{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:53Z","timestamp":1766441693166,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","funder":[{"name":"Swiss Science Foundation","award":["204796"],"award-info":[{"award-number":["204796"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3748271","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"2-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mechanizing Privacy by Design"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2952-939X","authenticated-orcid":false,"given":"David","family":"Basin","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5419-3125","authenticated-orcid":false,"given":"Fran\u00e7ois","family":"Hublet","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8314-2589","authenticated-orcid":false,"given":"Sr\u0111an","family":"Krsti\u0107","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4217-0983","authenticated-orcid":false,"given":"Ho\u00e0ng","family":"Nguy\u1ec5n","sequence":"additional","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"681","volume-title":"Monitoring the GDPR. In European Symposium on Research in Computer Security (ESORICS)","volume":"11735","author":"Arfelt Emma","year":"2019","unstructured":"Emma Arfelt, David Basin, and S\u00f8ren Debois. 2019. Monitoring the GDPR. In European Symposium on Research in Computer Security (ESORICS), Vol. 11735. Springer, 681-699."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998443"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-210078"},{"key":"e_1_3_2_1_4_1","first-page":"2830","article-title":"Is Modeling Access Control Worth It?","author":"Basin David","year":"2023","unstructured":"David Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen, and Mart\u00edn Ochoa. 2023a. Is Modeling Access Control Worth It?. In Computer and Communications Security (CCS). 2830-2844.","journal-title":"Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_5_1","volume-title":"Monitoring of temporal first-order properties with aggregations. Formal methods in system design","author":"Basin David","year":"2015","unstructured":"David Basin, Felix Klaedtke, Srdjan Marinovic, and Eugen Z\u0103linescu. 2015a. Monitoring of temporal first-order properties with aggregations. Formal methods in system design, Vol. 46 (2015), 262-285."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699444"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45329-8_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Ann Cavoukian. 2011. Privacy by Design: The 7 Foundational Principles - Implementation and Mapping of Fair Information Practices. Technical Report."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866930"},{"key":"e_1_3_2_1_10_1","unstructured":"European Parliament and Council of the European Union. 2016. General Data Protection Regulation (EU) 2016\/679. https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-021-00609-z"},{"key":"e_1_3_2_1_12_1","first-page":"124","article-title":"Digitalising the general data protection regulation with dynamic condition response graphs","author":"Heuck Emil","year":"2017","unstructured":"Emil Heuck, Thomas Hildebrandt, Rasmus Ki\u00e6rulff Lerche, Morten Marquard, H\u00e5kon Normann, Rasmus Iven Str\u00f8msted, and Barbara Weber. 2017. Digitalising the general data protection regulation with dynamic condition response graphs. In Business Process Management. 124-134.","journal-title":"Business Process Management."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-032-05435-7_10"},{"key":"e_1_3_2_1_14_1","first-page":"211","volume-title":"Real-Time Policy Enforcement with Metric First-Order Temporal Logic. In European Symposium on Research in Computer Security (ESORICS)","volume":"13555","author":"Hublet Fran\u00e7ois","year":"2022","unstructured":"Fran\u00e7ois Hublet, David Basin, and Srdan Krstic. 2022. Real-Time Policy Enforcement with Metric First-Order Temporal Logic. In European Symposium on Research in Computer Security (ESORICS), Vol. 13555. 211-232."},{"key":"e_1_3_2_1_15_1","first-page":"400","volume-title":"Enforcing the GDPR. In European Symposium on Research in Computer Security","volume":"14345","author":"Hublet Fran\u00e7ois","year":"2023","unstructured":"Fran\u00e7ois Hublet, David Basin, and Srdan Krstic. 2023. Enforcing the GDPR. In European Symposium on Research in Computer Security, Vol. 14345. 400-422."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0034"},{"key":"e_1_3_2_1_17_1","unstructured":"Fran\u00e7ois Hublet Alexander Kvamme and Srdan Krstic. 2024b. Towards an Enforceable GDPR Specification. In Mapping and Governing the Online World (MGOW)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65630-9_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-65630-9_8"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0018"},{"key":"e_1_3_2_1_21_1","unstructured":"Srdan Krstic Hoang Nguyen and David Basin. 2025. The \u03bdtextscActionGUI tool. https:\/\/nuactiongui.github.io\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45800-X_33"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10849-019-09309-z"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3425898.3426958"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99527-0_13"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3748271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:08:44Z","timestamp":1766441324000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3748271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":26,"alternative-id":["10.1145\/3719027.3748271","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3748271","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}