{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:49:31Z","timestamp":1743101371739,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031579776"},{"type":"electronic","value":"9783031579783"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57978-3_12","type":"book-chapter","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T04:01:50Z","timestamp":1713758510000},"page":"175-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and\u00a0Privacy-Preserving Authentication for\u00a0Data Subject Rights Enforcement"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4622-3819","authenticated-orcid":false,"given":"Malte","family":"Hansen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0138-366X","authenticated-orcid":false,"given":"Andre","family":"B\u00fcttner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.3390\/su12030770","volume":"12","author":"\u00c1 Alonso","year":"2020","unstructured":"Alonso, \u00c1., et al.: Enhancing university services by extending the eIDAS European specification with academic attributes. Sustainability 12(3), 770 (2020)","journal-title":"Sustainability"},{"issue":"4","key":"12_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCOMSTD.2019.9031542","volume":"3","author":"O Avellaneda","year":"2019","unstructured":"Avellaneda, O., et al.: Decentralized identity: where did it come from and where is it going? IEEE Commun. Stand. Maga. 3(4), 10\u201313 (2019)","journal-title":"IEEE Commun. Stand. Maga."},{"issue":"6","key":"12_CR3","doi-asserted-by":"publisher","first-page":"210","DOI":"10.3390\/info10060210","volume":"10","author":"D Berbecaru","year":"2019","unstructured":"Berbecaru, D., Lioy, A., Cameroni, C.: Electronic identification for universities: building cross-border services based on the eIDAS infrastructure. Information 10(6), 210 (2019)","journal-title":"Information"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Boniface, C., Fouad, I., Bielova, N., Lauradoux, C., Santos, C.: Security analysis of subject access request procedures: how to authenticate data subjects safely when they request for their data. In: Naldi, M., Italiano, G., Rannenberg, K., Medina, M., Bourka, A. (eds.) Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, 13\u201314 June 2019, Proceedings, vol. 7, pp. 182\u2013209. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-21752-5_12","DOI":"10.1007\/978-3-030-21752-5_12"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Cagnazzo, M., Holz, T., Pohlmann, N.: Gdpirated\u2013stealing personal information on-and offline. In: Sako, K., Schneider, S., Ryan, P. (eds.) ESORICS 2019, pp. 367\u2013386. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_18","DOI":"10.1007\/978-3-030-29962-0_18"},{"issue":"2","key":"12_CR6","first-page":"95","volume":"2022","author":"M Di Martino","year":"2022","unstructured":"Di Martino, M., Meers, I., Quax, P., Andries, K., Lamotte, W.: Revisiting identification issues in GDPR \u2018Right Of Access\u2019 policies: a technical and longitudinal analysis. Proc. Priv. Enhan. Technol. 2022(2), 95\u2013113 (2022)","journal-title":"Proc. Priv. Enhan. Technol."},{"key":"12_CR7","unstructured":"Di\u00a0Martino, M., Robyns, P., Weyts, W., Quax, P., Lamotte, W., Andries, K.: Personal information leakage by abusing the GDPR \u2018Right of Access\u2019. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (2019)"},{"key":"12_CR8","unstructured":"EDBP: Dutch SA fines DPG Media Magazines for unnecessarily requesting copies of identity documents | European Data Protection Board (2022). https:\/\/edpb.europa.eu\/news\/national-news\/2022\/dutch-sa-fines-dpg-media-magazines-unnecessarily-requesting-copies-identity_en"},{"key":"12_CR9","unstructured":"Engelbertz, N., Erinola, N., Herring, D., Somorovsky, J., Mladenov, V., Schwenk, J.: Security analysis of $$\\{$$eIDAS$$\\}$$\u2013The $$\\{$$Cross-Country$$\\}$$ authentication scheme in Europe. In: 12th USENIX Workshop on Offensive Technologies (WOOT 18) (2018)"},{"key":"12_CR10","unstructured":"ENISA: Engineering Personal Data Sharing. https:\/\/www.enisa.europa.eu\/publications\/engineering-personal-data-sharing"},{"key":"12_CR11","unstructured":"European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL amending Regulation (EU) No 910\/2014 as regards establishing a framework for a European Digital Identity. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=CELEX:52021PC0281, sEC(2021) 228 final - SWD(2021) 124 final - SWD(2021) 125 final"},{"key":"12_CR12","unstructured":"European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on European data governance (Data Governance Act), cOM\/2020\/767 final"},{"key":"12_CR13","unstructured":"European Commission: Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on harmonised rules on fair access to and use of data (Data Act), sEC(2022) 81 final - SWD(2022) 34 final - SWD(2022) 35 final"},{"key":"12_CR14","unstructured":"European Commission: Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC. http:\/\/data.europa.eu\/eli\/reg\/2014\/910\/oj"},{"key":"12_CR15","unstructured":"European Commission: European data strategy \u2013 Making the EU a role model for a society empowered by data (2022). https:\/\/ec.europa.eu\/info\/strategy\/priorities-2019-2024\/europe-fit-digital-age\/european-data-strategy_en"},{"key":"12_CR16","unstructured":"European Commission: EU Digital Identity Wallet Pilot implementation (2023). https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/eudi-wallet-implementation"},{"key":"12_CR17","unstructured":"European Commission: The Common Union Toolbox for a Coordinated Approach Towards a European Digital Identity Framework (2023). https:\/\/ec.europa.eu\/newsroom\/dae\/redirection\/document\/93678"},{"key":"12_CR18","unstructured":"European Parliament and Council: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679 &from=EN"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 44\u201355 (2006)","DOI":"10.1145\/1143120.1143127"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Gerakos, K., Maliappis, M., Costopoulou, C., Ntaliani, M.: Electronic authentication for university transactions using eIDAS. In: Katsikas, S., Zorkadis, V. (eds.) E-Democracy\u2013Privacy-Preserving, Secure, Intelligent E-Government Services: 7th International Conference, E-Democracy 2017, Athens, Greece, 14\u201315 December 2017, Proceedings, vol. 7. pp. 187\u2013195. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-71117-1_13","DOI":"10.1007\/978-3-319-71117-1_13"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Hansen, M., Gruschka, N., Jensen, M.: A universal data model for data sharing under the european data strategy (2023)","DOI":"10.1007\/978-3-031-61089-9_1"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Hansen, M., Gruschka, N., Jensen, M.: Introducing the concept of data subject rights as a service under the GDPR (2023)","DOI":"10.1007\/978-3-031-44939-0_2"},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Hansen, M., Jensen, M.: A generic data model for implementing right of access requests. In: Gryszczynska, A., Polanski, P., Gruschka, N., Rannenberg, K., Adamczyk, M. (eds.) APF 2022, vol. 13279, pp. 3\u201322. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-07315-1_1","DOI":"10.1007\/978-3-031-07315-1_1"},{"key":"12_CR24","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. RFC 6749 (2012). https:\/\/doi.org\/10.17487\/RFC6749. https:\/\/www.rfc-editor.org\/info\/rfc6749","DOI":"10.17487\/RFC6749"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Khayretdinova, A., Kubach, M., Sellung, R., Ro\u00dfnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Selbstbestimmung, Privatheit und Datenschutz: Gestaltungsoptionen f\u00fcr einen europ\u00e4ischen Weg, pp. 389\u2013406. Springer, Fachmedien Wiesbaden Wiesbaden (2022)","DOI":"10.1007\/978-3-658-33306-5_19"},{"key":"12_CR26","doi-asserted-by":"publisher","unstructured":"Lauradoux, C.: Can authoritative governments abuse the right to access? In: Gryszczynska, A., Polanski, P., Gruschka, N., Rannenberg, K., Adamczyk, M. (eds.) APF 2022, vol. 13279, pp. 23\u201333. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-07315-1_2","DOI":"10.1007\/978-3-031-07315-1_2"},{"key":"12_CR27","doi-asserted-by":"publisher","unstructured":"Lips, S., Bharosa, N., Draheim, D.: eIDAS implementation challenges: the case of Estonia and the Netherlands. In: Chugunov, A., Khodachek, I., Misnikov, Y., Trutnev, D. (eds.) EGOSE 2022, vol. 1349, pp. 75\u201389. Springer, Heidelberg (2020). https:\/\/doi.org\/10.1007\/978-3-030-67238-6_6","DOI":"10.1007\/978-3-030-67238-6_6"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","volume":"30","author":"A M\u00fchle","year":"2018","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80\u201386 (2018)","journal-title":"Comput. Sci. Rev."},{"key":"12_CR29","unstructured":"OASIS Open: SAML Version 2.0 Errata 05 (2012). http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/errata05\/os\/saml-v2.0-errata05-os.html"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1109\/TIFS.2019.2958763","volume":"15","author":"K Papadamou","year":"2019","unstructured":"Papadamou, K., et al.: Killing the password and preserving privacy with device-centric and attribute-based authentication. IEEE Trans. Inf. Forensics Secur. 15, 2183\u20132193 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR31","unstructured":"Pavur, J., Knerr, C.: GDPARRRRR: using privacy laws to steal identities. arXiv preprint arXiv:1912.00731 (2019)"},{"key":"12_CR32","unstructured":"Preukschat, A., Reed, D.: Self-sovereign identity. Manning Publications (2021)"},{"issue":"3","key":"12_CR33","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1093\/idpl\/ipac013","volume":"12","author":"N Purtova","year":"2022","unstructured":"Purtova, N.: From knowing by name to targeting: the meaning of identification under the GDPR. Int. Data Priv. Law 12(3), 163\u2013183 (2022)","journal-title":"Int. Data Priv. Law"},{"key":"12_CR34","doi-asserted-by":"publisher","unstructured":"Sabouri, A., Rannenberg, K.: ABC4Trust: protecting privacy in identity management by bringing privacy-ABCs into real-life. In: Camenisch, J., Fischer-Hubner, S., Hansen, M. (eds.) Privacy and Identity Management for the Future Internet in the Age of Globalisation: 9th IFIP WG 9.2, 9.5, 9.6\/11.7, 11.4, 11.6\/SIG 9.2. 2 International Summer School, Patras, Greece, 7\u201312 September 2014, Revised Selected Papers, vol. 9, pp. 3\u201316. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-319-18621-4_1","DOI":"10.1007\/978-3-319-18621-4_1"},{"key":"12_CR35","unstructured":"Sakimura, N., Bradley, J., Jones, M.: Final: OpenID Connect Core 1.0 incorporating errata set 1 (2014). https:\/\/openid.net\/specs\/openid-connect-core-1_0.html"},{"key":"12_CR36","doi-asserted-by":"publisher","unstructured":"Satybaldy, A.: Usability evaluation of SSI digital wallets. In: Bieker, F., Meyer, J., Pape, S., Schiering, I., Weich, A. (eds.) IFIP International Summer School on Privacy and Identity Management, pp. 101\u2013117. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-31971-6_9","DOI":"10.1007\/978-3-031-31971-6_9"},{"issue":"24","key":"12_CR37","doi-asserted-by":"publisher","first-page":"12679","DOI":"10.3390\/app122412679","volume":"12","author":"A Sharif","year":"2022","unstructured":"Sharif, A., Ranzi, M., Carbone, R., Sciarretta, G., Marino, F.A., Ranise, S.: The eIDAS regulation: a survey of technological trends for European electronic identity schemes. Appl. Sci. 12(24), 12679 (2022)","journal-title":"Appl. Sci."},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Tsakalakis, N., O\u2019hara, K., Stalla-Bourdillon, S.: Identity assurance in the UK: technical implementation and legal implications under the eIDAS Regulation. In: Proceedings of the 8th ACM Conference on Web Science, pp. 55\u201365 (2016)","DOI":"10.1145\/2908131.2908152"},{"key":"12_CR39","doi-asserted-by":"publisher","unstructured":"Urban, T., Tatang, D., Degeling, M., Holz, T., Pohlmann, N.: A study on subject data access in online advertising after the GDPR. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, 26\u201327 September 2019, Proceedings 14, pp. 61\u201379. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_5","DOI":"10.1007\/978-3-030-31500-9_5"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Sharing in a Digital World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57978-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T06:07:49Z","timestamp":1724738869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57978-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031579776","9783031579783"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57978-3_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-summerschool.github.io","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}