{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:23:52Z","timestamp":1742984632263,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319912370"},{"type":"electronic","value":"9783319912387"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91238-7_44","type":"book-chapter","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T10:52:09Z","timestamp":1527763929000},"page":"567-586","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["HCI Patterns for Cryptographically Equipped Cloud Services"],"prefix":"10.1007","author":[{"given":"Thomas","family":"L\u00e4nger","sequence":"first","affiliation":[]},{"given":"Ala","family":"Alaqra","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Framner","sequence":"additional","affiliation":[]},{"given":"John S\u00f6ren","family":"Pettersson","sequence":"additional","affiliation":[]},{"given":"Katrin","family":"Riemer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,1]]},"reference":[{"key":"44_CR1","unstructured":"European Commission: Regulation (EU) 2016\/679 of The European Parliament and of the Council, of 27 April 2016, on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016). Accessed 20 July 2017"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1\u201314. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27585-2_1"},{"key":"44_CR3","unstructured":"Lor\u00fcnser, T., Krenn, S., Striecks, C., L\u00e4nger, T.: Agile cryptographic solutions for the cloud. e & i Elektrotechnik und Informationstechnik, September 2017. ISSN: 0932-383X (printed version) ISSN: 1613-7620 (electronic version)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Lor\u00fcnser, T., Slamanig, D., L\u00e4nger, T., P\u00f6hls, H.C.: PRISMACLOUD tools: a cryptographic toolbox for increasing security in cloud services. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2016). IEEE (2016)","DOI":"10.1109\/ARES.2016.62"},{"key":"44_CR5","unstructured":"PRISMACLOUD: Improved Guidelines and architectures for Secure Service Composition. Public deliverable D7.6 of the PRISMACLOUD H2020 project (2017). https:\/\/prismacloud.eu"},{"key":"44_CR6","volume-title":"A Pattern Language: Towns, Buildings, Construction","author":"C Alexander","year":"1977","unstructured":"Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, New York (1977)"},{"key":"44_CR7","volume-title":"Design Patterns Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns Elements of Reusable Object-Oriented Software. Addison-Wesley, New York (1994). ISBN 0-201-63361-2"},{"key":"44_CR8","volume-title":"Security Patterns - Integrating Security and Systems Engineering","author":"M Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. Wiley, West Sussex (2006)"},{"key":"44_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-44760-5_8","volume-title":"Privacy Technologies and Policy","author":"T L\u00e4nger","year":"2016","unstructured":"L\u00e4nger, T., P\u00f6hls, H.C., Ghernaouti, S.: Selected cloud security patterns to improve end user security and privacy in public clouds. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 115\u2013132. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_8"},{"key":"44_CR10","unstructured":"Fischer-H\u00fcbner, S., et al. (ed.): HCI Pattern Collection\u2013Version 2. PrimeLife Deliverable D4.1.3 (2010). http:\/\/primelife.ercim.eu\/images\/stories\/deliverables\/d4.1.3-hci_pattern_collection_v2-public.pdf"},{"key":"44_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-30840-1_1","volume-title":"Information Security and Cryptology - ICISC 2015","author":"D Derler","year":"2016","unstructured":"Derler, D., P\u00f6hls, H.C., Samelin, K., Slamanig, D.: A general framework for redactable signatures and new constructions. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 3\u201319. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30840-1_1"},{"key":"44_CR12","unstructured":"Alaqra, A., Fischer-H\u00fcbner, S., Pettersson, J.S., W\u00e4stlund, E.: Stakeholders\u2019 perspectives on malleable signatures in a cloud-based eHealth scenario. In: HAISA, pp. 220\u2013230 (2016)"},{"key":"44_CR13","unstructured":"PRISMACLOUD public deliverable D3.3 HCI Research Report. The report, containing the HCI patterns developed in the PRISMACLOUD project will be available by project end, 31 July 2018. https:\/\/prismacloud.eu"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Loruenser, T., Happe, A., Slamanig, D.: ARCHISTAR: towards secure and robust cloud based data sharing. In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 371\u2013378. IEEE, November 2015","DOI":"10.1109\/CloudCom.2015.71"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Happe, A., Wohner, F., Lor\u00fcnser, T.: The archistar secret-sharing backup proxy. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 88. ACM, August 2017","DOI":"10.1145\/3098954.3104055"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Theories, Methods, and Human Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91238-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T01:30:30Z","timestamp":1657157430000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91238-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319912370","9783319912387"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91238-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"1 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hci2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}