{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:07:29Z","timestamp":1755839249978,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647774","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Deletion-Compliance in the Absence of Privacy"],"prefix":"10.1109","author":[{"given":"Jonathan","family":"Godin","sequence":"first","affiliation":[{"name":"Universit&#x00E9; de Montr&#x00E9;al,Montr&#x00E9;al,Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Philippe","family":"Lamontagne","sequence":"additional","affiliation":[{"name":"National Research Council Canada,Ottawa,Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888775"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0076"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64381-2_4"},{"issue":"1","key":"ref4","article-title":"Argentina\u2019s Right to be Forgotten","volume":"27","author":"Carter","year":"2013","journal-title":"Emory International Law Review"},{"volume-title":"California Consumer Privacy Act","year":"2021","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1914598117"},{"key":"ref7","first-page":"912","volume-title":"I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting","author":"Derler","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2021","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-004-1140-z"},{"key":"ref13","first-page":"23","article-title":"Making programs forget: enforcing lifetime for sensitive data","volume-title":"Proceedings of the 13th USENIX conference on Hot topics in operating systems","author":"Kannan"},{"key":"ref14","first-page":"687","article-title":"Bridging the Gap between Computer Science and Legal Approaches to Privacy","volume":"31","author":"Nissim","year":"2017","journal-title":"Harvard Journal of Law & Technology (Harvard JOLT)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/380752.380844"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.28"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247492"},{"volume-title":"Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression","year":"1998","author":"Samarati","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref22","first-page":"8","article-title":"Reliably erasing data from flash-based solid state drives","volume-title":"Proceedings of the 9th USENIX conference on File and stroage technologies","author":"Wei"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647774.pdf?arnumber=9647774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T09:39:04Z","timestamp":1726047544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647774","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}