{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:57:36Z","timestamp":1765486656813,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030861612"},{"type":"electronic","value":"9783030861629"}],"license":[{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T00:00:00Z","timestamp":1630627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-86162-9_11","type":"book-chapter","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T04:02:30Z","timestamp":1630555350000},"page":"106-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Informational Self-determination: Data Portability Requests Based on GDPR by Providing Public Platforms for Authorised Minimal Invasive Privacy Protection"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Schmelz","sequence":"first","affiliation":[]},{"given":"Karl","family":"Pinter","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Niemeier","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Grechenig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,3]]},"reference":[{"key":"11_CR1","unstructured":"Council of European Union: Regulation (EU) 2016\/679 of the European Parliament (General Data Protection Regulation). Official Journal of the European Union (2016). http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Crossler, R.E.: Privacy in the digital age: a review of information privacy research in information systems. Manage. Inf. Syst. Q. 1017\u20131041 (2011)","DOI":"10.2307\/41409971"},{"key":"11_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38795-6","volume-title":"Digital Government","year":"2017","unstructured":"Falk, S., R\u00f6mmele, A., Silverman, M. (eds.): Digital Government. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-38795-6"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Fang, B.: Cyberspace Sovereignty: Reflections on Building a Community of Common Future in Cyberspace. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-13-0320-3","DOI":"10.1007\/978-981-13-0320-3"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Ishmaev, G.: Sovereignty, privacy, and ethics in blockchain-based identity management systems. Ethics Inf. Technol. (2020). https:\/\/doi.org\/10.1007\/s10676-020-09563-x","DOI":"10.1007\/s10676-020-09563-x"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Jan\u00dfen, C.: Towards a system for data transparency to support data subjects. In: Abramowicz, W., Corchuelo, R. (eds.) Business Information Systems Workshops. BIS 2019. LNBIP, vol. 373. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36691-9_51","DOI":"10.1007\/978-3-030-36691-9_51"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Khacef, K., Pujolle, G.: Secure peer-to-peer communication based on blockchain. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds.) Web, Artificial Intelligence and Network Applications. WAINA 2019. Advances in Intelligent Systems and Computing, vol. 927, pp. 662\u2013672. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15035-8_64","DOI":"10.1007\/978-3-030-15035-8_64"},{"key":"11_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-026-8","volume-title":"Privacy-Invading Technologies and Privacy by Design","author":"D Klitou","year":"2014","unstructured":"Klitou, D.: Privacy-Invading Technologies and Privacy by Design. T.M.C. Asser Press, The Hague (2014)"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Ko\u015bcielny, C., Kurkowski, M., Srebrny, M.: PGP systems and TrueCrypt. In: Modern Cryptography Primer, pp. 147\u2013173. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41386-5_6","DOI":"10.1007\/978-3-642-41386-5_6"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Kushwaha, N., Roguski, P., Watson, B.W.: Up in the air: ensuring government data sovereignty in the cloud. In: 2020 12th International Conference on Cyber Conflict (CyCon), pp. 43\u201361 (2020)","DOI":"10.23919\/CyCon49761.2020.9131718"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Morgner, F., Bastian, P., Fischlin, M.: Securing transactions with the eIDAS protocols. In: Foresti, S., Lopez, J. (eds.) Information Security Theory and Practice. WISTP 2016. LNCS, vol. 9895, pp. 3\u201318. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45931-8_1","DOI":"10.1007\/978-3-319-45931-8_1"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Peck, M.E.: Blockchain world - Do you need a blockchain? This chart will tell you if the technology can solve your problem. IEEE Spectrum 38\u201360 (2017)","DOI":"10.1109\/MSPEC.2017.8048838"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Pinter, K., Schmelz, D., Grechenig, T.: Koordination der Informationspichten laut DSGVO mithilfe der Blockchain. In: IRIS 2020 Internationales Rechtsinformatik Symposion (2020)","DOI":"10.38023\/6fbc1d90-1b69-4f46-8c73-11e128f0bad1"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Pinter, K., Schmelz, D., Lamber, R., Strobl, S., Grechenig, T.: Towards a multi-party, blockchain-based identity verification solution to implement clear name laws for online media platforms. In: Business Process Management: Blockchain and Central and Eastern Europe Forum, pp. 151\u2013165. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30429-4_11","DOI":"10.1007\/978-3-030-30429-4_11"},{"key":"11_CR15","first-page":"738","volume":"2","author":"K Rantos","year":"2018","unstructured":"Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., Papanikolaou, A.: Blockchain-based consents management for personal data processing in the IoT ecosystem. ICETE 2, 738\u2013743 (2018)","journal-title":"ICETE"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Sar\u0131tekin, R.A., Karabacak, E., Durgay, Z., Karaarslan, E.: Blockchain based secure communication application proposal: cryptouch. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/ISDFS.2018.8355380"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Schmelz, D., Fischer, G., Niemeier, P., Zhu, L., Grechenig, T.: Towards using public blockchain in information-centric networks: challenges imposed by the European Union\u2019s general data protection regulation. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), pp. 223\u2013228 (2018)","DOI":"10.1109\/HOTICN.2018.8606000"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Schmelz, D., Pinter, K., Brottrager, J., Niemeier, P., Lamber, R., Grechenig, T.: Securing the rights of data subjects with blockchain technology. In: 2020 3rd International Conference on Information and Computer Technologies (ICICT), pp. 284\u2013288 (2020)","DOI":"10.1109\/ICICT50521.2020.00050"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Singi, K., Choudhury, S.G., Kaulgud, V., Bose, R.J.C., Podder, S., Burden, A.P.: Data sovereignty governance framework. In: Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops, pp. 303\u2013306. Association for Computing Machinery (2020)","DOI":"10.1145\/3387940.3392212"},{"key":"11_CR20","doi-asserted-by":"publisher","unstructured":"Sullivan, C., Burger, E.: Blockchain, digital identity, e-government. In: Treiblmaier, H., Beck, R. (eds.) Business Transformation Through Blockchain, pp. 233\u2013258. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-99058-3_9","DOI":"10.1007\/978-3-319-99058-3_9"},{"key":"11_CR21","unstructured":"Todd, P.: OpenTimestamps: scalable, trustless, distributed timestamping with bitcoin (2016). https:\/\/petertodd.org\/2016\/opentimestamps-announcement"},{"key":"11_CR22","unstructured":"Wirth, C., Kolain, M.: Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In: Proceedings of 1st ERCIM Blockchain Workshop 2018 (2018)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Yakubov, A., Shbair, W., State, R.: BlockPGP: a blockchain-based framework for PGP key servers. In: 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW), pp. 316\u2013322 (2018)","DOI":"10.1109\/CANDARW.2018.00065"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Yin, S., Kaynak, O.: Big data for modern industry: challenges and trends. In: Proceedings of the IEEE, pp. 143\u2013146 (2015)","DOI":"10.1109\/JPROC.2015.2388958"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Yuming, L.: Data sovereignty theory. In: Sovereignty Blockchain 1.0, pp. 37\u201377. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0757-8_2","DOI":"10.1007\/978-981-16-0757-8_2"}],"container-title":["Lecture Notes in Networks and Systems","Blockchain and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86162-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T04:07:27Z","timestamp":1630555647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86162-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,3]]},"ISBN":["9783030861612","9783030861629"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86162-9_11","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,3]]},"assertion":[{"value":"3 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BLOCKCHAIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress on Blockchain and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blockchain2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.blockchain-congress.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}