{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:47:18Z","timestamp":1742968038970,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031758713"},{"type":"electronic","value":"9783031758720"}],"license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75872-0_20","type":"book-chapter","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T05:02:23Z","timestamp":1729918943000},"page":"377-395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Role-Artifact-Function Framework for\u00a0Understanding Digital Identity Models"],"prefix":"10.1007","author":[{"given":"Frederico","family":"Schardong","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"20_CR1","unstructured":"Adams, C., Lloyd, S.: Understanding public-key infrastructure: concepts, standards, and deployment considerations. Sams Publishing (1999)"},{"key":"20_CR2","unstructured":"Allen, C.: The path to self-sovereign identity. Available online: http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html (accessed on 04 June 2023) (2016)"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Barnes, R., Hoffman-Andrews, J., McCarney, D., Kasten, J.: Automatic Certificate Management Environment (ACME). RFC 8555 (Mar 2019). https:\/\/doi.org\/10.17487\/RFC8555","DOI":"10.17487\/RFC8555"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., Cooper, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (May 2008). https:\/\/doi.org\/10.17487\/RFC5280","DOI":"10.17487\/RFC5280"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-45708-9_5","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"J Camenisch","year":"2002","unstructured":"Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 61\u201376. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_5"},{"key":"20_CR6","unstructured":"Cameron, K.: The laws of identity. Available online: https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf. Accessed 04 June 2023 (2005)"},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"\u010cu\u010dko, \u0160., Be\u0107irovi\u0107, \u0160., Kami\u0161ali\u0107, A., Mrdovi\u0107, S., Turkanovi\u0107, M.: Towards the classification of self-sovereign identity properties. IEEE Access 10, 88306\u201388329 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3199414","DOI":"10.1109\/ACCESS.2022.3199414"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7, 103059\u2013103079 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2931173","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Ferdous, M.S., Norman, G., Poet, R.: Mathematical modelling of identity, identity management and other related topics. In: Proceedings of the 7th International Conference on Security of Information and Networks, pp. 9\u201316. SIN \u201914, Association for Computing Machinery (2014). https:\/\/doi.org\/10.1145\/2659651.2659729","DOI":"10.1145\/2659651.2659729"},{"key":"20_CR10","doi-asserted-by":"publisher","unstructured":"Ferdous, M.S., Poet, R.: Formalising identity management protocols. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 137\u2013146. IEEE (2016). https:\/\/doi.org\/10.1109\/PST.2016.7906948","DOI":"10.1109\/PST.2016.7906948"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Hallam-Baker, P., et al.: An Extension to HTTP : Digest Access Authentication. RFC 2069 (Jan 1997). https:\/\/doi.org\/10.17487\/RFC2069","DOI":"10.17487\/RFC2069"},{"key":"20_CR12","unstructured":"Hardman, D.: DIDComm Messaging. Available online: https:\/\/identity.foundation\/didcomm-messaging\/spec\/. Accessed 04 June 2023 (2020)"},{"key":"20_CR13","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework (Nov 2012). https:\/\/doi.org\/10.17487\/RFC6749","DOI":"10.17487\/RFC6749"},{"key":"20_CR14","unstructured":"Hughes, J., Maler, E.: Security assertion markup language (saml) v2.0 technical overview. Available online: https:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.html. Accessed 30 Aug 2024 (2005)"},{"key":"20_CR15","unstructured":"ITU-T: Recommendation x.509. Available online: https:\/\/www.itu.int\/rec\/T-REC-X.509-201910-I\/en. Accessed 04 June 2023 (2000)"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Kause, T., Peylo, M.: Internet X.509 Public Key Infrastructure \u2013 HTTP Transfer for the Certificate Management Protocol (CMP). RFC 6712 (Sep 2012). https:\/\/doi.org\/10.17487\/RFC6712","DOI":"10.17487\/RFC6712"},{"key":"20_CR17","unstructured":"Kern, H.: Model interoperability between meta-modeling environments by using M3-level-based bridges. Ph.D. thesis, Universit\u00e4t Leipzig (2016)"},{"issue":"4","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TEM.2019.2926471","volume":"67","author":"M Kuperberg","year":"2019","unstructured":"Kuperberg, M.: Blockchain-based identity management: a survey from the enterprise and ecosystem perspective. IEEE Trans. Eng. Manage. 67(4), 1\u201320 (2019). https:\/\/doi.org\/10.1109\/TEM.2019.2926471","journal-title":"IEEE Trans. Eng. Manage."},{"key":"20_CR19","unstructured":"Lee, J., Choi, J., Oh, H., Kim, J.: Privacy-preserving identity management system. Cryptology ePrint Archive 2021\/1459 (2021)"},{"issue":"2019\/1241","key":"20_CR20","first-page":"1","volume":"1","author":"J Lee","year":"2019","unstructured":"Lee, J., Hwang, J., Choi, J., Oh, H., Kim, J.: SIMS: self-sovereign identity management system with preserving privacy in blockchain. IACR Cryptol. ePrint Archive 1(2019\/1241), 1\u201313 (2019)","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"20_CR21","doi-asserted-by":"publisher","unstructured":"M\u00fchle, A., Gr\u00fcner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80\u201386 (11 2018). https:\/\/doi.org\/10.1016\/j.cosrev.2018.10.002","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Myers, M., Schaad, J.: Certificate Management over CMS (CMC). RFC 5272 (Jun 2008). https:\/\/doi.org\/10.17487\/RFC5272","DOI":"10.17487\/RFC5272"},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Polk, T., Lee, J., Park, S., Park, J., Lee, H., Lee, H.: Internet X.509 Public Key Infrastructure Subject Identification Method (SIM). RFC 4683 (Oct 2006). https:\/\/doi.org\/10.17487\/RFC4683","DOI":"10.17487\/RFC4683"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Recordon, D., Reed, D.: Openid 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management., pp. 11\u201316. ACM, Alexandria, USA (2006). https:\/\/doi.org\/10.1145\/1179529.1179532","DOI":"10.1145\/1179529.1179532"},{"key":"20_CR25","unstructured":"Reed, D., Sporny, M., Longley, D., Christopher, A., Grant, R., Sabadello, M.: Decentralized Identifiers (DIDs). Available online: https:\/\/www.w3.org\/TR\/did-core\/. Accessed 04 June 2023 (2019)"},{"key":"20_CR26","doi-asserted-by":"publisher","unstructured":"Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, D.C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960 (Jun 2013). https:\/\/doi.org\/10.17487\/RFC6960","DOI":"10.17487\/RFC6960"},{"key":"20_CR27","unstructured":"Scarfone, K., Souppaya, M.: Guide to enterprise password management. Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-118\/archive\/2009-04-21. Accessed on 04 June 2023 (2009)"},{"key":"20_CR28","doi-asserted-by":"publisher","unstructured":"Schanzenbach., M., Kilian., T., Sch\u00fctte., J., Banse., C.: Zklaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques. In: Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - SECRYPT,. pp. 325\u2013332. INSTICC, SciTePress, Prague, Czech Republic (2019). https:\/\/doi.org\/10.5220\/0007772903250332","DOI":"10.5220\/0007772903250332"},{"issue":"15","key":"20_CR29","doi-asserted-by":"publisher","first-page":"5641","DOI":"10.3390\/s22155641","volume":"22","author":"F Schardong","year":"2022","unstructured":"Schardong, F., Cust\u00f3dio, R.: Self-sovereign identity: a systematic review, mapping and taxonomy. Sensors 22(15), 5641 (2022). https:\/\/doi.org\/10.3390\/s22155641","journal-title":"Sensors"},{"key":"20_CR30","unstructured":"Sipser, M.: Introduction to the Theory of Computation. Cengage Learning (2013)"},{"key":"20_CR31","unstructured":"Sporny, M., Longley, D., Chadwick, D.: Verifiable Credentials Data Model 1.0. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/. Accessed 04 June 2023 (2017)"},{"key":"20_CR32","unstructured":"Terbu, O., Lodderstedt, T., Yasuda, K., Looker, T.: Openid for verifiable presentations. Available online: https:\/\/openid.net\/specs\/openid-4-verifiable-presentations-1_0.html Accessed 30 August 2024 (2024)"},{"key":"20_CR33","unstructured":"West, R., Bluhm, D., Hailstone, M., Curran, S., Curren, S., Aristy, G.: Aries rfc 0023: Did exchange protocol 1.0. Available online: https:\/\/github.com\/hyperledger\/aries-rfcs\/blob\/master\/features\/0023-did-exchange. Accessed on 30 August 2024 (2019)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75872-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T05:05:42Z","timestamp":1729919142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75872-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"ISBN":["9783031758713","9783031758720"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75872-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"21 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pittsburg, PA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"43","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/resources.sei.cmu.edu\/news-events\/events\/er2024\/cfp.cfm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}