{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:23:51Z","timestamp":1751495031314,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/telerise.2015.12","type":"proceedings-article","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T16:24:02Z","timestamp":1439483042000},"page":"20-25","source":"Crossref","is-referenced-by-count":4,"title":["A Guide to End-to-End Privacy Accountability"],"prefix":"10.1109","author":[{"given":"Denis","family":"Butin","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Le Metayer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Demonstrating Accountability With a Scorecard Frame-work","year":"2013","author":"mcquay","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32805-3_23"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413173"},{"key":"ref30","article-title":"Transparency and End-to-End Accountability: Requirements for Web Privacy Policy Languages","author":"weitzner","year":"2006","journal-title":"Proceedings of the W3C Workshop on Languages for Privacy Policy Negotiation and Semantics-Driven enforcement"},{"year":"0","key":"ref35","article-title":"Auditing data protection &#x2013; a guide to ICO data protection audits"},{"key":"ref34","article-title":"D&#x00E9;lib&#x00E9;ration 2011-316","volume":"255","year":"2011","journal-title":"Journal Officiel de la R&#x00E9;publique Fran&#x00E7;aise"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7540-4_16"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.26"},{"key":"ref12","article-title":"Implementing Privacy Codes of Practice","author":"bennett","year":"1995","journal-title":"Canadian Standards Association"},{"year":"2005","key":"ref13","article-title":"XACML: eXtensible Access Control Markup Language"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"ref16","first-page":"162","article-title":"A Toolkit for Managing Enterprise Privacy Policies","volume":"2808","author":"backes","year":"2003","journal-title":"ESORICS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943541"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206967"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01465-9_11"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0017-y"},{"key":"ref27","article-title":"Building an Encrypted and Searchable Audit Log","author":"waters","year":"2004","journal-title":"The 11th Annual Network and Distributed System Security Symposium"},{"key":"ref3","first-page":"152","article-title":"Towards a Theory of Accountability and Audit","volume":"5789","author":"jagadeesan","year":"2009","journal-title":"ESORICS Ser LNCS"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/978-3-319-04483-5_5","article-title":"Privacy through Accountability: A Computer Science Perspective","volume":"8337","author":"datta","year":"2014","journal-title":"Distributed Computing and Internet Technology"},{"journal-title":"Joint NEMA\/COCIR\/JIRA Security and Privacy Committee (SPC)","article-title":"Break-Glass: An Approach to Granting Emergency Access to Healthcare Systems","year":"2004","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773926"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1057\/9781137032225_2","article-title":"The Meaning of &#x2018;Accountability&#x2019; in the Information Privacy Context","author":"raab","year":"2012","journal-title":"Managing Privacy through Accountability Palgrave Macmillan"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1057\/9781137032225.0016"},{"journal-title":"Article 29 Working Party","article-title":"Opinion 3\/2010 on the principle of accountability","year":"2010","key":"ref2"},{"journal-title":"The Centre for Information Policy Leadership","article-title":"Data Protection Accountability: The Essential Elements","year":"2009","key":"ref9"},{"year":"2013","key":"ref1","article-title":"Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), inofficial LIBE version"},{"key":"ref20","article-title":"A semantics based approach to privacy languages","volume":"21","author":"li","year":"2006","journal-title":"Comput Syst Sci Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06410-9_12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2011.26"},{"key":"ref24","article-title":"PPL Engine: A Symmetric Architecture for Privacy Policy Handling","author":"trabelsi","year":"2010","journal-title":"W3C Workshop on Privacy and Data Usage Control"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2543-0_1"},{"key":"ref26","article-title":"Forward Integrity for Secure Audit Logs","author":"bellare","year":"1997","journal-title":"Tech Rep"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"}],"event":{"name":"2015 IEEE\/ACM 1st International Workshop on Technical and Legal Aspects of Data Privacy and Security (TELERISE)","start":{"date-parts":[[2015,5,18]]},"location":"Florence, Italy","end":{"date-parts":[[2015,5,18]]}},"container-title":["2015 IEEE\/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7180535\/7182453\/07182465.pdf?arnumber=7182465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T10:05:31Z","timestamp":1567073131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7182465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/telerise.2015.12","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}