{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:04Z","timestamp":1725702184740},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_9","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"85-96","source":"Crossref","is-referenced-by-count":1,"title":["Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking"],"prefix":"10.1007","author":[{"given":"Amine","family":"Abidi","sequence":"first","affiliation":[]},{"given":"Ghazi Ben","family":"Ayed","sequence":"additional","affiliation":[]},{"given":"Farouk","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Blefari-Melazzi, N., et al. (eds.): Trustworthy Internet (2011)","key":"9_CR1"},{"unstructured":"Joshi, R.: Data-Centric Architecture: A Model for the Era of Big Data (2011)","key":"9_CR2"},{"unstructured":"Palfrey, J., Gasser, U.: Born Digital: Understanding the first generation of digital natives. Basic Books (2008)","key":"9_CR3"},{"unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)","key":"9_CR4"},{"key":"9_CR5","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1007\/978-3-642-22603-8_59","volume-title":"Digital Enterprise and Information Systems","author":"G. Ben Ayed","year":"2011","unstructured":"Ben Ayed, G., Sifi, S., Becha Kaanich, M.: Towards Building Weak Links between Persistent Digital Identity Documents: MetaEngine and Distance to Make Identity Less Visible. In: Ariwa, E., El-Qawasmeh, E. (eds.) DEIS 2011. CCIS, vol.\u00a0194, pp. 676\u2013690. Springer, Heidelberg (2011)"},{"unstructured":"U. Nations. The Universal Declaration of Human Rights (1948)","key":"9_CR6"},{"unstructured":"The Office of the United Nations High Commissioner for Human Rights. International Covenant on Civil and Political Rights (1966)","key":"9_CR7"},{"unstructured":"European Union. The Charter of Fundamental Rights of the European Union (2000)","key":"9_CR8"},{"unstructured":"Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (2007)","key":"9_CR9"},{"unstructured":"Organization for Economic Co-operation and Development (OECD). Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)","key":"9_CR10"},{"unstructured":"Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008)","key":"9_CR11"},{"unstructured":"Ben Ayed, G., Ghernaouti-H\u00e9lie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE (2011)","key":"9_CR12"},{"unstructured":"Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009)","key":"9_CR13"},{"unstructured":"Norfolk, D.: The Data-Centric World, ed: Bloor (2011)","key":"9_CR14"},{"doi-asserted-by":"crossref","unstructured":"Meyer, D., et al.: Report from the IAB Workshop on Routing and Addressing (RFC 4984) (2007)","key":"9_CR15","DOI":"10.17487\/rfc4984"},{"doi-asserted-by":"crossref","unstructured":"Clark, D., et al.: Addressing Reality: An architectural response to real world demands on the evolving internet. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, Germany (2003)","key":"9_CR16","DOI":"10.1145\/944759.944761"},{"doi-asserted-by":"crossref","unstructured":"Handley, M., Greenhalgh, A.: Steps Towards a Dos-Resistant Internet Architecture. In: ACM SIGCOMM Conference - Workshop on Future Directions in Network Architecture, FDNA 2003, USA (2004)","key":"9_CR17","DOI":"10.1145\/1016707.1016717"},{"unstructured":"Jacobson, V.: If a Clean Slate is the Solution What Was the Problem. In: Stanford Clean Slate Seminar (2006)","key":"9_CR18"},{"doi-asserted-by":"crossref","unstructured":"Koponen, T., et al.: A Data-Oriented (and beyond) Network Architecture. In: 2007 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan (2007)","key":"9_CR19","DOI":"10.1145\/1282380.1282402"},{"doi-asserted-by":"crossref","unstructured":"Jokela, P., et al.: LIPSIN: Line Speeds Publish\/Subscribe Inter-Networking. In: ACM SIGCOMM Conference on Data Communication, USA (2009)","key":"9_CR20","DOI":"10.1145\/1592568.1592592"},{"unstructured":"Ahlgren, B., et al.: 4WARD EU FP7 Project (Deliverable D-6.2 v2.0) (2010)","key":"9_CR21"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., et al.: CHORD: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. In: 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, USA (2001)","key":"9_CR22","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"crossref","unstructured":"Jacobson, V., et al.: Networking Named Content. In: The 5th International Conference on Emerging Networking Experiments and Technologies, ACM CoNEXT 2009, pp. 1\u201312 (2009)","key":"9_CR23","DOI":"10.1145\/1658939.1658941"},{"doi-asserted-by":"crossref","unstructured":"Elabidi, A., et al.: Towards Hiding Federated Digital Identity: Stop-Dissemination Mechanism in Content-Centric Networking. In: The 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, Australia (2011)","key":"9_CR24","DOI":"10.1145\/2070425.2070468"},{"doi-asserted-by":"crossref","unstructured":"Arianfar, S., et al.: On Preserving Privacy in Content-Oriented Networks. In: ACM SIGCOMM Workshop on Information-Centric Networking, ICN 2011, Toronto, Ontario, Canada (2011)","key":"9_CR25","DOI":"10.1145\/2018584.2018589"},{"unstructured":"PARC (Xeros). CCNx Project (relase 0.3.0) (2010)","key":"9_CR26"},{"doi-asserted-by":"crossref","unstructured":"Shadbolt, N., Berners-Lee, T.: Web Science Emerges Scientific Amercican Magazine, 76\u201381 (2008)","key":"9_CR27","DOI":"10.1038\/scientificamerican1008-76"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:46:00Z","timestamp":1620132360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}