{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:35:06Z","timestamp":1773174906561,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319144382","type":"print"},{"value":"9783319144399","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14439-9_2","type":"book-chapter","created":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T13:59:49Z","timestamp":1419083989000},"page":"11-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["An Architecture for Privacy-ABCs"],"prefix":"10.1007","author":[{"given":"Patrik","family":"Bichsel","sequence":"first","affiliation":[]},{"given":"Jan","family":"Camenisch","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Dubovitskaya","sequence":"additional","affiliation":[]},{"given":"Robert R.","family":"Enderlein","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Krenn","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Anja","family":"Lehmann","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Neven","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Paquin","sequence":"additional","affiliation":[]},{"given":"Franz-Stefan","family":"Preiss","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sabouri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,21]]},"reference":[{"key":"2_CR1","unstructured":"ABC4Trust EU Project. https:\/\/www.abc4trust.eu."},{"key":"2_CR2","unstructured":"Abstract syntax notation one (ASN.1), 2008. International Telecommunication Union - ITU-T recommendation X.680."},{"key":"2_CR3","unstructured":"Bartel, Mark and Boyer, John and Fox, Barb and LaMacchia, Brian and Simon, Ed. XML-Signature Syntax and Processing. http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/, February 2002."},{"key":"2_CR4","unstructured":"Thomas Baign\u00e8res, Patrik Bichsel, Robert R Enderlein, Hans Knudsen, Kasper Damg\u00e5rd, Jonas Jensen, Gregory Neven, Janus Nielsen, Pascal Paillier, and Michael Stausholm. Final Reference Implementation. Deliverable D4.2, The ABC4Trust EU Project, 2014. Available at https:\/\/abc4trust.eu\/download\/D4.2%20Final%20Reference%20Implementation.pdf, Last accessed on 2014-11-08."},{"key":"2_CR5","unstructured":"Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project, 2014. Available at https:\/\/abc4trust.eu\/download\/Deliverable_D2.2.pdf, Last accessed on 2014-11-08."},{"key":"2_CR6","unstructured":"Stefan Brands. The ID Corner blog. The problem(s) with OpenID. http:\/\/www.untrusted.ca\/cache\/openid.html."},{"key":"2_CR7","unstructured":"J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. OpenPGP Message Format. http:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"David Chaum. Blind signatures for untraceable payments. In Advances in cryptology, pages 199\u2013203. Springer, 1983.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"2_CR9","unstructured":"Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L\u00e6ss\u00f8 e Mikkelsen, Gregory Neven, and Michael \u00f8stergaard Pedersen. Scientific Comparison of ABC Protocols: Part I Formal Treatment of Privacy-Enhancing Credential Systems. Deliverable D3.1, The ABC4Trust EU Project, 2014. Available at https:\/\/abc4trust.eu\/download\/Deliverable\\%20D3.1\\%20Part\\%201.pdf, Last accessed on 2014-11-08."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Douglas Crockford. The application\/json media type for JavaScript Object Notation (JSON). Technical Report RFC 4627, Internet Engineering Taskforce (IETF), 2006.","DOI":"10.17487\/rfc4627"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical report, IETF, May 2008.","DOI":"10.17487\/rfc5280"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Nelly Delessy, Eduardo B Fernandez, and Maria M Larrondo-Petrie. A pattern language for identity management. In Computing in the Global Information Technology, 2007. ICCGI 2007. International Multi-Conference on, pages 31\u201331. IEEE, 2007.","DOI":"10.1109\/ICCGI.2007.5"},{"key":"2_CR13","unstructured":"Arkajit Dey and Stephen Weis. PseudoID: Enhancing Privacy in Federated Login. In Hot Topics in Privacy Enhancing Technologies, pages 95\u2013107, 2010."},{"key":"2_CR14","unstructured":"Facebook Login. https:\/\/developers.facebook.com\/products\/login\/."},{"key":"2_CR15","unstructured":"Fido Alliance. http:\/\/fidoalliance.org."},{"key":"2_CR16","unstructured":"Russell Hardin. Trust and trustworthiness, volume 4. Russell Sage Foundation, 2004."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Dick Hardt. OAuth 2.0 Authorization Protocol. http:\/\/tools.ietf.org\/html\/rfc6749, October 2012.","DOI":"10.17487\/rfc6749"},{"key":"2_CR18","unstructured":"Dick Hardt, Johnny Bufu, and Josh Hoyt. OpenID Attribute Exchange 1.0. http:\/\/openid.net\/specs\/openid-attributeexchange-1_0.html, December 2007."},{"key":"2_CR19","unstructured":"D. Hardt, A. Tom, B. Eaton, and Y. Goland. OAuthWeb Resource Authorization Profiles. http:\/\/tools.ietf.org\/html\/drafthardt-oauth-01, January 2010. draft version 19 at time of writing."},{"key":"2_CR20","unstructured":"M. Jones, J. Bradley, and H. Tschofenig. Proof-Of-Possession Semantics for JSON Web Tokens (JWTs). http:\/\/tools.ietf.org\/html\/draft-jones-oauth-proof-of-possession-00."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Audun J\u00f8sang and St\u00e9phane Lo Presti. Analysing the relationship between risk and trust. In Trust Management, pages 135\u2013145. Springer, 2004.","DOI":"10.1007\/978-3-540-24747-0_11"},{"key":"2_CR22","unstructured":"Json web token (jwt). http:\/\/datatracker.ietf.org\/doc\/draft-ietf-oauth-json-web-token. draft version 19 at time of writing."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Tadayoshi Kohno, Andre Broido, and Kimberly C Claffy. Remote physical device fingerprinting. Dependable and Secure Computing, IEEE Transactions on, 2(2):93\u2013108, 2005.","DOI":"10.1109\/TDSC.2005.26"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Uwe Kylau, Ivonne Thomas, Michael Menzel, and Christoph Meinel. Trust requirements in identity federation topologies. In Advanced Information Networking and Applications, 2009. AINA\u201909. International Conference on, pages 137\u2013145. IEEE, 2009.","DOI":"10.1109\/AINA.2009.80"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Jesus Luna, Neeraj Suri, and Ioannis Krontiris. Privacy-by-design based on quantitative threat modeling. In Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on, pages 1\u20138. IEEE, 2012.","DOI":"10.1109\/CRISIS.2012.6378941"},{"key":"2_CR26","unstructured":"D. Harrison Mcknight and Norman L. Chervany. The Meanings of Trust. Technical report, University of Minnesota, 1996."},{"key":"2_CR27","unstructured":"C. Mortimore, B. Campbell, and Jones M. SAML 2.0 Bearer Assertion Profiles for OAuth 2.0. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-saml2-bearer-19, March 2014. draft version 19 at time of writing."},{"key":"2_CR28","unstructured":"Kieron O\u2019Hara. Trust: From Socrates to Spin. Icon Books Ltd, 2004."},{"key":"2_CR29","unstructured":"OpenID Connect. http:\/\/openid.net\/connect\/."},{"key":"2_CR30","unstructured":"OpenID Authentication 2.0. http:\/\/openid.net\/specs\/openid-authentication-2_0.html, December 2007."},{"key":"2_CR31","unstructured":"Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf, March 2005."},{"key":"2_CR32","unstructured":"U-Prove WS-Trust Profile V1.0. http:\/\/www.microsoft.com\/u-prove, March 2011."},{"key":"2_CR33","unstructured":"WS-Trust 1.4. http:\/\/docs.oasis-open.org\/ws-sx\/wstrust\/v1.4\/ws-trust.html, April 2012."},{"key":"2_CR34","unstructured":"Web Services Federation Language (WS-Federation) Version 1.2. http:\/\/docs.oasis-open.org\/wsfed\/federation\/v1.2\/os\/ws-federation-1.2-spec-os.html, May 2009."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Andrea Westerinen, John Schnizlein, John Strassner, Mark Scherling, Bob Quinn, Jay Perry, Shai Herzog, An-Ni Huynh, Mark Carlson, and Steve Waldbusser. Terminology for Policy-Based Management. Internet RFC 3198, November 2001.","DOI":"10.17487\/rfc3198"},{"key":"2_CR36","unstructured":"WS-SecurityPolicy 1.2. http:\/\/docs.oasis-open.org\/wssx\/ws-securitypolicy\/200702\/ws-securitypolicy-1.2-spec-cs.html, April 2007."},{"key":"2_CR37","unstructured":"WS-Trust 1.4. http:\/\/docs.oasis-open.org\/ws-sx\/wstrust\/v1.4\/os\/ws-trust-1.4-spec-os.html, February 2009."}],"container-title":["Attribute-based Credentials for Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14439-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T08:36:23Z","timestamp":1675845383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14439-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,21]]},"ISBN":["9783319144382","9783319144399"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14439-9_2","relation":{},"subject":[],"published":{"date-parts":[[2014,12,21]]},"assertion":[{"value":"21 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}