{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:03:51Z","timestamp":1762254231177,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020 Research and Innovation Programme","award":["871525"],"award-info":[{"award-number":["871525"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3539005","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Automatic online quantification and prioritization of data protection risks"],"prefix":"10.1145","author":[{"given":"Sascha Sven","family":"Zmiewski","sequence":"first","affiliation":[{"name":"paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany"}]},{"given":"Jan","family":"Laufer","sequence":"additional","affiliation":[{"name":"paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Germany"}]},{"given":"Zolt\u00e1n \u00c1d\u00e1m","family":"Mann","sequence":"additional","affiliation":[{"name":"Complex Cyber Infrastructure (CCI) group, University of Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1673","article-title":"The big data divide","volume":"8","author":"Andrejevic Mark","year":"2014","unstructured":"Mark Andrejevic. 2014. The big data divide. International Journal of Communication 8 (2014), 1673\u20131689.","journal-title":"International Journal of Communication"},{"volume-title":"Annual Privacy Forum","author":"Bieker Felix","key":"e_1_3_2_1_2_1","unstructured":"Felix Bieker, Michael Friedewald, Marit Hansen, Hannah Obersteller, and Martin Rost. 2016. A Process for Data Protection Impact Assessment under the European General Data Protection Regulation. In Annual Privacy Forum. Springer, 21\u201337."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2023607.2023673"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110537"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868726"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.12.003"},{"key":"e_1_3_2_1_7_1","unstructured":"General Data Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC. Official Journal of the European Union(2016) L119."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00051"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS-C53483.2021.00124"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3078059"},{"key":"e_1_3_2_1_11_1","first-page":"71","article-title":"Towards a run-time model for data protection in the cloud","volume":"2018","author":"Mann Zolt\u00e1n\u00a0\u00c1d\u00e1m","year":"2018","unstructured":"Zolt\u00e1n\u00a0\u00c1d\u00e1m Mann, Andreas Metzger, and Stefan Schoenen. 2018. Towards a run-time model for data protection in the cloud. Modellierung 2018 (2018), 71\u201386.","journal-title":"Modellierung"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00021"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133601.2133622"},{"volume-title":"European Symposium on Research in Computer Security (ESORICS). Springer, 35\u201348","author":"Mu C.P.","key":"e_1_3_2_1_14_1","unstructured":"C.P. Mu, X.J. Li, H.K. Huang, and S.F. Tian. 2008. Online risk assessment of intrusion scenarios using D-S evidence theory. In European Symposium on Research in Computer Security (ESORICS). Springer, 35\u201348."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074021"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01042-3_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA50397.2020.00021"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ira Rubinstein. 2013. Big data: the end of privacy or a new beginning?International Data Privacy Law(2013).","DOI":"10.2139\/ssrn.2157659"},{"volume-title":"Service-Oriented Computing \u2013 ICSOC 2017 Workshops","author":"Schoenen Stefan","key":"e_1_3_2_1_19_1","unstructured":"Stefan Schoenen, Zolt\u00e1n\u00a0\u00c1d\u00e1m Mann, and Andreas Metzger. 2018. Using risk patterns to identify violations of data protection policies in cloud systems. In Service-Oriented Computing \u2013 ICSOC 2017 Workshops. Springer, 296\u2013307."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.11.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0222-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.12.003"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00010"},{"key":"e_1_3_2_1_25_1","volume-title":"Regulatory Compliance Modelling Using Risk Management Techniques. In IEEE World AI IoT Congress (AIIoT). 0474\u20130481","author":"Taylor Steve","year":"2021","unstructured":"Steve Taylor, Mike Surridge, and Brian Pickering. 2021. Regulatory Compliance Modelling Using Risk Management Techniques. In IEEE World AI IoT Congress (AIIoT). 0474\u20130481."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-01-2020-0002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.12.017"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2503399"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","acronym":"ARES 2022","location":"Vienna Austria"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3539005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3539005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:40Z","timestamp":1750183780000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3539005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":30,"alternative-id":["10.1145\/3538969.3539005","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3539005","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}