{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T12:10:02Z","timestamp":1750421402200,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031965210","type":"print"},{"value":"9783031965227","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-96522-7_11","type":"book-chapter","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T11:29:35Z","timestamp":1750418975000},"page":"143-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Challenges in Information Security Management System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1110-8004","authenticated-orcid":false,"given":"Mariya","family":"Evtimova-Gardair","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9420-9654","authenticated-orcid":false,"given":"Frederique","family":"Segond","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"P\u00f6hn, D., Hommel, W.: An overview of limitations and approaches in identity management. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2016)","DOI":"10.1145\/3407023.3407026"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Vrielynck, P.J., Van hamme, T., Ghostin, R., Lagaisse, B., Preuveneers, D., Joosen, W.: A self-sovereign identity approach to decentralized access control with transitive delegations. In: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, pp. 139\u2013147 (2024)","DOI":"10.1145\/3649158.3657045"},{"issue":"6","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3654439","volume":"33","author":"C Gavidia-Calderon","year":"2024","unstructured":"Gavidia-Calderon, C., Kordoni, A., Bennaceur, A., Levine, M., Nuseibeh, B.: The IDEA of us: an identity-aware architecture for autonomous systems. ACM Tran. Softw. Eng. Methodol. 33(6), 1\u201338 (2024). https:\/\/doi.org\/10.1145\/3654439","journal-title":"ACM Tran. Softw. Eng. Methodol."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: MIS: a multi-identifier management and resolution system in the metaverse. ACM Trans. Multimed. Comput. Commun. App. 20(7), 1\u201325 (2024)","DOI":"10.1145\/3597641"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Tan, K.L., Chi, C.-H., Lam, K.-Y.: Survey on digital sovereignty and identity: from digitization to digitalization. ACM Comput. Surv. 56(3), pp.1\u201336 (2023)","DOI":"10.1145\/3616400"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Aleksandrova, S.V., Vasiliev, V.A., Aleksandrov, M.N.: Problems of implementing information security management systems. In: 2020 International Conference Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS), pp. 78\u201381. IEEE (2020)","DOI":"10.1109\/ITQMIS51053.2020.9322896"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Kaneriya, J., Patel, H.: A comparative survey on blockchain based self sovereign identity system. In 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 1150\u20131155. IEEE (2020)","DOI":"10.1109\/ICISS49785.2020.9315899"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems. In: 2020 IEEE International Symposium on Systems Engineering (ISSE), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ISSE49799.2020.9272212"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"102301","DOI":"10.1016\/j.datak.2024.102301","volume":"151","author":"J Lohm\u00f6ller","year":"2024","unstructured":"Lohm\u00f6ller, J., et al.: The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems. Data Knowl. Eng. 151, 102301 (2024)","journal-title":"Data Knowl. Eng."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Naik, N., Jenkins, P.: Is self-sovereign identity really sovereign? In: 2022 IEEE International Symposium on Systems Engineering (ISSE), pp. 1\u20137. IEEE (2022)","DOI":"10.1109\/ISSE54508.2022.10005404"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Gr\u00fcner, A., M\u00fchle, A., Meinel, C.: An integration architecture to enable service providers for self-sovereign identity. In: 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/NCA.2019.8935015"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Dong, C., Jiang, F., Li, X., Yao, A., Li, G., Liu, X.: A blockchain-aided self-sovereign identity framework for edge-based UAV delivery system. In: 2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid), pp. 622\u2013624. IEEE (2021)","DOI":"10.1109\/CCGrid51090.2021.00074"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dixit, A., Smith-Creasey, M., Rajarajan, M.: A decentralized IIoT identity framework based on self-sovereign identity using blockchain. In: 2022 IEEE 47th Conference on Local Computer Networks (LCN), pp. 335\u2013338. IEEE (2022)","DOI":"10.1109\/LCN53696.2022.9843700"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-30694-5_1","volume-title":"Information Systems: 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, Virtual Event, December 21\u201322, 2022, Proceedings","author":"M Klare","year":"2023","unstructured":"Klare, M., Verlande, L., Greiner, M., Lechner, U.: How blockchain and artificial intelligence influence digital sovereignty. In: Papadaki, M., Rupino, P., da Cunha, M., Themistocleous, K.C. (eds.) Information Systems: 19th European, Mediterranean, and Middle Eastern Conference, EMCIS 2022, Virtual Event, December 21\u201322, 2022, Proceedings, pp. 3\u201316. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30694-5_1"},{"issue":"4","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10676-024-09810-5","volume":"26","author":"H Roberts","year":"2024","unstructured":"Roberts, H.: Digital sovereignty and artificial intelligence: a normative approach. Ethics Inf. Technol. 26(4), 1\u201310 (2024)","journal-title":"Ethics Inf. Technol."},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.52279\/jlss.05.02.142152","volume":"5","author":"H Usman","year":"2023","unstructured":"Usman, H., Nawaz, B., Naseer, S.: The future of state sovereignty in the age of artificial intelligence. J. Law Soc. Stud. 5, 142\u2013152 (2023)","journal-title":"J. Law Soc. Stud."}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence for Global Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-96522-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T11:29:40Z","timestamp":1750418980000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-96522-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031965210","9783031965227"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-96522-7_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AI4GS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on AI for Global Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ai4gs2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ai4gs-24.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}