{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:03:10Z","timestamp":1743055390463,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319144382"},{"type":"electronic","value":"9783319144399"}],"license":[{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14439-9_10","type":"book-chapter","created":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T13:59:49Z","timestamp":1419083989000},"page":"319-343","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-ABC Usage Scenarios"],"prefix":"10.1007","author":[{"given":"Joerg","family":"Abendroth","sequence":"first","affiliation":[]},{"given":"Marit","family":"Hansen","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sabouri","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Schlehahn","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Seidl","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Zwingelberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,21]]},"reference":[{"key":"10_CR1","unstructured":"Ronny Bjones. eParticipation Scenario Reference Guide. Technical Report Tech. Rep., Oct 2010, Microsoft, 2010."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Ronny Bjones, Ioannis Krontiris, Pascal Paillier, and Kai Rannenberg. Integrating anonymous credentials with eids for privacy-respecting online authentication. In Privacy Technologies and Policy, pages 111\u2013124. Springer, 2014.","DOI":"10.1007\/978-3-642-54069-1_7"},{"key":"10_CR3","unstructured":"CA. The adoption of cloud-based services: Increasing confidence through effective security. http:\/\/www.datacenterresearch.com\/whitepaper\/theadoption-of-cloud-based-services-increasingconfidence-4822.html, 2014. Last accessed on 2014-10-20."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Sherman SM Chow, Yi-Jun He, Lucas CK Hui, and Siu Ming Yiu. Spice\u2013simple privacy-preserving identity-management for cloud environment. In Applied Cryptography and Network Security, pages 526\u2013543. Springer, 2012.","DOI":"10.1007\/978-3-642-31284-7_31"},{"key":"10_CR5","unstructured":"Rolf Harms and Michael Yamartino. The economics of the cloud. Microsoft whitepaper, Microsoft Corporation, 2010. Last accessed on 12.01.13."},{"key":"10_CR6","unstructured":"Information Cards Foundation. Information cards.: Information cards foundation. http:\/\/informationcard.net\/."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Ingo Naumann and Giles Hogben. Privacy features of european eid card specifications. Network Security, 2008(8):9\u201313, 2008.","DOI":"10.1016\/S1353-4858(08)70097-7"},{"key":"10_CR8","unstructured":"Organization for the Advancement of Structured Information Standards(OASIS). extensible access control markup language (xacml) version 2.0, 2005."},{"key":"10_CR9","unstructured":"Andreas Pfitzmann and Marit Hansen. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf, 2010. Last accessed on 2014-11-08."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557\u2013570, 2002.","DOI":"10.1142\/S0218488502001648"},{"key":"10_CR11","unstructured":"Harald Zwingelberg and Jan Schallab\u00a8ock. The Proposal for a Regulation on Electronic Identification and Trust Services under a Privacy and ABC4Trust Perspective. Deliverable H2.4, The ABC4Trust EU Project, 2013. Available at http:\/\/abc4trust.eu\/download\/ABC4Trust-H2.4_Privacy_Perspective_on_the_eIDAS_regulation.pdf, Last accessed on 2014-11-08."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Harald Zwingelberg. Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card. In Privacy and Identity Management for Life, pages 151\u2013163. Springer, 2011.","DOI":"10.1007\/978-3-642-20769-3_13"}],"container-title":["Attribute-based Credentials for Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14439-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T04:26:45Z","timestamp":1674188805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14439-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,21]]},"ISBN":["9783319144382","9783319144399"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14439-9_10","relation":{},"subject":[],"published":{"date-parts":[[2014,12,21]]},"assertion":[{"value":"21 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}