{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T18:10:08Z","timestamp":1746382208466,"version":"3.40.4"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319082448"},{"type":"electronic","value":"9783319082455"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08245-5_32","type":"book-chapter","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T16:29:28Z","timestamp":1410971368000},"page":"470-479","source":"Crossref","is-referenced-by-count":0,"title":["Tamper-Evident User Profiles for WebID-Based Social Networks"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Wild","sequence":"first","affiliation":[]},{"given":"Falko","family":"Braune","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Pretzsch","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Rien\u00e4cker","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gaedke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Bamberg, W., et al.: Persona - Protocol Overview (2013), https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Persona\/Protocol_Overview (accessed February 23, 2014)"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Caronni, G.: Walking the Web of Trust. In: Proeedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp. 153\u2013158. IEEE (2000)","DOI":"10.1109\/ENABL.2000.883720"},{"key":"32_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-39718-2_24","volume-title":"The Semantic Web - ISWC 2003","author":"J.J. Carroll","year":"2003","unstructured":"Carroll, J.J.: Signing RDF Graphs. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 369\u2013384. Springer, Heidelberg (2003)"},{"issue":"2","key":"32_CR4","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usability and security Challenges. IEEE Security & Privacy\u00a06(2), 24\u201329 (2008)","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"32_CR5","first-page":"73","volume":"35","author":"A.J. Feldman","year":"2012","unstructured":"Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Privacy and Integrity are Possible in the Untrusted Cloud. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering\u00a035(4), 73\u201382 (2012)","journal-title":"Bulletin of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"32_CR6","unstructured":"Feldman, A.J., Blankstein, A., Freedman, M.J., Felten, E.W.: Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security, vol.\u00a012, p. 31 (2012)"},{"key":"32_CR7","unstructured":"Fitzpatrick, B., Recordon, D., Hardt, D., Hoyt, J.: OpenID Authentication 2.0 - Final (2007), http:\/\/openid.net\/specs\/openid-authentication-2_0.html (accessed February 23, 2014)"},{"key":"32_CR8","unstructured":"Hackett, M., Hawkey, K.: Security, Privacy and Usability Requirements for Federated Identity. In: Workshop on Web 2.0 Security & Privacy (2012)"},{"key":"32_CR9","unstructured":"Sauermann, L., Cyganiak, R., V\u00f6lkel, M.: Cool URIs for the Semantic Web. Tech. rep., Saarl\u00e4ndische Universit\u00e4ts- und Landesbibliothek (2007)"},{"key":"32_CR10","unstructured":"Sayers, C., Eshghi, K.: The case for generating URIs by hashing RDF content (2002)"},{"key":"32_CR11","unstructured":"Sporny, M., Inkster, T., Story, H., Harbulot, B., Bachmann-Gm\u00fcr, R.: WebID 1.0: Web Identification and Discovery (2011), http:\/\/www.w3.org\/2005\/Incubator\/webid\/spec\/ (accessed February 23, 2014)"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Tummarello, G., Morbidoni, C., Puliti, P., Piazza, F.: Signing Individual Fragments of an RDF Graph. In: Special Interest Tracks and Posters of the 14th International Conference on WWW, pp. 1020\u20131021. ACM (2005)","DOI":"10.1145\/1062745.1062848"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/978-3-642-39200-9_44","volume-title":"Web Engineering","author":"S. Wild","year":"2013","unstructured":"Wild, S., Chudnovskyy, O., Heil, S., Gaedke, M.: Customized Views on Profiles in WebID-Based Distributed Social Networks. In: Daniel, F., Dolog, P., Li, Q. (eds.) ICWE 2013. LNCS, vol.\u00a07977, pp. 498\u2013501. Springer, Heidelberg (2013)"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-04244-2_24","volume-title":"Current Trends in Web Engineering","author":"S. Wild","year":"2013","unstructured":"Wild, S., Chudnovskyy, O., Heil, S., Gaedke, M.: Protecting User Profile Data in WebID-Based Social Networks Through Fine-Grained Filtering. In: Sheng, Q.Z., Kjeldskov, J. (eds.) ICWE Workshops 2013. LNCS, vol.\u00a08295, pp. 269\u2013280. Springer, Heidelberg (2013)"},{"key":"32_CR15","unstructured":"Yeung, C.M.A., Liccardi, I., Lu, K., Seneviratne, O., Berners-lee, T.: Decentralization: The Future of Online Social Networking. In: W3C Workshop on the Future of Social Networking Position Papers, vol.\u00a02, pp. 2\u20137 (2009)"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08245-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T17:55:12Z","timestamp":1746381312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08245-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319082448","9783319082455"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08245-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}