{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:36:24Z","timestamp":1770226584931,"version":"3.49.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030781194","type":"print"},{"value":"9783030781200","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78120-0_2","type":"book-chapter","created":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T05:02:49Z","timestamp":1623906169000},"page":"19-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of\u00a0Education Credentials"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7076-7563","authenticated-orcid":false,"given":"Stefan","family":"More","sequence":"first","affiliation":[]},{"given":"Peter","family":"Grassberger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8591-3463","authenticated-orcid":false,"given":"Felix","family":"H\u00f6randner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4163-9113","authenticated-orcid":false,"given":"Andreas","family":"Abraham","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3650-9733","authenticated-orcid":false,"given":"Lukas Daniel","family":"Klausner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,15]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Abraham, A., More, S., Rabensteiner, C., H\u00f6randner, F.: Revocable and offline-verifiable self-sovereign identities. In: TrustCom\/BigDataSE 2020. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00136"},{"key":"2_CR2","unstructured":"Alber, L., More, S., M\u00f6dersheim, S.A., Schlichtkrull, A.: Adapting the TPL trust policy language for a self-sovereign identity world. In: Open Identity Summit 2021. OID 2021, Gesellschaft f\u00fcr Informatik (2021, in press)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Daubert, J., M\u00fchlh\u00e4user, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: TrustCom\/BigDataSE\/ICESS 2017, pp. 546\u2013553. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"},{"key":"2_CR4","unstructured":"Allen, C., et al.: Decentralized public key infrastructure. White Paper, Rebooting the Web of Trust (2015)"},{"key":"2_CR5","unstructured":"Bear, J., Ezell, A.: Degree Mills: The Billion-Dollar Industry That Has Sold Over a Million Fake Diplomas. Prometheus Books (2012)"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"619","DOI":"10.3233\/JCS-2009-0364","volume":"18","author":"MY Becker","year":"2010","unstructured":"Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: design and semantics of a decentralized authorization language. J. Comput. Secur. 18(4), 619\u2013665 (2010)","journal-title":"J. Comput. Secur."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"B\u00f8rresen, L.J., Meier, E., Skjerven, S.A.: Detecting fake university degrees in a digital world. In: Corruption in Higher Education: Global Challenges and Responses, Global Perspectives on Higher Education, vol. 46, pp. 102\u2013107. Brill $$\\mid $$ Sense (2020)","DOI":"10.1163\/9789004433885_016"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Brunner, C., Knirsch, F., Unterweger, A., Engel, D.: A comparison of blockchain-based PKI implementations. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, pp. 333\u2013340. SciTePress (2020)","DOI":"10.5220\/0008914503330340"},{"key":"2_CR9","unstructured":"Camilleri, A.F., Duffy, K.H., Otto, N.: Modeling Educational Verifiable Credentials. Draft community group report, W3C Verifiable Credentials for Education Task Force (2020). https:\/\/w3c-ccg.github.io\/vc-ed-models. Accessed 22 Jan 2021"},{"key":"2_CR10","unstructured":"Camilleri, A.F., T\u00fcck, C.: Higher Education Interoperable Data Initiative (HEIDI). Living document (2020). https:\/\/heidirepo.github.io\/HEIDI. Accessed 22 Jan 2021"},{"key":"2_CR11","unstructured":"Connecting Europe Facility: EBSI: Use Cases and Functional Documentation (2020). https:\/\/ec.europa.eu\/cefdigital\/wiki\/display\/CEFDIGITALEBSI\/Use+Cases+and+Functional+Documentation. Accessed 22 Jan 2021"},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCOMSTD.001.1900029","volume":"3","author":"M Davie","year":"2019","unstructured":"Davie, M., Gisolfi, D., Hardman, D., Jordan, J., O\u2019Donnell, D., Reed, D.: The trust over IP stack. IEEE Commun. Stand. Mag. 3(4), 46\u201351 (2019)","journal-title":"IEEE Commun. Stand. Mag."},{"key":"2_CR13","unstructured":"Digital Credentials Consortium: Building the Digital Credential Infrastructure for the Future (2020). https:\/\/digitalcredentials.mit.edu\/wp-content\/uploads\/2020\/02\/white-paper-building-digital-credential-infrastructure-future.pdf. Accessed 22 Jan 2021"},{"key":"2_CR14","unstructured":"ETER: European Tertiary Education Register (2020). https:\/\/www.eter-project.com. Accessed 22 Jan 2021"},{"key":"2_CR15","unstructured":"Ethereum: Ethereum JSON RPC API (2020). https:\/\/eth.wiki\/json-rpc\/API. Accessed 22 Jan 2021"},{"key":"2_CR16","unstructured":"Ethereum: Solidity Documentation (2021). https:\/\/docs.soliditylang.org. Accessed 22 Jan 2021"},{"key":"2_CR17","unstructured":"Etherscan: Ethereum Blocktime (2021). https:\/\/etherscan.io\/chart\/blocktime. Accessed 22 Jan 2021"},{"key":"2_CR18","unstructured":"European Commission: Europass Digital Credentials Infrastructure (2020). https:\/\/ec.europa.eu\/futurium\/en\/europass\/europass-digital-credentials-infrastructure. Accessed 22 Jan 2021"},{"key":"2_CR19","unstructured":"FutureTrust Consortium: Global Trust Service List (2020). https:\/\/pilots.futuretrust.eu\/gtsl. Accessed 22 Jan 2021"},{"key":"2_CR20","unstructured":"Gr\u00e4ther, W., Kolvenbach, S., Ruland, R., Sch\u00fctte, J., Torres, C., Wendland, F.: Blockchain for education: lifelong learning passport. In: Proceedings of the 1st ERCIM Blockchain Workshop. European Society for Socially Embedded Technologies (2018)"},{"key":"2_CR21","unstructured":"G\u00f6ssner, S.: Transforming JSON (2006). https:\/\/goessner.net\/articles\/jsont. Accessed 22 Jan 2021"},{"key":"2_CR22","unstructured":"G\u00f6ssner, S.: JSONPath - XPath for JSON (2007). https:\/\/goessner.net\/articles\/JsonPath. Accessed 22 Jan 2021"},{"key":"2_CR23","unstructured":"HEDD: UK Higher Education Degree Datacheck (2020). https:\/\/hedd.ac.uk\/about. Accessed 22 Jan 2021"},{"key":"2_CR24","unstructured":"IMS Global Learning Consortium: Open Badges v2.0. Technical report (2018). https:\/\/www.imsglobal.org\/sites\/default\/files\/Badges\/OBv2p0Final\/index.html"},{"issue":"4","key":"2_CR25","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TEM.2019.2926471","volume":"67","author":"M Kuperberg","year":"2020","unstructured":"Kuperberg, M.: Blockchain-based identity management: a survey from the enterprise and ecosystem perspective. IEEE Trans. Eng. Manag. 67(4), 1008\u20131027 (2020)","journal-title":"IEEE Trans. Eng. Manag."},{"key":"2_CR26","unstructured":"Lane, D., Vontas, C., R\u00fcckstie\u00df, T., Poggi, D.: jsonpath-object-transform (2017). https:\/\/github.com\/dvdln\/jsonpath-object-transform. Accessed 22 Jan 2021"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Yu, T.: Towards quantitative analysis of proofs of authorization: applications, framework, and techniques. In: Proceedings for the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp. 139\u2013153. IEEE (2010)","DOI":"10.1109\/CSF.2010.17"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"11","author":"N Li","year":"2003","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11(1), 35\u201386 (2003)","journal-title":"J. Comput. Secur."},{"key":"2_CR29","unstructured":"MIT Media Lab Learning Initiative and Hyland Credentials: Blockcerts - An Open Infrastructure for Academic Credentials on the Blockchain (2016). https:\/\/www.blockcerts.org. Accessed 22 Jan 2021"},{"key":"2_CR30","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-33716-2_16","volume-title":"Trust Management XIII","author":"S M\u00f6dersheim","year":"2019","unstructured":"M\u00f6dersheim, S., Schlichtkrull, A., Wagner, G., More, S., Alber, L.: TPL: a trust policy language. In: Meng, W., Cofta, P., Jensen, C.D., Grandison, T. (eds.) IFIPTM 2019. IAICT, vol. 563, pp. 209\u2013223. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33716-2_16"},{"key":"2_CR31","unstructured":"M\u00f6dersheim, S.A., Ni, B.: GTPL: A graphical trust policy language. In: Open Identity Summit 2019, OID 2019, pp. 107\u2013118. Gesellschaft f\u00fcr Informatik (2019)"},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80\u201386 (2018)","journal-title":"Comput. Sci. Rev."},{"key":"2_CR33","unstructured":"Office for Students: OfS Register (Spreadsheet) (2021). https:\/\/apis.officeforstudents.org.uk\/OfsRegisterDownload\/api\/Register\/. Accessed 22 Jan 2021"},{"key":"2_CR34","unstructured":"Protocol Labs: IPFS Documentation (2021). https:\/\/docs.ipfs.io. Accessed 22 Jan 2021"},{"key":"2_CR35","unstructured":"Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M.: Decentralized Identifiers (DIDs) v1.0. W3C working draft, W3C (2021). https:\/\/www.w3.org\/TR\/2021\/WD-did-core-20210128\/"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Rodler, M., Li, W., Karame, G.O., Davi, L.: Sereum: protecting existing smart contracts against re-entrancy attacks. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium, NDSS 2019. Internet Society (2019)","DOI":"10.14722\/ndss.2019.23413"},{"key":"2_CR37","unstructured":"Rodler, M., Li, W., Karame, G.O., Davi, L.: EVMPatch: timely and automated patching of ethereum smart contracts. In: 30th USENIX Security Symposium. USENIX Security 2021. USENIX Association (2021)"},{"key":"2_CR38","unstructured":"Sporny, M., Longley, D., Chadwick, D.: Verifiable Credentials Data Model 1.0. W3C recommendation, W3C (2019). https:\/\/www.w3.org\/TR\/2019\/REC-vc-data-model-20191119\/"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Torres, C.F., Baden, M., Norvill, R., Pontiveros, B.B.F., Jonker, H., Mauw, S.: \u00c6GIS: shielding vulnerable smart contracts against attacks. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020, pp. 584\u2013597. ACM (2020)","DOI":"10.1145\/3320269.3384756"},{"key":"2_CR40","unstructured":"UK Department of Education: Higher Education Degree Datacheck (2020). https:\/\/hedd.ac.uk\/about. Accessed 16 Oct 2020"},{"key":"2_CR41","unstructured":"W3C Verifiable Credentials for Education Task Force: vc-ed (2020). https:\/\/w3c-ccg.github.io\/vc-ed. Accessed 22 Jan 2021"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Weinhardt, S., Omolola, O.: Usability of policy authoring tools: a layered approach. In: Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, pp. 301\u2013308. SciTePress (2019)","DOI":"10.5220\/0007355003010308"},{"key":"2_CR43","unstructured":"Weinhardt, S., St. Pierre, D.: Lessons learned \u2013 conducting a user experience evaluation of a trust policy authoring tool. In: Open Identity Summit 2019, OID 2019, pp. 185\u2013190. Gesellschaft f\u00fcr Informatik (2019)"},{"key":"2_CR44","unstructured":"Wright, A., Andrews, H., Hutton, B.: JSON Schema Specification (2020). https:\/\/json-schema.org\/specification.html. Accessed 22 Jan 2021"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Yakubov, A., Shbair, W., State, R.: BlockPGP: a blockchain-based framework for PGP key servers. In: Proceedings of the 6th International Symposium on Computing and Networking Workshops, pp. 316\u2013322. IEEE (2018)","DOI":"10.1109\/CANDARW.2018.00065"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Zwattendorfer, B., Zefferer, T., Stranacher, K.: An overview of cloud identity management-models. In: Proceedings of the 10th International Conference on Web Information Systems and Technologies, WEBIST 2014, vol. 2, pp. 82\u201392. SciTePress (2014)","DOI":"10.5220\/0004946400820092"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78120-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T22:02:49Z","timestamp":1750111369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78120-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030781194","9783030781200"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78120-0_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}