{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:10:29Z","timestamp":1776294629005,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032168078","type":"print"},{"value":"9783032168085","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16808-5_28","type":"book-chapter","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:20:01Z","timestamp":1776291601000},"page":"343-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy and Security Focused System for Customer Data Management in E-commerce"],"prefix":"10.1007","author":[{"given":"Linas","family":"Ablonskis","sequence":"first","affiliation":[]},{"given":"Rimantas","family":"Butleris","sequence":"additional","affiliation":[]},{"given":"Audrius","family":"Lopata","sequence":"additional","affiliation":[]},{"given":"Giedrius","family":"Sirevi\u010dius","sequence":"additional","affiliation":[]},{"given":"Simonas","family":"Stepanovas","sequence":"additional","affiliation":[]},{"given":"Mindaugas","family":"Vasiljevas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"141","DOI":"10.4324\/9781003075011-12","volume-title":"The Ethics of Information Technologies","author":"H Nissenbaum","year":"2020","unstructured":"Nissenbaum, H.: Protecting privacy in an information age: the problem of privacy in public. In: The Ethics of Information Technologies, pp. 141\u2013178. Routledge (2020)"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","volume":"77","author":"N Gerber","year":"2018","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226\u2013261 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1038\/s41591-018-0272-7","volume":"25","author":"WN Price","year":"2019","unstructured":"Price, W.N., Cohen, I.G.: Privacy in the age of medical big data. Nat. Med. 25(1), 37\u201343 (2019)","journal-title":"Nat. Med."},{"issue":"CSCW","key":"28_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274469","volume":"2","author":"S Zheng","year":"2018","unstructured":"Zheng, S., Apthorpe, N., Chetty, M., Feamster, N.: User perceptions of smart home IoT privacy. Proc. ACM Hum. Comput. Interact. 2(CSCW), 1\u201320 (2018)","journal-title":"Proc. ACM Hum. Comput. Interact."},{"key":"28_CR5","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A02016R0679-20160504. Last accessed 24 Mar 2025"},{"key":"28_CR6","unstructured":"Regulation (EU) 2022\/868 of the European Parliament and of the Council of 30 May 2022 on European data governance and amending Regulation (EU) 2018\/1724 (Data Governance Act). https:\/\/eur-lex.europa.eu\/eli\/reg\/2022\/868\/oj\/eng. Last accessed 24 Mar 2025"},{"key":"28_CR7","unstructured":"Sirevicius, G., Stepanovas, S.: Mediation of Information Perception, International Patent Application No. PCT\/EP2024\/078458, World Intellectual Property Organization (WIPO) (2025)"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.2478\/popets-2019-0048","volume":"2019","author":"A Lehmann","year":"2019","unstructured":"Lehmann, A.: Scrambledb: oblivious (chameleon) pseudonymization-as-a-service. Proc. Priv. Enhancing Technol. 2019, 289\u2013309 (2019)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/EuroSP.2017.36","volume-title":"2017 IEEE European Symposium on Security and Privacy (EuroS&P)","author":"J Camenisch","year":"2017","unstructured":"Camenisch, J., Lehmann, A.: A: privacy-preserving user-auditable pseudonym systems. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 269\u2013284. IEEE (2017)"},{"key":"28_CR10","first-page":"704","volume-title":"SECRYPT","author":"AV Kayem","year":"2021","unstructured":"Kayem, A.V., Podlesny, N.J., Meinel, C., Lehmann, A.: On chameleon pseudonymisation and attribute compartmentation-as-a-Service. In: SECRYPT, pp. 704\u2013714 (2021)"},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1109\/EuroSP53844.2022.00045","volume-title":"2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)","author":"S Casacuberta","year":"2022","unstructured":"Casacuberta, S., Hesse, J., Lehmann, A.: SoK: oblivious pseudorandom functions. In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), pp. 625\u2013646. IEEE (2022)"},{"key":"28_CR12","first-page":"1","volume-title":"International Conference on Availability, Reliability and Security","author":"D Pohn","year":"2020","unstructured":"Pohn, D., Hommel, W.: An overview of limitations and approaches in identity management. In: International Conference on Availability, Reliability and Security, pp. 1\u201310 (2020)"},{"key":"28_CR13","unstructured":"Tobin, A., Reed, D.: The inevitable rise of self-sovereign identity, The Sovrin Found. (2016). https:\/\/sovrin.org\/wp-content\/uploads\/2017\/06\/The-Inevitable-Riseof-Self-Sovereign-Identity.pdf. Last accessed 24 Mar 2025"},{"key":"28_CR14","first-page":"81","volume-title":"Open Identity Summit 2017","author":"H Ro\u00dfnagel","year":"2017","unstructured":"Ro\u00dfnagel, H.: A mechanism for discovery and verification of trust scheme memberships: the LIGHTest reference architecture. In: Open Identity Summit 2017, pp. 81\u201392. Gesellschaft f\u00fcr Informatik, Bonn (2017)"},{"key":"28_CR15","unstructured":"Gerber, U.: Authentication and authorization for constrained environments. PhD thesis, Master\u2019s thesis, University of Zurich (2018)"},{"issue":"08","key":"28_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MC.2015.213","volume":"48","author":"ZK Zhang","year":"2015","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wu, Z.Y., Shieh, S.W.: Identifying and authenticating IoT objects in a natural context. Computer. 48(08), 81\u201383 (2015)","journal-title":"Computer"},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/2994620.2994637","volume-title":"Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society","author":"M Isaakidis","year":"2016","unstructured":"Isaakidis, M., Halpin, H., Danezis, G.: UnlimitID: Privacy-preserving federated identity management using algebraic MACs. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 139\u2013142 (2016)"},{"key":"28_CR18","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"M Kroschewski","year":"2025","unstructured":"Kroschewski, M., Lehmann, A., \u00d6zbay, C.: OPPID: single sign-on with oblivious pairwise pseudonyms. In: Proceedings on Privacy Enhancing Technologies (2025)"},{"key":"28_CR19","first-page":"81","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"E Dauterman","year":"2023","unstructured":"Dauterman, E., Lin, D., Corrigan-Gibbs, H., Mazi\u00e8res, D.: Accountable authentication with privacy protection: the Larch system for universal login. In: 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), pp. 81\u201398 (2023)"},{"key":"28_CR20","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1145\/3320269.3384724","volume-title":"Proceedings of the 15th ACM Asia conference on computer and communications security","author":"S Hammann","year":"2020","unstructured":"Hammann, S., Sasse, R., Basin, D.: Privacy-preserving openid connect. In: Proceedings of the 15th ACM Asia conference on computer and communications security, pp. 277\u2013289 (2020)"},{"key":"28_CR21","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10207-014-0230-4","volume":"13","author":"D Nu\u00f1ez","year":"2014","unstructured":"Nu\u00f1ez, D., Agudo, I.: BlindIdM: a privacy-preserving approach for identity management as a service. Int. J. Inf. Secur. 13, 199\u2013215 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"28_CR22","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1109\/Cybermatics_2018.2018.00230","volume-title":"2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"Q Stokkink","year":"2018","unstructured":"Stokkink, Q., Pouwelse, J.: Deployment of a blockchain-based self-sovereign identity. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1336\u20131342. IEEE (2018)"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/COMPSAC.2018.10299","volume-title":"2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)","author":"M Takemiya","year":"2018","unstructured":"Takemiya, M., Vanieiev, B.: Sora identity: secure, digital identity on the blockchain. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 582\u2013587. IEEE (2018)"},{"key":"28_CR24","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-030-26972-2_17","volume-title":"Selfie Biometrics: Advances and Challenges","author":"A Othman","year":"2019","unstructured":"Othman, A., Callahan, J.: The Horcrux protocol: a distributed mobile biometric self-sovereign identity protocol. In: Selfie Biometrics: Advances and Challenges, pp. 355\u2013377 (2019)"},{"key":"28_CR25","first-page":"1","volume-title":"2018 IEEE International Conference on Communications (ICC)","author":"PJ Lu","year":"2018","unstructured":"Lu, P.J., Yeh, L.Y., Huang, J.L.: An privacy-preserving cross-organizational authentication\/authorization\/accounting system using blockchain technology. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Pappachan, P., Yus, R., Mehrotra, S., Freytag, J.C.: Sieve: a middleware approach to scalable access control for database management systems. arXiv preprint arXiv:2004.07498. (2020)","DOI":"10.14778\/3407790.3407835"},{"key":"28_CR27","first-page":"99","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"KD Albab","year":"2023","unstructured":"Albab, K.D., et al: K9db: privacy-compliant storage for web applications by construction. In: 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), pp. 99\u2013116 (2023)"},{"issue":"4","key":"28_CR28","first-page":"101","volume":"5","author":"I Makhdoom","year":"2024","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Piccardi, M., Franklin, D.: PrivySeC: a secure and privacy-compliant distributed framework for personal data sharing in IoT ecosystems. Blockchain: In: Res. Appl. 5(4), 101\u2013220 (2024)","journal-title":"Blockchain: In: Res. Appl."},{"key":"28_CR29","volume-title":"CIDR","author":"A Deshpande","year":"2021","unstructured":"Deshpande, A.: Sypse: privacy-first data management through pseudonymization and partitioning. In: CIDR (2021)"},{"key":"28_CR30","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1145\/3600006.3613146","volume-title":"Proceedings of the 29th Symposium on Operating Systems Principles","author":"L Tsai","year":"2023","unstructured":"Tsai, L., Gross, H., Kohler, E., Kaashoek, F., Schwarzkopf, M.: Edna: disguising and revealing user data in web applications. In: Proceedings of the 29th Symposium on Operating Systems Principles, pp. 434\u2013450 (2023)"},{"key":"28_CR31","unstructured":"Tsai, L.: Flexible privacy via disguising and revealing. PhD thesis, Brown University (2024)"},{"issue":"4","key":"28_CR32","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.csi.2013.12.004","volume":"36","author":"M Beiter","year":"2014","unstructured":"Beiter, M., Mont, M.C., Chen, L., Pearson, S.: End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces. 36(4), 689\u2013703 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"28_CR33","first-page":"1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: International Colloquium on Automata, Languages, and Programming, pp. 1\u201312 (2006)"},{"key":"28_CR34","unstructured":"HTTP Over TLS. https:\/\/datatracker.ietf.org\/doc\/html\/rfc2818. Last accessed 24 Mar 2025"},{"key":"28_CR35","unstructured":"Cryptographic Message Syntax (CMS). https:\/\/datatracker.ietf.org\/doc\/html\/rfc5652. Last accessed 24 Mar 2025"},{"key":"28_CR36","first-page":"1049","volume-title":"VLDB","author":"RO Nambiar","year":"2006","unstructured":"Nambiar, R.O., Poess, M.: The making of TPC-DS. In: VLDB, vol. 6, pp. 1049\u20131058 (2006)"},{"key":"28_CR37","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-319-16486-1_61","volume-title":"New Contributions in Information Systems and Technologies","author":"M Barata","year":"2015","unstructured":"Barata, M., Bernardino, J., Furtado, P.: An overview of decision support benchmarks: TPC-DS, TPC-H and SSB. In: New Contributions in Information Systems and Technologies, vol. 1, pp. 619\u2013628 (2015)"},{"key":"28_CR38","first-page":"1","volume-title":"2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","author":"B Buhrow","year":"2015","unstructured":"Buhrow, B., Fritz, K., Gilbert, B., Daniel, E.: E: a highly parallel AES-GCM core for authenticated encryption of 400 Gb\/s network protocols. In: 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1\u20137. IEEE (2015)"},{"key":"28_CR39","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/InfoSEEE.2014.6948065","volume-title":"2014 International Conference on Information Science, Electronics and Electrical Engineering","author":"CL Corniaux","year":"2014","unstructured":"Corniaux, C.L., Ghodosi, H.: An entropy-based demonstration of the security of Shamir\u2019s Secret Sharing scheme. In: 2014 International Conference on Information Science, Electronics and Electrical Engineering, vol. 1, pp. 46\u201348. IEEE (2014)"},{"key":"28_CR40","unstructured":"Transaction Processing Performance Council (TPC), TPC BENCHMARK \u2122 DS Standard Specification Version 3.2.0. https:\/\/www.tpc.org\/TPC_Documents_Current_Versions\/pdf\/TPC-DS_v3.2.0.pdf. Last accessed 24 Mar 2025"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16808-5_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:20:05Z","timestamp":1776291605000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16808-5_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032168078","9783032168085"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16808-5_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}