{"id":"https://openalex.org/W2803082977","doi":"https://doi.org/10.23919/icitst.2017.8356406","title":"Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR","display_name":"Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2803082977","doi":"https://doi.org/10.23919/icitst.2017.8356406","mag":"2803082977"},"language":"en","primary_location":{"id":"doi:10.23919/icitst.2017.8356406","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044014987","display_name":"Alaa Altorbaq","orcid":null},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Alaa Altorbaq","raw_affiliation_strings":["Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden","institution_ids":["https://openalex.org/I161593684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005519366","display_name":"Fredrik Blix","orcid":"https://orcid.org/0000-0002-9925-1592"},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Fredrik Blix","raw_affiliation_strings":["Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden","institution_ids":["https://openalex.org/I161593684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020797890","display_name":"Stina Sorman","orcid":null},"institutions":[{"id":"https://openalex.org/I161593684","display_name":"Stockholm University","ror":"https://ror.org/05f0yaq80","country_code":"SE","type":"education","lineage":["https://openalex.org/I161593684"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Stina Sorman","raw_affiliation_strings":["Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Systems Sciences DSV, Stockholm University, Stockholm, Sweden","institution_ids":["https://openalex.org/I161593684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044014987"],"corresponding_institution_ids":["https://openalex.org/I161593684"],"apc_list":null,"apc_paid":null,"fwci":3.869,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94767208,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7697022557258606},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.6359659433364868},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6224167346954346},{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.6068286299705505},{"id":"https://openalex.org/keywords/data-retention","display_name":"Data retention","score":0.5715534090995789},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49796080589294434},{"id":"https://openalex.org/keywords/grounded-theory","display_name":"Grounded theory","score":0.49689415097236633},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.47893911600112915},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4472530484199524},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.0961826741695404},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08284008502960205}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7697022557258606},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.6359659433364868},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6224167346954346},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.6068286299705505},{"id":"https://openalex.org/C2780866740","wikidata":"https://www.wikidata.org/wiki/Q5227345","display_name":"Data retention","level":2,"score":0.5715534090995789},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49796080589294434},{"id":"https://openalex.org/C156325361","wikidata":"https://www.wikidata.org/wiki/Q1152864","display_name":"Grounded theory","level":3,"score":0.49689415097236633},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.47893911600112915},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4472530484199524},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.0961826741695404},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08284008502960205},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icitst.2017.8356406","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icitst.2017.8356406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4099999964237213,"id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W92976994","https://openalex.org/W1605824561","https://openalex.org/W1615506555","https://openalex.org/W1658908529","https://openalex.org/W1834203911","https://openalex.org/W1904594683","https://openalex.org/W1993034513","https://openalex.org/W2025431899","https://openalex.org/W2026792402","https://openalex.org/W2052202336","https://openalex.org/W2108953146","https://openalex.org/W2168869093","https://openalex.org/W2513682819","https://openalex.org/W2543894551","https://openalex.org/W2608014122","https://openalex.org/W2750046895","https://openalex.org/W3124713951","https://openalex.org/W4399339983"],"related_works":["https://openalex.org/W2917102635","https://openalex.org/W3023256691","https://openalex.org/W2789497412","https://openalex.org/W2883729192","https://openalex.org/W2910484607","https://openalex.org/W2794700933","https://openalex.org/W2901967497","https://openalex.org/W3171079982","https://openalex.org/W3048759155","https://openalex.org/W2799236100"],"abstract_inverted_index":{"The":[0,115,126,139],"new":[1],"European":[2],"General":[3],"Data":[4],"Protection":[5],"Regulation":[6],"GDPR":[7],"requires":[8],"that":[9],"organisations":[10,91],"placing":[11],"personal":[12,51,152],"data":[13,22,52,113,123,190],"on":[14,119],"cloud":[15,46,55,177],"services":[16,178],"can":[17],"protect":[18],"certain":[19],"rights":[20,110,193],"of":[21,34,45,50,141,150,169,176],"subjects,":[23,191],"such":[24],"as":[25,104,106,186,188],"their":[26,35],"right":[27],"to":[28,38,67,73,94,97,107,109,165,181],"access,":[29],"demand":[30],"erasure":[31],"and":[32,42,59,77,86,158,163,174],"rectification":[33],"data.":[36],"Due":[37],"the":[39,48,54,83,102,166,170,189],"technical":[40],"complexity":[41],"shared":[43],"environment":[44],"services,":[47],"flow":[49],"in":[53],"must":[56],"be":[57,74,95],"secured":[58],"controlled":[60],"from":[61,112,183],"its":[62],"initial":[63],"collection,":[64],"via":[65],"processing,":[66],"final":[68],"erasure.":[69],"This":[70,80],"has":[71],"proved":[72],"both":[75],"organisationally":[76],"technically":[78],"challenging.":[79],"study":[81,116,143],"identifies":[82],"related":[84],"challenges":[85,157],"outlines":[87],"potential":[88],"solutions":[89],"for":[90],"who":[92],"need":[93],"able":[96],"adequately":[98],"demonstrate":[99],"compliance":[100],"with":[101,121],"regulation":[103],"well":[105,187],"respond":[108],"requests":[111],"subjects.":[114],"is":[117,144],"based":[118],"interviews":[120,128],"ten":[122],"protection":[124],"experts.":[125],"semi-structured":[127],"were":[129,161],"qualitatively":[130],"analysed,":[131],"using":[132],"an":[133],"approach":[134],"informed":[135],"by":[136],"Grounded":[137],"Theory.":[138],"contribution":[140],"this":[142],"a":[145,151],"refined":[146],"model":[147],"depicting":[148],"stages":[149,168],"information":[153],"life-cycle.":[154],"Additionally,":[155],"twelve":[156],"fourteen":[159],"recommendations":[160],"identified":[162],"presented":[164],"various":[167],"model.":[171],"Both":[172],"clients":[173],"providers":[175],"are":[179,194],"expected":[180],"benefit":[182],"these":[184],"results,":[185],"whose":[192],"protected.":[195]},"counts_by_year":[{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
