{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:36Z","timestamp":1750219716302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3617847","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"2204-2206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Centric Log Parsing for Timely, Proactive Personal Data Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8709-7934","authenticated-orcid":false,"given":"Issam","family":"Sedki","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. General Data Protection Regulation (GDPR). https:\/\/gdpr-info.eu\/ Accessed: 2023-05"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACITE53722.2022.9823900"},{"volume-title":"Security Policy Compliance: User Acceptance Perspective. 2012 45th Hawaii International Conference on System Sciences, 3317\u20133326","author":"Al-Omari Ahmad","key":"e_1_3_2_1_3_1","unstructured":"Ahmad Al-Omari, Omar F. El-Gayar, and A. Deokar. 2012. Security Policy Compliance: User Acceptance Perspective. 2012 45th Hawaii International Conference on System Sciences, 3317\u20133326."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00402.x"},{"key":"e_1_3_2_1_5_1","volume-title":"Logram: Efficient Log Parsing Using n-Gram Dictionaries. 2-9 pages. arxiv:2001.03038.","author":"Dai Hetong","year":"2020","unstructured":"Hetong Dai, Heng Li, Weiyi Shang, Tse-Hsun Chen, and Che-Shao Chen. 2020. Logram: Efficient Log Parsing Using n-Gram Dictionaries. 2-9 pages. arxiv:2001.03038."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 16th International Conference on Data Mining (ICDM","author":"Du M.","year":"2016","unstructured":"M. Du and F. Li. 2016. Spell: Online streaming parsing of system event logs. In Proceedings of the 16th International Conference on Data Mining (ICDM 2016). 859\u2013864."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106276"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipz026"},{"key":"e_1_3_2_1_9_1","volume-title":"PrivacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls. In International Conference on Web Engineering. Springer, 3\u201315","author":"Gjermundr\u00f8d Harald","year":"2016","unstructured":"Harald Gjermundr\u00f8d, Ioanna Dionysiou, and Kyriakos Costa. 2016. PrivacyTracker: A Privacy-by-Design GDPR-Compliant Framework with Verifiable Data Traceability Controls. In International Conference on Web Engineering. Springer, 3\u201315."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 1st Workshop on Law Compliancy Issues in Organisational Systems and Strategies (iComply\u201910)","author":"Hamou-Lhadj Abdelwahab","year":"2010","unstructured":"Abdelwahab Hamou-Lhadj. 2010. Regulatory Compliance and its Impact on Software Development. In Proc. of the 1st Workshop on Law Compliancy Issues in Organisational Systems and Strategies (iComply\u201910)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"volume-title":"Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/SIGSOFT FSE 2018). 60\u2013\u201370","author":"He S.","key":"e_1_3_2_1_13_1","unstructured":"S. He, Q. Lin, J. Lou, H. Zhang, M. R. Lyu, and D. Zhang. 2018. Identifying impactful service system problems via log analysis. In Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/SIGSOFT FSE 2018). 60\u2013\u201370."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_15_1","volume-title":"Loghub: A Large Collection of System Log Datasets towards Automated Log Analytics. arXiv preprint arXiv:2008.06448, arxiv:2008.06448","author":"He Shilin","year":"2020","unstructured":"Shilin He, Jieming Zhu, Pinjia He, and Michael R Lyu. 2020. Loghub: A Large Collection of System Log Datasets towards Automated Log Analytics. arXiv preprint arXiv:2008.06448, arxiv:2008.06448"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI","author":"Huang P.","year":"2018","unstructured":"P. Huang, C. Guo, J. R. Lorch, L. Zhou, and Y. Dang. 2018. Capturing and enhancing in situ system observability for failure detection. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2018). 1\u2013\u201316."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2013.801589"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN","author":"Oliner A.","year":"2007","unstructured":"A. Oliner and J. Stearley. 2007. What supercomputers say: A study of five system logs. In Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2007). 575\u2013\u2013584."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONISOFT.2019.00024"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2019.101469"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCIS56430.2022.10037730"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.3.02"},{"volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (SOSP \u201909)","author":"Xu Wei","key":"e_1_3_2_1_26_1","unstructured":"Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009. Detecting Large-Scale System Problems by Mining Console Logs. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (SOSP \u201909). New York, NY, USA. 117\u2013132. isbn:9781605587523"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3617847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3617847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3617847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":27,"alternative-id":["10.1145\/3611643.3617847","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3617847","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}