{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T15:35:24Z","timestamp":1757777724966,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223113"},{"type":"electronic","value":"9783030223120"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22312-0_26","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"374-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Contractual Agreements for Revocation of Online Data"],"prefix":"10.1007","author":[{"given":"Theodor","family":"Schnitzler","sequence":"first","affiliation":[]},{"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Amjad, G., Mirza, M.S., P\u00f6pper, C.: Forgetting with puzzles: using cryptographic puzzles to support digital forgetting. In: CODASPY 2018, pp. 342\u2013353. ACM (2018)","DOI":"10.1145\/3176258.3176327"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., Andrade, E.: Redactable blockchain\u2013or\u2013rewriting history in bitcoin and friends. In: EuroSP 2017. IEEE (2017)","DOI":"10.1109\/EuroSP.2017.37"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Ayalon, O., Toch, E.: Retrospective privacy: managing longitudinal privacy in online social networks. In: SOUPS 2013, pp. 4:1\u20134:13. ACM (2013)","DOI":"10.1145\/2501604.2501608"},{"key":"26_CR4","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform (2014). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Accessed 28 Feb 2019"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.A.: EphPub: toward robust ephemeral publishing. In: ICNP 2011, pp. 165\u2013175. IEEE (2011)","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Chen, B., Jia, S., Xia, L., Liu, P.: Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. In: ACSAC 2016, pp. 496\u2013507. ACM (2016)","DOI":"10.1145\/2991079.2991101"},{"key":"26_CR7","unstructured":"Ellis, S., Juels, A., Nazarov, S.: ChainLink - A Decentralized Oracle Network (2017). https:\/\/crushcrypto.com\/wp-content\/uploads\/2017\/09\/LINK-Whitepaper.pdf. Accessed 28 Feb 2019"},{"key":"26_CR8","unstructured":"ETH Gas Station: ETH Gas Station (2017). https:\/\/ethgasstation.info\/. Accessed 28 Feb 2019"},{"key":"26_CR9","unstructured":"European Parliament: Regulation (EU) 2016\/679 (General Data Protection Regulation). Official Journal of the European Union 59 (2016)"},{"key":"26_CR10","unstructured":"European Union: Factsheet on the \u201cRight to be Forgotten\u201d Ruling (C-131\/12) (2014)"},{"key":"26_CR11","unstructured":"European Union Court of Justice: Judgment in Case C-131\/12. Press release No. 70\/14 (2014). https:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2014-05\/cp140070en.pdf. Accessed 28 Feb 2019"},{"key":"26_CR12","unstructured":"Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: increasing data privacy with self-destructing data. In: USENIX Security 2009, pp. 299\u2013316. USENIX (2009)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez Caba\u00f1as, J., Cuevas, A., Cuevas, R.: FDVT: data valuation tool for Facebook users. In: CHI 2017, pp. 3799\u20133809. ACM (2017)","DOI":"10.1145\/3025453.3025903"},{"key":"26_CR14","unstructured":"Google Inc.: European Privacy Requests for Search Removals. Transparency report (2017). https:\/\/www.google.com\/transparencyreport\/removals\/europeprivacy\/. Accessed 28 Feb 2019"},{"key":"26_CR15","unstructured":"Jager, T.: How to build time-lock encryption. Cryptology ePrint Archive, Report 2015\/478 (2015). http:\/\/eprint.iacr.org\/2015\/478"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: SP 2016, pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Li, C., Palanisamy, B.: Timed-release of self-emerging data using distributed hash tables. In: ICDCS 2017, pp. 2344\u20132351, June 2017","DOI":"10.1109\/ICDCS.2017.109"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-22792-9_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"M Mahmoody","year":"2011","unstructured":"Mahmoody, M., Moran, T., Vadhan, S.: Time-lock puzzles in the random oracle model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 39\u201350. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_3"},{"key":"26_CR19","doi-asserted-by":"publisher","DOI":"10.1515\/9781400838455","volume-title":"Delete: The Virtue of Forgetting in the Digital Age","author":"V Mayer-Sch\u00f6nberger","year":"2011","unstructured":"Mayer-Sch\u00f6nberger, V.: Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press, Princeton (2011)"},{"key":"26_CR20","unstructured":"Mondal, M., Messias, J., Ghosh, S., Gummadi, K.P., Kate, A.: Forgetting in social media: understanding and controlling longitudinal exposure of socially shared data. In: SOUPS 2016, pp. 287\u2013299. USENIX (2016)"},{"key":"26_CR21","unstructured":"Open Whisper Systems: Signal (2010). https:\/\/signal.org\/. Accessed 28 Feb 2019"},{"key":"26_CR22","unstructured":"Oraclize Ltd.: Oraclize - Blockchain Oracle Service, Enabling Data-Rich Smart Contracts (2017). http:\/\/www.oraclize.it. Accessed 28 Feb 2019"},{"key":"26_CR23","unstructured":"Perlman, R.: The Ephemerizer: making data disappear. Technical report SMLI TR-2005-140, Sun Microsystems Laboratories, Inc. (2005)"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"P\u00f6pper, C., Basin, D., Capkun, S., Cremers, C.: Keeping data secret under full compromise using porter devices. In: ACSAC 2010, pp. 241\u2013250. ACM (2010)","DOI":"10.1145\/1920261.1920297"},{"key":"26_CR25","unstructured":"Puddu, I., Dmitrienko, A., Capkun, S.: $$\\mu $$chain: how to forget without hard forks. Cryptology ePrint Archive, Report 2017\/106 (2017). http:\/\/eprint.iacr.org\/2017\/106"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Reimann, S., D\u00fcrmuth, M.: Timed revocation of user data: long expiration times from existing infrastructure. In: WPES 2012, pp. 65\u201374. ACM (2012)","DOI":"10.1145\/2381966.2381976"},{"key":"26_CR27","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical report (1996)"},{"issue":"9","key":"26_CR28","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2500468.2500474","volume":"56","author":"E Shein","year":"2013","unstructured":"Shein, E.: Ephemeral data. Commun. ACM 56(9), 20\u201322 (2013)","journal-title":"Commun. ACM"},{"key":"26_CR29","unstructured":"Snap Inc.: Snapchat (2011). https:\/\/www.snapchat.com\/. Accessed 28 Feb 2019"},{"issue":"1","key":"26_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1057\/jit.2016.4","volume":"32","author":"S Spiekermann","year":"2017","unstructured":"Spiekermann, S., Korunovska, J.: Towards a value theory for personal data. J. Inf. Technol. 32(1), 62\u201384 (2017)","journal-title":"J. Inf. Technol."},{"issue":"2","key":"26_CR31","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. Inf. Syst. Res. 22(2), 254\u2013268 (2011)","journal-title":"Inf. Syst. Res."},{"key":"26_CR32","unstructured":"Venkatesan, R., Koon, S.M., Jakubowski, M.H., Moulin, P.: Robust image hashing. In: ICIP 2000, pp. 664\u2013666. IEEE (2000)"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Yang, B., Gu, F., Niu, X.: Block mean value based image perceptual hashing. In: IIH-MSP 2006, pp. 167\u2013172. IEEE (2006)","DOI":"10.1109\/IIH-MSP.2006.265125"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Zarras, A., Kohls, K., D\u00fcrmuth, M., P\u00f6pper, C.: Neuralyzer: flexible expiration times for the revocation of online data. In: CODASPY 2016, pp. 14\u201325. ACM (2016)","DOI":"10.1145\/2857705.2857714"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town crier: an authenticated data feed for smart contracts. In: CCS 2016, pp. 270\u2013282. ACM (2016)","DOI":"10.1145\/2976749.2978326"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22312-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:38:11Z","timestamp":1710257891000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22312-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223113","9783030223120"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22312-0_26","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}