{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:57:58Z","timestamp":1773295078722,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662465615","type":"print"},{"value":"9783662465622","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46562-2_4","type":"book-chapter","created":{"date-parts":[[2015,2,23]],"date-time":"2015-02-23T14:55:38Z","timestamp":1424703338000},"page":"87-127","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ProProtect3: An Approach for Protecting User Profile Data from Disclosure, Tampering, and Improper Use in the Context of WebID"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Wild","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Wiedemann","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Heil","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Tschudnowsky","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gaedke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,24]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Li, F., He, W., et al.: Data-Confined HTML5 Applications. Technical Report, Electrical Engineering and Computer Sciences, UCB (2013)","DOI":"10.1007\/978-3-642-40203-6_41"},{"key":"4_CR2","unstructured":"Bai, G., Lei, J., Meng, G., et al.: AuthScan: Automatic extraction of web authentication protocols from implementations. In: Proceedings of 20th Annual Network & Distributed System Security Symposium (2013)"},{"key":"4_CR3","unstructured":"Bamberg, W., et al.: Persona - Protocol Overview (2013). https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Persona\/Protocol_Overview. Accessed 24 March 2014"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., et al.: NIST Special Publication 800\u201357: Recommendation for Key Management - Part 1: General (Revision 3). Technical Report, National Institute of Standards and Technology (2012)","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Anderson, J., Anderson, R., Stajano, F.: Eight friends are enough: Social graph approximation via public listings. In: Proceedings of the 2nd ACM EuroSys Workshop on Social Network Systems, pp. 13\u201318 (2009)","DOI":"10.1145\/1578002.1578005"},{"key":"4_CR6","unstructured":"Brickley, D., Miller, L.: FOAF Vocabulary Specification 0.99 (2014). http:\/\/xmlns.com\/foaf\/spec\/. Accessed 24 March 2014"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-540-39718-2_24","volume-title":"The Semantic Web - ISWC 2003","author":"JJ Carroll","year":"2003","unstructured":"Carroll, J.J.: Signing RDF graphs. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 369\u2013384. Springer, Heidelberg (2003)"},{"issue":"3 and 4","key":"4_CR8","first-page":"123","volume":"4","author":"O Chudnovskyy","year":"2012","unstructured":"Chudnovskyy, O., Wild, S., Gebhardt, H., Gaedke, M.: Data portability using Webcomposition\/Data grid service. Int. J. Adv. Internet Technol. 4(3 and 4), 123\u2013132 (2012)","journal-title":"Int. J. Adv. Internet Technol."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Cooper, D.: Internet X.509 Public key infrastructure certificate and certificate revocation list (CRL) profile (2008). http:\/\/tools.ietf.org\/html\/rfc5280. Accessed 10 August 2013","DOI":"10.17487\/rfc5280"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Secur. Priv. 6(2), 24\u201329 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2 (2008). http:\/\/tools.ietf.org\/html\/rfc5246. Accessed 10 August 2013","DOI":"10.17487\/rfc5246"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"El Maliki, T., Seigneur, J.M.: A survey of user-centric identity management technologies. In: International Conference on Emerging Security Information, Systems, and Technologies. SecureWare 2007, pp. 12\u201317. IEEE (2007)","DOI":"10.1109\/SECUREWARE.2007.4385303"},{"issue":"1","key":"4_CR13","first-page":"1","volume":"16","author":"C Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten risks of PKI: What you\u2019re not being told about public key infrastructure. Comput. Secur. 16(1), 1\u20137 (2000)","journal-title":"Comput. Secur."},{"key":"4_CR14","unstructured":"European Commission: ICT - Work Programme 2013. EC (2012)"},{"key":"4_CR15","unstructured":"Fitzpatrick, B., Recordon, D., Hardt, D., Hoyt, J.: OpenID Authentication 2.0 - Final (2007). http:\/\/openid.net\/specs\/openid-authentication-2_0.html. Accessed 10 August 2013"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM Press (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"4_CR17","unstructured":"Gellman, B., Poitras, L.: U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. The Washington Post, 6 June 2013"},{"key":"4_CR18","unstructured":"Hackett, M., Hawkey, K.: Security, privacy and usability requirements for federated identity. In: Workshop on Web 2.0 Security & Privacy (2012)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework (2012). http:\/\/tools.ietf.org\/html\/rfc6749. Accessed 24 March 2014","DOI":"10.17487\/rfc6749"},{"key":"4_CR20","unstructured":"Hardt, D., Bufu, J., Hoyt, J.: OpenID Attribute Exchange 1.0 - Final (2007). http:\/\/openid.net\/specs\/openid-attribute-exchange-1_0.html. Accessed 24 March 2014"},{"key":"4_CR21","unstructured":"Harris, S., Seaborne, A.: SPARQL 1.1 Query Language (2013). http:\/\/www.w3.org\/TR\/sparql11-query\/. Accessed 24 March 2014"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Heitmann, B., Kim, J.G., Passant, A., et al.: An architecture for privacy-enabled user profile portability on the Web of Data. In: Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems, HetRec 2010, pp. 16\u201323. ACM (2010)","DOI":"10.1145\/1869446.1869449"},{"key":"4_CR23","unstructured":"Hollenbach, J., et al.: Using RDF metadata to enable access control on the social semantic web. In: Proceedings of the Workshop on Collaborative Construction, Management and Linking of Structured Knowledge (2009)"},{"key":"4_CR24","unstructured":"J\u00f8sang, A., Zomai, M.A., Suriadi, S.: Usability and privacy in identity management architectures. In: Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, vol. 68, pp. 143\u2013152. Australian Computer Society (2007)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Josefsson, S.: The Base16, Base32, and Base64 Data Encodings (2006). http:\/\/tools.ietf.org\/html\/rfc4648. Accessed 24 March 2014","DOI":"10.17487\/rfc4648"},{"key":"4_CR26","first-page":"3","volume":"3","author":"A Kasten","year":"2013","unstructured":"Kasten, A., Scherp, A.: Iterative signing of RDF(S) graphs, named graphs, and OWL graphs: Formalization and application. Arbeitsberichte aus dem Fachbereich Informatik 3, 3\u201328 (2013)","journal-title":"Arbeitsberichte aus dem Fachbereich Informatik"},{"issue":"2","key":"4_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E Maler","year":"2008","unstructured":"Maler, E., Reed, D.: The venn of identity: Options and issues in federated identity management. IEEE Secur. Priv. 6(2), 16\u201323 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR28","unstructured":"Manola, F., Miller, E.: RDF Primer (2004). http:\/\/www.w3.org\/TR\/rdf-primer\/. Accessed 29 January 2014"},{"issue":"3","key":"4_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1567274.1567278","volume":"34","author":"J P\u00e9rez","year":"2009","unstructured":"P\u00e9rez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. ACM Trans. Database Syst. 34(3), 1\u201345 (2009)","journal-title":"ACM Trans. Database Syst."},{"issue":"2","key":"4_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., et al.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"4_CR31","unstructured":"Savitz, E., Medrano, R.: Welcome To The API Economy - Forbes (2012). http:\/\/www.forbes.com\/sites\/ciocentral\/2012\/08\/29\/welcome-to-the-api-economy\/. Accessed 24 March 2014"},{"key":"4_CR32","volume-title":"Computing the Digest of an RDF Graph","author":"C Sayers","year":"2004","unstructured":"Sayers, C., Karp, A.H.: Computing the Digest of an RDF Graph. Mobile and Media Systems Laboratory, HP Laboratories, Palo Alto (2004)"},{"key":"4_CR33","unstructured":"Seaborne, A.: SPARQL 1.1 Property Paths (2010). http:\/\/www.w3.org\/TR\/sparql11-property-paths\/. Accessed 24 March 2014"},{"key":"4_CR34","unstructured":"Sporny, M., Inkster, T., Story, H., et al.: WebID 1.0: Web Identification and Discovery (2011). http:\/\/www.w3.org\/2005\/Incubator\/webid\/spec\/. Accessed 10 Feb 2014"},{"key":"4_CR35","unstructured":"The Nielsen Company: Social Media Report 2012 (2012). http:\/\/blog.nielsen.com\/nielsenwire\/social\/2012\/. Accessed 9 March 2014"},{"key":"4_CR36","unstructured":"Tomaszuk, D., Gaedke, M., Gebhardt, H.: WebID+ACO: A distributed identification mechanism for social web. In: Proceedings of the Federated Social Web Europe (2011)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Toorani, M., Beheshti, A.: LPKI-a lightweight public key infrastructure for the mobile environments. In: 11th IEEE Singapore International Conference on Communication Systems, 2008, ICCS 2008, pp. 162\u2013166. IEEE (2008)","DOI":"10.1109\/ICCS.2008.4737164"},{"issue":"1","key":"4_CR38","doi-asserted-by":"crossref","first-page":"77","DOI":"10.3233\/SW-2012-0082","volume":"5","author":"S Tramp","year":"2012","unstructured":"Tramp, S., Frischmuth, P., Ermilov, T., Shekarpour, S., Auer, S.: An architecture of a distributed semantic social network. Semant. Web 5(1), 77\u201395 (2012)","journal-title":"Semant. Web"},{"key":"4_CR39","unstructured":"Tramp, S., Story, H., Sambra, A., et al.: Extending the WebID protocol with access delegation. In: Proceedings of the Third International Workshop on Consuming Linked Data (COLD2012) (2012)"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Tummarello, G., Morbidoni, C., Puliti, P., Piazza, F.: Signing individual fragments of an RDF graph. In: Special Interest Tracks and Posters of the 14th International Conference on WWW, pp. 1020\u20131021. ACM (2005)","DOI":"10.1145\/1062745.1062848"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Wild, S., Ast, M., Gaedke, M.: Towards a context-aware WebID certificate creation taking individual conditions and trust needs into account. In: Proceedings of the 15th International Conference on Information Integration and Web-based Applications & Services, pp. 532\u2013541. ACM (2013a)","DOI":"10.1145\/2539150.2539185"},{"key":"4_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1007\/978-3-642-39200-9_44","volume-title":"Web Engineering","author":"S Wild","year":"2013","unstructured":"Wild, S., Chudnovskyy, O., Heil, S., Gaedke, M.: Customized views on profiles in webid-based distributed social networks. In: Daniel, F., Dolog, P., Li, Q. (eds.) ICWE 2013. LNCS, vol. 7977, pp. 498\u2013501. Springer, Heidelberg (2013)"},{"key":"4_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-319-04244-2_24","volume-title":"Current Trends in Web Engineering","author":"S Wild","year":"2013","unstructured":"Wild, S., Chudnovskyy, O., Heil, S., Gaedke, M.: Protecting user profile data in WebID-based social networks through fine-grained filtering. In: Sheng, Q.Z., Kjeldskov, J. (eds.) ICWE Workshops 2013. LNCS, vol. 8295, pp. 269\u2013280. Springer, Heidelberg (2013)"},{"key":"4_CR44","unstructured":"Wild, S., Gaedke, M.: WebComposition\/EMS: A value-driven approach to evolution. In: Rossi, G., Iturrioz, J. (eds.) ICWE 2009 Doctoral Consortium, pp. 39\u201343. Onekin Research Group (2009)"},{"key":"4_CR45","unstructured":"Yeung, C.M.A., Liccardi, I., Lu, K., et al.: Decentralization: The future of online social networking. In: W3C Workshop on the Future of Social Networking Position Papers, vol. 2, pp. 2\u20137 (2009)"}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46562-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:52:50Z","timestamp":1676933570000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-46562-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662465615","9783662465622"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46562-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}