{"id":"https://openalex.org/W2898930306","doi":"https://doi.org/10.1109/etfa.2018.8502545","title":"A privacy-aware distributed software architecture for automation services in compliance with GDPR","display_name":"A privacy-aware distributed software architecture for automation services in compliance with GDPR","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2898930306","doi":"https://doi.org/10.1109/etfa.2018.8502545","mag":"2898930306"},"language":"en","primary_location":{"id":"doi:10.1109/etfa.2018.8502545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088186313","display_name":"Tom Kittmann","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tom Kittmann","raw_affiliation_strings":["GESTALT Robotics, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"GESTALT Robotics, Berlin, Germany","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002499102","display_name":"Jens Lambrecht","orcid":"https://orcid.org/0000-0002-1017-9548"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jens Lambrecht","raw_affiliation_strings":["Chair Industry-Grade Networks and Clouds, Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Chair Industry-Grade Networks and Clouds, Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071515962","display_name":"Christian Horn","orcid":"https://orcid.org/0000-0001-8042-3748"},"institutions":[{"id":"https://openalex.org/I4577782","display_name":"Technische Universit\u00e4t Berlin","ror":"https://ror.org/03v4gjf40","country_code":"DE","type":"education","lineage":["https://openalex.org/I4577782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christian Horn","raw_affiliation_strings":["Chair Industry-Grade Networks and Clouds, Technische Universit\u00e4t Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Chair Industry-Grade Networks and Clouds, Technische Universit\u00e4t Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I4577782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088186313"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4178,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.67761259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1067","last_page":"1070"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.7701230645179749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7035017013549805},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5988798141479492},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.58757084608078},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.559472918510437},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.48746728897094727},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.47999900579452515},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4660208225250244},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4301597476005554},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.42476147413253784},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4227443337440491},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.37281113862991333},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2083437144756317},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14124774932861328}],"concepts":[{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.7701230645179749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035017013549805},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5988798141479492},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.58757084608078},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.559472918510437},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.48746728897094727},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.47999900579452515},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4660208225250244},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4301597476005554},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.42476147413253784},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4227443337440491},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.37281113862991333},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2083437144756317},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14124774932861328},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/etfa.2018.8502545","is_oa":false,"landing_page_url":"https://doi.org/10.1109/etfa.2018.8502545","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1949591461","https://openalex.org/W2094537981","https://openalex.org/W2294937515","https://openalex.org/W2544499944","https://openalex.org/W2798799029","https://openalex.org/W2801645418","https://openalex.org/W2952719362"],"related_works":["https://openalex.org/W2917102635","https://openalex.org/W3023256691","https://openalex.org/W2789497412","https://openalex.org/W2883729192","https://openalex.org/W2910484607","https://openalex.org/W2794700933","https://openalex.org/W2901967497","https://openalex.org/W3171079982","https://openalex.org/W3048759155","https://openalex.org/W3000605968"],"abstract_inverted_index":{"The":[0],"recently":[1],"applied":[2],"General":[3],"Data":[4],"Protection":[5],"Regulation":[6],"(GDPR)":[7],"aims":[8],"to":[9,118],"protect":[10],"all":[11],"EU":[12],"citizens":[13],"from":[14,92,98],"privacy":[15],"and":[16,31,40,49,54,115,126],"data":[17],"breaches":[18],"in":[19,101],"an":[20],"increasingly":[21],"data-driven":[22],"world.":[23],"Consequently,":[24],"this":[25],"deeply":[26],"affects":[27],"the":[28,74,80],"factory":[29],"domain":[30,82],"its":[32,95],"human-centric":[33],"automation":[34],"paradigm.":[35],"Especially":[36],"collaboration":[37],"of":[38,73],"human":[39,66],"machines":[41],"as":[42,44],"well":[43],"individual":[45],"support":[46],"are":[47],"enabled":[48],"enhanced":[50],"by":[51,58],"processing":[52],"audio":[53],"video":[55],"data,":[56],"e.g.":[57],"using":[59],"algorithms":[60],"which":[61],"re-identify":[62],"humans":[63],"or":[64],"analyse":[65],"behaviour.":[67],"We":[68],"introduce":[69,88],"most":[70],"significant":[71],"impacts":[72],"recent":[75],"legal":[76,96],"regulation":[77],"change":[78],"towards":[79],"automations":[81],"at":[83],"a":[84,89,102,120],"glance.":[85],"Furthermore,":[86],"we":[87],"representative":[90],"scenario":[91],"production,":[93],"deduce":[94],"affections":[97],"GDPR":[99],"resulting":[100],"privacy-aware":[103],"software":[104],"architecture.":[105],"This":[106],"architecture":[107],"covers":[108],"modern":[109],"virtualization":[110],"techniques":[111],"along":[112],"with":[113],"authorization":[114],"end-to-end":[116],"encryption":[117],"ensure":[119],"secure":[121],"communication":[122],"between":[123],"distributes":[124],"services":[125],"databases":[127],"for":[128],"distinct":[129],"purposes.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
