{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:49Z","timestamp":1750220749764,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377816.3381726","type":"proceedings-article","created":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T01:49:05Z","timestamp":1600480145000},"page":"5-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hey, my data are mine!"],"prefix":"10.1145","author":[{"given":"Gian Luca","family":"Scoccia","sequence":"first","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Marco","family":"Autili","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Patrizio","family":"Pelliccione","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Paola","family":"Inverardi","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Matteo Maria","family":"Fiore","sequence":"additional","affiliation":[{"name":"University of L'Aquila, L'Aquila, Italy"}]},{"given":"Alejandro","family":"Russo","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,9,18]]},"reference":[{"volume-title":"Protecting Confidential Data on Personal Computers with Storage Capsules. In 18th USENIX Security Symposium. USENIX Association, Montreal, Quebec.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. https:\/\/standards.ieee.org\/develop\/indconn\/ec\/autonomous_systems.html.  2018. https:\/\/standards.ieee.org\/develop\/indconn\/ec\/autonomous_systems.html."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. EC. General Data Protection Regulation.  2018. EC. General Data Protection Regulation."},{"volume-title":"Market Report","year":"2018","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"2018. Partnership on AI. https:\/\/www.partnershiponai.org\/.  2018. Partnership on AI. https:\/\/www.partnershiponai.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"(Last access January 2020). DECODE. https:\/\/decodeproject.eu.  (Last access January 2020). DECODE. https:\/\/decodeproject.eu."},{"key":"e_1_3_2_1_7_1","unstructured":"(Last access January 2020). IRMA. https:\/\/privacybydesign.foundation\/irma-en\/.  (Last access January 2020). IRMA. https:\/\/privacybydesign.foundation\/irma-en\/."},{"key":"e_1_3_2_1_8_1","unstructured":"(Last access January 2020). Right to be forgotten GDPR vs Blockchain. https:\/\/archer-soft.com\/en\/blog\/right-be-forgotten-gdpr-vs-blockchain-technology.  (Last access January 2020). Right to be forgotten GDPR vs Blockchain. https:\/\/archer-soft.com\/en\/blog\/right-be-forgotten-gdpr-vs-blockchain-technology."},{"key":"e_1_3_2_1_9_1","unstructured":"(Last access January 2020). Vision. http:\/\/www.visioneuproject.eu\/.  (Last access January 2020). Vision. http:\/\/www.visioneuproject.eu\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"A. Acquisti et al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50 3 Article 44 (2017).  A. Acquisti et al. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50 3 Article 44 (2017).","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_11_1","first-page":"7","article-title":"Aligning Qualitative, Real-Time, and Probabilistic Property Specification Patterns Using a Structured English Grammar","volume":"41","author":"Autili M.","year":"2015","journal-title":"IEEE TSE"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"A. Beimel. 2011. Secret-Sharing Schemes: A Survey. In Coding and Cryptology.  A. Beimel. 2011. Secret-Sharing Schemes: A Survey. In Coding and Cryptology.","DOI":"10.1007\/978-3-642-20901-7_2"},{"volume-title":"2012 Proceedings IEEE INFOCOM Workshops. IEEE, 13--18","author":"Bielenberg A.","key":"e_1_3_2_1_13_1"},{"volume-title":"Privacy by Design","year":"2009","author":"Cavoukian A.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proc. of the ACM Conference on Computer and Communications Security (CCS '12)","author":"Chen Yu-Yuan","key":"e_1_3_2_1_15_1"},{"volume-title":"Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. In EuroS P.","year":"2019","author":"Cheng R.","key":"e_1_3_2_1_16_1"},{"volume-title":"Temporal Logics for Hyperproperties. In POST","year":"2014","author":"Clarkson M. R.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"P. Dixit A. K. Gupta M. C. Trivedi and V. K. Yadav. 2018. Traditional and Hybrid Encryption Techniques: A Survey. In Networking Communication and Data Knowledge Engineering.  P. Dixit A. K. Gupta M. C. Trivedi and V. K. Yadav. 2018. Traditional and Hybrid Encryption Techniques: A Survey. In Networking Communication and Data Knowledge Engineering.","DOI":"10.1007\/978-981-10-4600-1_22"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"M. B. Dwyer G. S. Avrunin and J. C. Corbett. 1999. Property specification patterns for finite-state verification. In ICSE99. ACM Press 411--420.  M. B. Dwyer G. S. Avrunin and J. C. Corbett. 1999. Property specification patterns for finite-state verification. In ICSE99. ACM Press 411--420.","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"J. Larus et al. 2018. When Computers Decide: European Recommendations on Machine-Learned Automated Decision Making. http:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/ie-euacm-adm-report-2018.pdf.  J. Larus et al. 2018. When Computers Decide: European Recommendations on Machine-Learned Automated Decision Making. http:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/ie-euacm-adm-report-2018.pdf.","DOI":"10.1145\/3185595"},{"key":"e_1_3_2_1_22_1","unstructured":"R. Geambasu T. Kohno Amit A. Levy and H. M. Levy. 2009. Vanish: increasing data privacy with self-destructing data. In USENIX security. 18.  R. Geambasu T. Kohno Amit A. Levy and H. M. Levy. 2009. Vanish: increasing data privacy with self-destructing data. In USENIX security. 18."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78739-6_19"},{"key":"e_1_3_2_1_24_1","first-page":"4","article-title":"The European Perspective on Responsible","volume":"62","author":"Inverardi P.","year":"2019","journal-title":"Computing. Commun. ACM"},{"key":"e_1_3_2_1_25_1","unstructured":"M. Madden L. Rainie K. Zickuhr M. Duggan and A. Smith. 2014. Public perceptions of privacy and security in the post-Snowden era. Pew Res. Center (2014).  M. Madden L. Rainie K. Zickuhr M. Duggan and A. Smith. 2014. Public perceptions of privacy and security in the post-Snowden era. Pew Res. Center (2014)."},{"key":"e_1_3_2_1_26_1","unstructured":"P. Maniatis D. Akhawe K. Fall Elaine Shi S. McCamant and D. Song. 2011. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In USENIX HotOS.  P. Maniatis D. Akhawe K. Fall Elaine Shi S. McCamant and D. Song. 2011. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In USENIX HotOS."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"volume-title":"Sicari andpa A. Coen-Porisini","year":"2019","author":"Miorandi D.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"OASIS. 2016. Privacy Management Reference Model and Methodology (PMRM).  OASIS. 2016. Privacy Management Reference Model and Methodology (PMRM)."},{"volume-title":"Sep. '19","author":"High-Level Expert Group on Artificial Intelligence (AI HLEG). access","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","first-page":"51","article-title":"The Ephemerizer: Making Data Disappear","volume":"1","author":"Perlman R.","year":"2005","journal-title":"Journal of Information System Security"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ENABL.2003.1231412"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.01.001"},{"key":"e_1_3_2_1_35_1","unstructured":"N. Santos R. Rodrigues K. P. Gummadi and S. Saroiu. 2012. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. In Security'12.  N. Santos R. Rodrigues K. P. Gummadi and S. Saroiu. 2012. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. In Security'12."},{"key":"e_1_3_2_1_36_1","unstructured":"G. L. Scoccia I. Malavolta M. Autili A. Di Salle and P. Inverardi. 2019. Enhancing Trustability of Android Applications via User-Centric Flexible Permissions. IEEE Transactions on Software Engineering (2019).  G. L. Scoccia I. Malavolta M. Autili A. Di Salle and P. Inverardi. 2019. Enhancing Trustability of Android Applications via User-Centric Flexible Permissions. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"G. L. Scoccia S. Ruberto I. Malavolta M. Autili and P. Inverardi. 2018. An Investigation into Android Run-time Permissions from the End Users' Perspective. In MOBILESoft 2018.  G. L. Scoccia S. Ruberto I. Malavolta M. Autili and P. Inverardi. 2018. An Investigation into Android Run-time Permissions from the End Users' Perspective. In MOBILESoft 2018.","DOI":"10.1145\/3197231.3197236"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"B. Shishkov and M. Janssen. 2018. Enforcing Context-Awareness and Privacy-by-Design in the Specification of Information Systems. In Business Modeling and Software Design.  B. Shishkov and M. Janssen. 2018. Enforcing Context-Awareness and Privacy-by-Design in the Specification of Information Systems. In Business Modeling and Software Design.","DOI":"10.1007\/978-3-319-78428-1_5"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"I. Wagner and D. Eckhoff. 2018. Technical Privacy Metrics: A Systematic Survey. ACM Comput. Surv. 51 3 Article 57 (2018) 57:1--57:38 pages.  I. Wagner and D. Eckhoff. 2018. Technical Privacy Metrics: A Systematic Survey. ACM Comput. Surv. 51 3 Article 57 (2018) 57:1--57:38 pages.","DOI":"10.1145\/3168389"},{"volume-title":"Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations. LNCS","year":"2019","author":"Wang Lun","key":"e_1_3_2_1_41_1"},{"volume-title":"BigData Congress.","author":"Zheng Z.","key":"e_1_3_2_1_42_1"},{"volume-title":"AAAI Conference on Web and Social Media.","author":"Zignani M.","key":"e_1_3_2_1_43_1"},{"volume-title":"IEEE Security and Privacy Workshops.","author":"Zyskind G.","key":"e_1_3_2_1_44_1"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"],"location":"Seoul South Korea","acronym":"ICSE '20"},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377816.3381726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377816.3381726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:52Z","timestamp":1750199932000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377816.3381726"}},"subtitle":["active data to empower the user"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":44,"alternative-id":["10.1145\/3377816.3381726","10.1145\/3377816"],"URL":"https:\/\/doi.org\/10.1145\/3377816.3381726","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-09-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}