{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:44:24Z","timestamp":1763037864835,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,23]]},"DOI":"10.1109\/icaisc56366.2023.10085308","type":"proceedings-article","created":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T17:28:06Z","timestamp":1680542886000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Process SDLC-GDPR: Towards the Development of Secure and Compliant Applications"],"prefix":"10.1109","author":[{"given":"Michele B.","family":"Freitas","sequence":"first","affiliation":[{"name":"Escola Superior de Tecnologia e Gest&#x00E3;o Polit&#x00E9;cnico do Porto,Felgueiras,Portugal"}]},{"given":"Virg\u00ednia M.","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"Atl&#x00E2;ntica University Institute,Dep. of ICST,Lisboa - Barcarena,Portugal"}]},{"given":"Jo\u00e3o P.","family":"Magalh\u00e3es","sequence":"additional","affiliation":[{"name":"CIICESI, ESTG Polit&#x00E9;cnico do Porto,Felgueiras,Portugal"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A Timeline of the Ashley Madison Hack","author":"Lord","year":"2017","journal-title":"Digital Guardian"},{"volume-title":"Article 25 UE GDPR \u201cData protection by design and by default\u201d","year":"2018","author":"Vollmer","key":"ref2"},{"key":"ref3","first-page":"13","volume-title":"Da Responsabilidade do Subcontratante no \u00c2mbito do RGPD\u201d","author":"Figueiredo","year":"2019"},{"volume-title":"Top 10 GDPR Breaches in 2019 Cause C402.6 Million Fines, Precise Security","year":"2020","author":"Ilic","key":"ref4"},{"volume-title":"UNCTAD, Data Protection and Privacy Legislation Worldwide","year":"2020","key":"ref5"},{"key":"ref6","first-page":"1","article-title":"Global data privacy laws 2019: 132 national laws and many bills","author":"Greenleaf","year":"2019","journal-title":"SSRNElectron. J."},{"volume-title":"HIPAA Reform or a Patchwork Scheme: A Look at Preemption, Scope, and the Inclusion of a Private Right of Action in a New Federal Data Privacy Law, Digital Commons at American University Washington College of Law","year":"2020","author":"Cohen","key":"ref7"},{"key":"ref8","first-page":"1","article-title":"Complying With GDPR","volume":"2","author":"Miri","year":"2018","journal-title":"Isaca"},{"key":"ref9","article-title":"Artigo 32 UE Regulamento Geral sobre a Prote\u00e7\u00e3o de Dados \u201d- Seguran\u00e7a do tratamento","author":"Vollmer","year":"2020","journal-title":"Privacy Regulation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"volume-title":"RGPD - Gloss\u00e1rio: Todos os termos que precisa de conhecer, Openlimits","year":"2017","key":"ref11"},{"volume-title":"International Standard Organization, ISO\/IEC 29100 Information technology \u2014 Security techniques \u2014 Privacy framework, ISO","year":"2011","key":"ref12"},{"key":"ref13","first-page":"16","volume-title":"An\u00e1lise de Seguran\u00e7a e Aperfei\u00e7oamento de uma Rede Universit\u00e1ria de Telecomunica\u00e7\u00f5es","author":"Azevedo","year":"2019"},{"key":"ref14","first-page":"18","volume-title":"Computa\u00e7\u00e3o em nuvem: um estudo sobre a distribui\u00e7\u00e3o da produ\u00e7\u00e3o de artigos publicados no per\u00edodo de 2007 a 2016","author":"Araujo","year":"2018"},{"volume-title":"International Standard Organization, ISO\/IEC 27018:2019 Information technology \u2014 Security techniques \u2014 Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors, ISO","year":"2019","key":"ref15"},{"volume-title":"International Standard, ISO\/IEC 29151 Information t echnology \u2014 Security techniques \u2014 Code of practice for personally identifiable information protection, ISO","year":"2017","key":"ref16"},{"volume-title":"Tag Archives: RGPD; Artigo 42; ISO; 27001; 27002; 29151; 27552; Privacy; SGPD; Privacidade; Prote\u00e7\u00e3o de Dados; Sistema; Conformidade; Compliance, Control Gal","year":"2019","author":"Silva","key":"ref17"},{"volume-title":"International Standard, ISO \/ IEC 29134 Information technology - Security techniques - Guidelines for privacy impact assessment, ISO","year":"2017","key":"ref18"},{"volume-title":"Jo\u00e3o Paulo Magalh\u00e3es, Process SDLC-GDPR","year":"2022","key":"ref19"}],"event":{"name":"2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)","start":{"date-parts":[[2023,1,23]]},"location":"Jeddah, Saudi Arabia","end":{"date-parts":[[2023,1,25]]}},"container-title":["2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10084917\/10084937\/10085308.pdf?arnumber=10085308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T05:19:20Z","timestamp":1712899160000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10085308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,23]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icaisc56366.2023.10085308","relation":{},"subject":[],"published":{"date-parts":[[2023,1,23]]}}}