{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:29Z","timestamp":1750307189860,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133627","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy analysis using ontologies"],"prefix":"10.1145","author":[{"given":"Martin","family":"Kost","sequence":"first","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]},{"given":"Johann Christoph","family":"Freytag","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Carnegie mellon cylab - project nudging users towards privacy. http:\/\/www.cylab.cmu.edu\/index.html.  Carnegie mellon cylab - project nudging users towards privacy. http:\/\/www.cylab.cmu.edu\/index.html."},{"key":"e_1_3_2_1_2_1","unstructured":"DESWAP (Development Environment for Semantic Web APplications) project. 2007.  DESWAP (Development Environment for Semantic Web APplications) project. 2007."},{"key":"e_1_3_2_1_3_1","unstructured":"PRECIOSA (Privacy Enabled Capability in Co-operative Systems and Safety Applications) FP7 project. 2010.  PRECIOSA (Privacy Enabled Capability in Co-operative Systems and Safety Applications) FP7 project. 2010."},{"key":"e_1_3_2_1_4_1","unstructured":"A. Cavoukian (Information & Privacy Commissioner Ontario Canada). Privacy-by-design. http:\/\/www.privacybydesign.ca\/.  A. Cavoukian (Information & Privacy Commissioner Ontario Canada). Privacy-by-design. http:\/\/www.privacybydesign.ca\/."},{"volume-title":"28th VLB Conference","year":"2002","author":"Agrawal R.","key":"e_1_3_2_1_5_1"},{"volume-title":"3rd Int. Workshop on Intelligent Transportation (WIT 2006)","year":"2006","author":"Aijaz A.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0112-x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/648063.747438"},{"volume-title":"Handbook on Ontologies. Springer Publishing Company","year":"2009","author":"Gasevic D.","key":"e_1_3_2_1_9_1"},{"volume-title":"Computers","year":"2011","author":"G\u00fcrses S. F.","key":"e_1_3_2_1_10_1"},{"volume-title":"Proc.s of the 4th Int. Workshop on Semantic Web Enabled Software Engineering (SWESE) at ISWC","year":"2008","author":"Hartig O.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proc.s of the 9th Int. Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ'03)","year":"2003","author":"He Q.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4400995"},{"volume-title":"ISO","year":"2008","author":"ISO TC","key":"e_1_3_2_1_14_1"},{"volume-title":"Intelligent Information Privacy Maangement Symposium, AAAI Spring Symposium Series","year":"2010","author":"Kargl F.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","first-page":"6","author":"Kavakli E.","year":"2002","journal-title":"Springer-Verlag London"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073290.2073298"},{"volume-title":"2nd Int. Workshop on Data Security and PrivAcy in wireless Networks","year":"2011","author":"Kung A.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2005.86"},{"key":"e_1_3_2_1_20_1","unstructured":"I. Linden Consulting. Privacy impact assessment. http:\/\/www.ico.gov.uk\/for_organisations\/data_protection\/topic_guides\/privacy_impact_assessment.aspx 2007.  I. Linden Consulting. Privacy impact assessment. http:\/\/www.ico.gov.uk\/for_organisations\/data_protection\/topic_guides\/privacy_impact_assessment.aspx 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.41"},{"key":"e_1_3_2_1_23_1","unstructured":"E. Parliament and of the Council of 24 October 1995. Directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data online (access july 31 2009) 1995.  E. Parliament and of the Council of 24 October 1995. Directive 95\/46\/ec of the european parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data online (access july 31 2009) 1995."},{"key":"e_1_3_2_1_24_1","unstructured":"T. E. PARLIAMENT and T. C. O. T. E. UNION. Directive 2010\/40\/eu of the european parliament and of the council. Official Journal of the European Union L 207\/1 2010.  T. E. PARLIAMENT and T. C. O. T. E. UNION. Directive 2010\/40\/eu of the european parliament and of the council. Official Journal of the European Union L 207\/1 2010."},{"key":"e_1_3_2_1_25_1","first-page":"2754","author":"Schumacher M.","year":"2003","journal-title":"LNCS"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314353"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05089-3_1"}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'12"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":28,"alternative-id":["10.1145\/2133601.2133627","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133627","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}