{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:22:10Z","timestamp":1774974130644,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T00:00:00Z","timestamp":1741564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NextGenerationEU,European Union","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"NextGenerationEU,European Union","award":["G53D23002910006"],"award-info":[{"award-number":["G53D23002910006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The growing capacity to handle vast amounts of data, combined with a shift in service delivery models, has improved scalability and efficiency in data analytics, particularly in multi-tenant environments. Data are treated as digital products and processed through orchestrated service-based data pipelines. However, advancements in data analytics do not find a counterpart in data governance techniques, leaving a gap in the effective management of data throughout the pipeline lifecycle. This gap highlights the need for innovative service-based data pipeline management solutions that prioritize balancing data quality and data protection. The framework proposed in this paper optimizes service selection and composition within service-based data pipelines to maximize data quality while ensuring compliance with data protection requirements, expressed as access control policies. Given the NP-hard nature of the problem, a sliding-window heuristic is defined and evaluated against the exhaustive approach and a baseline modeling the state of the art. Our results demonstrate a significant reduction in computational overhead, while maintaining high data quality.<\/jats:p>","DOI":"10.1186\/s40537-025-01118-5","type":"journal-article","created":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T11:55:32Z","timestamp":1741607732000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Maximizing data quality while ensuring data protection in service-based data pipelines"],"prefix":"10.1186","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1197-568X","authenticated-orcid":false,"given":"Antongiacomo","family":"Polimeno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9756-4675","authenticated-orcid":false,"given":"Chiara","family":"Braghin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5438-9467","authenticated-orcid":false,"given":"Marco","family":"Anisetti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7426-4795","authenticated-orcid":false,"given":"Claudio A.","family":"Ardagna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,10]]},"reference":[{"key":"1118_CR1","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council. https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj Accessed 2023-04-13."},{"key":"1118_CR2","unstructured":"U.S. Congress: Health Insurance Portability and Accountability Act of 1996. https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-104publ191\/html\/PLAW-104publ191.htm. Public Law 104-191, 110 Stat. 1936 (1996). https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-104publ191\/html\/PLAW-104publ191.htm."},{"issue":"1","key":"1118_CR3","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/s13132-022-01096-6","volume":"15","author":"J Wang","year":"2023","unstructured":"Wang J, Liu Y, Li P, Lin Z, Sindakis S, Aggarwal S. Overview of data quality: examining the dimensions, antecedents, and impacts of data quality. J Knowl Econ. 2023;15(1):1159\u201378. https:\/\/doi.org\/10.1007\/s13132-022-01096-6.","journal-title":"J Knowl Econ"},{"key":"1118_CR4","doi-asserted-by":"publisher","unstructured":"Zhou Y, Tu F, Sha K, Ding J, Chen H. A survey on data quality dimensions and tools for machine learning. arXiv 2024. https:\/\/doi.org\/10.48550\/ARXIV.2406.19614 . https:\/\/arxiv.org\/abs\/2406.19614.","DOI":"10.48550\/ARXIV.2406.19614"},{"key":"1118_CR5","doi-asserted-by":"crossref","unstructured":"Palanisamy S, SuvithaVani P. A survey on rdbms and nosql databases mysql vs mongodb. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), 2020;1\u20137. IEEE.","DOI":"10.1109\/ICCCI48352.2020.9104047"},{"key":"1118_CR6","unstructured":"Thambiraja E, Ramesh G, Umarani DR. A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng. 2012;2(7)."},{"key":"1118_CR7","doi-asserted-by":"crossref","unstructured":"Woodruff A, Stonebraker M. Supporting fine-grained data lineage in a database visualization environment. In: Proceedings 13th International Conference on Data Engineering, 1997;91\u2013102. IEEE.","DOI":"10.1109\/ICDE.1997.581742"},{"key":"1118_CR8","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj Accessed 2022-08."},{"key":"1118_CR9","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605","author":"BCM Fung","year":"2010","unstructured":"Fung BCM, Wang K, Chen R, Yu PS. Privacy-preserving data publishing: a survey of recent developments. ACM Comput Surv. 2010. https:\/\/doi.org\/10.1145\/1749603.1749605.","journal-title":"ACM Comput Surv"},{"key":"1118_CR10","unstructured":"Aslanyan Z, Vasilikos P. Privacy-Preserving Machine Learning - A Practical Guide. Technical report, The Alexandra Institute 2020. https:\/\/www.alexandra.dk\/wp-content\/uploads\/2020\/10\/Alexandra-Instituttet-whitepaper-Privacy-Preserving-Machine-Learning-A-Practical-Guide.pdf."},{"issue":"1","key":"1118_CR11","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1016\/j.procs.2010.04.304","volume":"1","author":"M Rahman","year":"2010","unstructured":"Rahman M, Hassan MR, Buyya R. Jaccard index based availability prediction in enterprise grids. Procedia Comput Sci. 2010;1(1):2707\u201316. https:\/\/doi.org\/10.1016\/j.procs.2010.04.304. (ICCS 2010).","journal-title":"Procedia Comput Sci"},{"key":"1118_CR12","doi-asserted-by":"publisher","unstructured":"Fuglede B, Topsoe F. Jensen-shannon divergence and hilbert space embedding. In: International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings. IEEE. https:\/\/doi.org\/10.1109\/isit.2004.1365067. http:\/\/dx.doi.org\/10.1109\/ISIT.2004.1365067.","DOI":"10.1109\/isit.2004.1365067"},{"key":"1118_CR13","doi-asserted-by":"publisher","unstructured":"Kellerer H, Pferschy U, Pisinger D. Multidimensional Knapsack Problems, pp. 235\u2013283. Springer, Berlin, Heidelberg 2004. https:\/\/doi.org\/10.1007\/978-3-540-24777-7_9.","DOI":"10.1007\/978-3-540-24777-7_9"},{"key":"1118_CR14","doi-asserted-by":"crossref","unstructured":"Dwork C. Differential privacy: a survey of results. In: International Conference on Theory and Applications of Models of Computation, 2008;1\u201319. Springer.","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"6","key":"1118_CR15","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P. Protecting respondents identities in microdata release. IEEE Trans Knowl Data Eng. 2001;13(6):1010\u201327.","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"1118_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M. L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data. 2007;1(1):3. https:\/\/doi.org\/10.1145\/1217299.1217302.","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1118_CR17","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2021","unstructured":"Majeed A, Lee S. Anonymization techniques for privacy preserving data publishing: a comprehensive survey. IEEE Access. 2021;9:8512\u201345. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700.","journal-title":"IEEE Access"},{"key":"1118_CR18","doi-asserted-by":"publisher","unstructured":"Fung BCM, Wang K, Fu AW-C, Yu PS. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques, 1st edn. Chapman & Hall\/CRC, New York 2010. https:\/\/doi.org\/10.1201\/9781420091502.","DOI":"10.1201\/9781420091502"},{"key":"1118_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-981-15-0694-9_7","volume-title":"Advances in data and information sciences","author":"A Sharma","year":"2020","unstructured":"Sharma A, Singh G, Rehman S. A review of big data challenges and preserving privacy in big data. In: Kolhe ML, Tiwari S, Trivedi MC, Mishra KK, editors. Advances in data and information sciences. Singapore: Springer; 2020. p. 57\u201365. https:\/\/doi.org\/10.1007\/978-981-15-0694-9_7."},{"issue":"4","key":"1118_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang RY, Strong DM. Beyond accuracy: what data quality means to data consumers. J Manag Inf Syst. 1996;12(4):5\u201333. https:\/\/doi.org\/10.1080\/07421222.1996.11518099.","journal-title":"J Manag Inf Syst"},{"issue":"2","key":"1118_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1145\/269012.269021","volume":"41","author":"GK Tayi","year":"1998","unstructured":"Tayi GK, Ballou DP. Examining data quality. Commun ACM. 1998;41(2):54\u20137. https:\/\/doi.org\/10.1145\/269012.269021.","journal-title":"Commun ACM"},{"issue":"1","key":"1118_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s42400-018-0020-9","volume":"2","author":"P Colombo","year":"2019","unstructured":"Colombo P, Ferrari E. Access control technologies for big data management systems: literature review and future trends. Cybersecurity. 2019;2(1):3. https:\/\/doi.org\/10.1186\/s42400-018-0020-9.","journal-title":"Cybersecurity"},{"key":"1118_CR23","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-981-15-0372-6_19","volume-title":"Advances in data sciences, security and applications","author":"P Geetha","year":"2020","unstructured":"Geetha P, Naikodi C, Setty SLN. Design of big data privacy framework\u2013a balancing act. In: Jain V, Chaudhary G, Taplamacioglu MC, Agarwal MS, editors. Advances in data sciences, security and applications. Singapore: Springer; 2020. p. 253\u201365. https:\/\/doi.org\/10.1007\/978-981-15-0372-6_19."},{"key":"1118_CR24","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.techfore.2017.09.040","volume":"129","author":"T van den Broek","year":"2018","unstructured":"van den Broek T, van Veenstra AF. Governance of big data collaborations: how to balance regulatory compliance and disruptive innovation. Technol Forecasting Social Change. 2018;129:330\u20138. https:\/\/doi.org\/10.1016\/j.techfore.2017.09.040.","journal-title":"Technol Forecasting Social Change"},{"key":"1118_CR25","doi-asserted-by":"publisher","first-page":"750","DOI":"10.3233\/978-1-61499-432-9-750","volume":"205","author":"J Ahlbrandt","year":"2014","unstructured":"Ahlbrandt J, Brammen D, Majeed R, Lefering R, Semler S, Thun S, Walcher F, Rohrig R. Balancing the need for big data and patient data privacy-an it infrastructure for a decentralized emergency care research database. Stud Health Technol Inf. 2014;205:750\u20134. https:\/\/doi.org\/10.3233\/978-1-61499-432-9-750.","journal-title":"Stud Health Technol Inf"},{"key":"1118_CR26","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2104906119","author":"V Hotz","year":"2022","unstructured":"Hotz V, Bollinger C, Komarova T, Manski C, Moffitt R, Nekipelov D, Sojourner A, Spencer B. Balancing data privacy and usability in the federal statistical system. Proc Natl Acad Sci. 2022. https:\/\/doi.org\/10.1073\/pnas.2104906119.","journal-title":"Proc Natl Acad Sci"},{"key":"1118_CR27","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-10665-1_11","volume-title":"Cloud Comput","author":"S Creese","year":"2009","unstructured":"Creese S, Hopkins P, Pearson S, Shen Y. Data protection-aware design for cloud services. In: Jaatun MG, Zhao G, Rong C, editors. Cloud Comput. Berlin, Heidelberg: Springer; 2009. p. 119\u201330. https:\/\/doi.org\/10.1007\/978-3-642-10665-1_11."},{"key":"1118_CR28","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.procs.2018.10.181","volume":"141","author":"A Al-Badi","year":"2018","unstructured":"Al-Badi A, Tarhini A, Khan AI. Exploring big data governance frameworks. Procedia Comput Sci. 2018;141:271\u20137. https:\/\/doi.org\/10.1016\/j.procs.2018.10.181.","journal-title":"Procedia Comput Sci"},{"key":"1118_CR29","doi-asserted-by":"publisher","unstructured":"Aissa MMB, Sfaxi L, Robbana R. DECIDE: a new decisional big data methodology for a better data governance. In: Proc. of EMCIS, vol. 402. Dubai, EAU, 2020;63\u201378. https:\/\/doi.org\/10.1007\/978-3-030-63396-7_5. Springer.","DOI":"10.1007\/978-3-030-63396-7_5"},{"key":"1118_CR30","doi-asserted-by":"publisher","unstructured":"Anisetti M, Bena N, Berto F, Jeon G. A devsecops-based assurance process for big data analytics. In: Proc. of IEEE ICWS 2022, Barcelona, Spain 2022. https:\/\/doi.org\/10.1109\/ICWS55610.2022.00017.","DOI":"10.1109\/ICWS55610.2022.00017"},{"key":"1118_CR31","doi-asserted-by":"publisher","DOI":"10.1089\/big.2021.0369","author":"CA Ardagna","year":"2023","unstructured":"Ardagna CA, Bena N, Hebert C, Krotsiani M, Kloukinas C, Spanoudakis G. Big data assurance: an approach based on service- level agreements. Big Data. 2023. https:\/\/doi.org\/10.1089\/big.2021.0369.","journal-title":"Big Data"},{"key":"1118_CR32","doi-asserted-by":"publisher","unstructured":"Marco A, A, AC, Chiara B, Ernesto D, Antongiacomo, P, Alessandro B. Dynamic and scalable enforcement of access control policies for big data, pp. 71\u201378. Association for Computing Machinery, New York, NY, USA 2021. https:\/\/doi.org\/10.1145\/3444757.3485107.","DOI":"10.1145\/3444757.3485107"},{"key":"1118_CR33","unstructured":"Microsoft: Microsoft Presidio: Open-source tools for differential privacy and PII detection. https:\/\/github.com\/microsoft\/presidio. Accessed: 2024-10-30."},{"key":"1118_CR34","unstructured":"Apache Software Foundation: Apache Ranger: Framework to enable, monitor, and manage comprehensive data security across the Hadoop platform. https:\/\/ranger.apache.org\/. Accessed: 2024-10-30."},{"key":"1118_CR35","unstructured":"Google Cloud: Google Cloud Data Loss Prevention (DLP). Available at: https:\/\/cloud.google.com\/dlp 2023."},{"key":"1118_CR36","unstructured":"Amazon Web Services: AWS Macie. Available at: https:\/\/aws.amazon.com\/macie\/ 2023."},{"key":"1118_CR37","unstructured":"IBM: IBM Security Guardium Data Protection. Available at: https:\/\/www.ibm.com\/products\/guardium 2023."},{"key":"1118_CR38","unstructured":"Apache Software Foundation: Apache Sentry. Available at: https:\/\/sentry.apache.org\/ 2023."},{"issue":"1","key":"1118_CR39","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/3108936","volume":"18","author":"MM Rathore","year":"2017","unstructured":"Rathore MM, Paul A, Ahmad A, Anisetti M, Jeon G. Hadoop-based intelligent care system (hics) analytical approach for big data in iot. ACM Trans Internet Technol. 2017;18(1):8\u20131824. https:\/\/doi.org\/10.1145\/3108936.","journal-title":"ACM Trans Internet Technol"},{"key":"1118_CR40","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.scs.2017.12.019","volume":"39","author":"M Anisetti","year":"2018","unstructured":"Anisetti M, Ardagna C, Bellandi V, Cremonini M, Frati F, Damiani E. Privacy-aware big data analytics as a service for public health policies in smart cities. Sustain Cities Soc. 2018;39:68\u201377. https:\/\/doi.org\/10.1016\/j.scs.2017.12.019.","journal-title":"Sustain Cities Soc"},{"key":"1118_CR41","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1016\/j.future.2020.02.052","volume":"108","author":"FM Awaysheh","year":"2020","unstructured":"Awaysheh FM, Alazab M, Gupta M, Pena TF, Cabaleiro JC. Next-generation big data federation access control: a reference model. Futur Gener Comput Syst. 2020;108:726\u201341. https:\/\/doi.org\/10.1016\/j.future.2020.02.052.","journal-title":"Futur Gener Comput Syst"},{"key":"1118_CR42","doi-asserted-by":"publisher","unstructured":"Gupta M, Patwa F, Sandhu R. An attribute-based access control model for secure big data processing in Hadoop Ecosystem. In: Proceedings of the Third ACM Workshop on Attribute-Based Access Control. ABAC\u201918, pp. 13\u201324. Association for Computing Machinery, New York, NY, USA 2018. https:\/\/doi.org\/10.1145\/3180457.3180463.","DOI":"10.1145\/3180457.3180463"},{"key":"1118_CR43","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-61176-1_4","volume-title":"Data and applications security and privacy XXXI","author":"M Gupta","year":"2017","unstructured":"Gupta M, Patwa F, Sandhu R. Object-tagged RBAC model for the Hadoop ecosystem. In: Livraga G, Zhu S, editors. Data and applications security and privacy XXXI. Cham: Springer; 2017. p. 63\u201381. https:\/\/doi.org\/10.1007\/978-3-319-61176-1_4."},{"key":"1118_CR44","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/978-3-030-67731-2_38","volume-title":"Proc. of SOFSEM","author":"J Chabin","year":"2021","unstructured":"Chabin J, Ciferri CDA, Halfeld-Ferrari M, Hara CS, Penteado RRM. Role-based access control on graph databases. In: Bure\u0161 T, Dondi R, Gamper J, Guerrini G, Jurdzi\u0144ski T, Pahl C, Sikora F, Wong PWH, editors. Proc. of SOFSEM. Cham: Springer; 2021. p. 519\u201334. https:\/\/doi.org\/10.1007\/978-3-030-67731-2_38."},{"key":"1118_CR45","doi-asserted-by":"publisher","unstructured":"Gupta E, Sural S, Vaidya J, Atluri V. Enabling attribute-based access control in NoSQL Databases. IEEE Transactions on Emerging Topics in Computing, 2022;1\u201315. https:\/\/doi.org\/10.1109\/TETC.2022.3193577.","DOI":"10.1109\/TETC.2022.3193577"},{"key":"1118_CR46","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-030-27615-7_4","volume-title":"Database and expert systems applications","author":"L Huang","year":"2019","unstructured":"Huang L, Zhu Y, Wang X, Khurshid F. An attribute-based fine-grained access control mechanism for HBase. In: Hartmann S, K\u00fcng J, Chakravarthy S, Anderst-Kotsis G, Tjoa AM, Khalil I, editors. Database and expert systems applications. Cham: Springer; 2019. p. 44\u201359. https:\/\/doi.org\/10.1007\/978-3-030-27615-7_4."},{"key":"1118_CR47","doi-asserted-by":"publisher","unstructured":"Preuveneers D, Joosen W. Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge Microservices. In: Proc. of EuroS &PW, 2019;29\u201338.https:\/\/doi.org\/10.1109\/EuroSPW.2019.00010.","DOI":"10.1109\/EuroSPW.2019.00010"},{"key":"1118_CR48","doi-asserted-by":"publisher","unstructured":"Matos E, Tiburski RT, Amaral LA, Hessel F. Providing Context-Aware Security for IoT Environments Through Context Sharing Feature. In: Proc. of IEEE TrustCom\/BigDataSE, 2018;1711\u20131715. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00257.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00257"},{"key":"1118_CR49","unstructured":"Hill RC, Lockhartr H. eXtensible Access Control Markup Language (XACML) Version 3.0. OASIS Standard 2013. https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html."},{"key":"1118_CR50","doi-asserted-by":"publisher","unstructured":"Hu V, Grance T, Ferraiolo D, Kuhn D. An Access Control Scheme for Big Data Processing. In: Proc. of 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1\u20137. IEEE, Miami, USA 2014. https:\/\/doi.org\/10.4108\/icst.collaboratecom.2014.257649.","DOI":"10.4108\/icst.collaboratecom.2014.257649"},{"key":"1118_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102732","volume":"166","author":"M Sellami","year":"2020","unstructured":"Sellami M, Mezni H, Hacid MS. On the use of big data frameworks for big service composition. J Netw Comput Appl. 2020;166: 102732. https:\/\/doi.org\/10.1016\/j.jnca.2020.102732.","journal-title":"J Netw Comput Appl"},{"key":"1118_CR52","doi-asserted-by":"publisher","unstructured":"Carminati B, Ferrari E, K\u00a0Hung, PC. Security conscious web service composition. In: 2006 IEEE International Conference on Web Services (ICWS\u201906), 2006;489\u2013496. https:\/\/doi.org\/10.1109\/ICWS.2006.115.","DOI":"10.1109\/ICWS.2006.115"},{"issue":"3","key":"1118_CR53","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1109\/TSC.2022.3195071","volume":"16","author":"M Anisetti","year":"2023","unstructured":"Anisetti M, Ardagna CA, Bena N. Multi-dimensional certification of modern distributed systems. IEEE Trans Serv Comput. 2023;16(3):1999\u20132012. https:\/\/doi.org\/10.1109\/TSC.2022.3195071.","journal-title":"IEEE Trans Serv Comput"},{"key":"1118_CR54","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-662-43936-4_7","volume-title":"Data and applications security and privacy XXVIII","author":"S Vavilis","year":"2014","unstructured":"Vavilis S, Petkovi\u0107 M, Zannone N. Data leakage quantification. In: Atluri V, Pernul G, editors. Data and applications security and privacy XXVIII. Berlin, Heidelberg: Springer; 2014. p. 98\u2013113. https:\/\/doi.org\/10.1007\/978-3-662-43936-4_7."}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01118-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-025-01118-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-025-01118-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T11:55:42Z","timestamp":1741607742000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-025-01118-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,10]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["1118"],"URL":"https:\/\/doi.org\/10.1186\/s40537-025-01118-5","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,10]]},"assertion":[{"value":"13 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"62"}}