Law and Commerce Summer"},{"key":"65","article-title":"APEC's privacy framework: A new low standard","volume":"11","author":"greenleaf","year":"2005","journal-title":"Privacy Law Policy Reporter"},{"journal-title":"Privacy Regulations for Cloud Computing Compliance and Implementation in Theory and Practice","year":"2011","author":"ruite","key":"62"},{"key":"63","article-title":"Comment: We've got our eyes on you: When surveillance by unmanned aircraft systems constitutes a Fourth amendment search","volume":"51","author":"travis","year":"2009","journal-title":"South Texas Law Review Fall"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.07.002"},{"year":"2014","key":"61"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2011.28"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.01.002"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2011.90"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04155-6_11"},{"key":"47","article-title":"Detecting suspicious relational database queries","author":"b\ufffdttcher","year":"2008","journal-title":"The ARES 2008"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247492"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.45"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23602-0_6"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.011"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25986-9_4"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24650-0_31"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890932.pdf?arnumber=6890932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T13:40:14Z","timestamp":1490276414000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890932","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}