{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:03:00Z","timestamp":1729623780893,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/spw.2013.26","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T17:07:43Z","timestamp":1374772063000},"page":"1-7","source":"Crossref","is-referenced-by-count":24,"title":["Log Design for Accountability"],"prefix":"10.1109","author":[{"given":"Denis","family":"Butin","sequence":"first","affiliation":[]},{"given":"Marcos","family":"Chicote","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Le Metayer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2011.26"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.5"},{"key":"18","first-page":"152","article-title":"Towards a theory of accountability and audit","author":"jagadeesan","year":"2009","journal-title":"ESORICS'09"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0017-y"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073282"},{"journal-title":"Implementing Privacy Codes of Practice","year":"1995","author":"bennett","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266843"},{"key":"11","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-642-01465-9_11","article-title":"A formal privacy management framework","volume":"5491","author":"le me?tayer","year":"2008","journal-title":"Lecture Notes in Computer Science"},{"key":"12","first-page":"3","article-title":"Formal methods as a link between software code and legal rules","author":"le me?tayer","year":"2011","journal-title":"SEFM'11"},{"journal-title":"Forward Integrity for Secure Audit Logs","year":"1997","author":"bellare","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"22","article-title":"Building an encrypted and searchable audit log","author":"waters","year":"0","journal-title":"The 11th Annual Network and Distributed System Security Symposium 2004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.29"},{"journal-title":"TAS3 Trusted Architecture for Securely Shared Services","year":"2011","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1313"},{"journal-title":"XACML - extensible Access Control Markup Language","year":"2005","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982510"},{"key":"28","first-page":"213","article-title":"Towards data protection compliance","author":"zannone","year":"2010","journal-title":"SECRYPT"},{"key":"29","article-title":"PPL Engine: A Symmetric Architecture for Privacy Policy Handling","author":"trabelsi","year":"0","journal-title":"W3C Workshop on Privacy and Data Usage Control 2010"},{"journal-title":"ARTICLE 29 Data Protection Working Party","article-title":"Opinion 3\/2010 on the principle of accountability","year":"2010","key":"3"},{"journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/572020.572041"},{"journal-title":"Proposal for A Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (General Data Protection Regulation)","year":"2012","key":"1"},{"journal-title":"PrimeLife Deliverable D5 3 4 Report on Design and Implementation","year":"2011","author":"trabelsi","key":"30"},{"journal-title":"Privacy Act","year":"1974","key":"7"},{"journal-title":"Gramm-Leach-Bliley Act","year":"1999","key":"6"},{"journal-title":"The Children's Online Privacy Protection Act","year":"1998","key":"5"},{"journal-title":"Break-Glass An Approach to Granting Emergency Access to Healthcare Systems","year":"2004","key":"31"},{"journal-title":"Health insurance portability and accountability act","year":"1996","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2527031.2527043"}],"event":{"name":"2013 IEEE CS Security and Privacy Workshops (SPW2013)","start":{"date-parts":[[2013,5,23]]},"location":"San Francisco, CA","end":{"date-parts":[[2013,5,24]]}},"container-title":["2013 IEEE Security and Privacy Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6564486\/6565207\/06565220.pdf?arnumber=6565220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:51:28Z","timestamp":1498049488000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6565220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/spw.2013.26","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}