{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:13:39Z","timestamp":1767903219111,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/ares.2016.95","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T02:53:22Z","timestamp":1481943202000},"page":"653-660","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Impact Assessment Template for Provenance"],"prefix":"10.1109","author":[{"given":"Jenni","family":"Reuben","sequence":"first","affiliation":[]},{"given":"Leonardo A.","family":"Martucci","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-Hubner","sequence":"additional","affiliation":[]},{"given":"Heather S.","family":"Packer","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hedbom","sequence":"additional","affiliation":[]},{"given":"Luc","family":"Moreau","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"PROV-DM: The PROV Data Model","author":"moreau","year":"2013","journal-title":"W3C Recommendation Tech Rep REC-prov-dm-20130430"},{"key":"ref11","year":"2013","journal-title":"Opinion 03\/2013 on purpose limitation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"ref13","article-title":"Enterprise privacy authorization language (EPAL 1.2)","volume":"156","author":"ashley","year":"2003","journal-title":"Submission to W3C"},{"key":"ref14","article-title":"PrimeLife - Privacy and Identity Management in Europe for Life: Policy Languages","year":"2011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952988"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938554"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998456"},{"key":"ref28","volume":"9","author":"weber","year":"2012","journal-title":"Multilaterally secure pervasive cooperation"},{"key":"ref4","author":"mendel","year":"2008","journal-title":"Freedom of Information A Comparative Legal Survey"},{"key":"ref27","article-title":"A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Un-observability, Pseudonymity, and Identity Management v.034","author":"pfitzmann","year":"2010"},{"key":"ref3","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref6","year":"2012","journal-title":"Privacy and Data Protection Impact Assessment Framework for RFID Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.002"},{"key":"ref8","article-title":"Privacy impact assessments","year":"2010","journal-title":"Tech Rep"},{"key":"ref7","article-title":"Conducting privacy impact assessments code of practice, v. 1.0","author":"ico","year":"2014","journal-title":"Tech Rep"},{"key":"ref2","article-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","journal-title":"Official Journal"},{"key":"ref9","article-title":"Privacy Issues of Provenance in Electronic Healthcare Record Systems","author":"kifor","year":"2006","journal-title":"Proceedings of the 1st Int Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"ref20","article-title":"Obscuring provenance confi-dential information via graph transformation","author":"hussein","year":"2015","journal-title":"Trust Management IX"},{"key":"ref22","first-page":"293","article-title":"Signatures and efficient proofs on committed graphs and npstatements","volume":"8975","author":"gro\u00df","year":"2015","journal-title":"Financial Crypto 2015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62222"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02617-1_6"},{"key":"ref23","first-page":"349","article-title":"Secure scientific workflow provenance querying with security views","author":"chebotko","year":"2008","journal-title":"9th Int Conf on Web-Age Information Management"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","article-title":"Fuzzy Identity-Based Encryption","volume":"3494","author":"sahai","year":"0","journal-title":"Advances in Cryptology - EUROCRYPT 2005"},{"key":"ref25","article-title":"Scalable Access Controls for Lineage","author":"rosenthal","year":"2009","journal-title":"Workshop on the Theory and Practice of Provenance"}],"event":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES )","location":"Salzburg, Austria","start":{"date-parts":[[2016,8,31]]},"end":{"date-parts":[[2016,9,2]]}},"container-title":["2016 11th International Conference on Availability, Reliability and Security (ARES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7777698\/7784494\/07784630.pdf?arnumber=7784630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:46:53Z","timestamp":1568638013000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7784630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ares.2016.95","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}