{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T04:59:05Z","timestamp":1768798745457,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T00:00:00Z","timestamp":1651276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T00:00:00Z","timestamp":1651276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10207-022-00593-8","type":"journal-article","created":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T17:02:36Z","timestamp":1651510956000},"page":"983-1003","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Digital Asset Inheritance Model to Convey Online Persona Posthumously"],"prefix":"10.1007","volume":"21","author":[{"given":"Ram Govind","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ananya","family":"Shrivastava","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,30]]},"reference":[{"key":"593_CR1","unstructured":"Aadhaar. https:\/\/uidai.gov.in\/ (last accessed April 2021)"},{"key":"593_CR2","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) Advances in Cryptology\u2014ASIACRYPT 2003. In: 9th International Conference on the Theory and Application of Cryptology and Information Security, volume 2894 of Lecture Notes in Computer Science, pp. 452\u2013473. Springer, Berlin Heidelberg (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"593_CR3","unstructured":"Banta, N.M.: Inherit the cloud: the role of private contracts in distributing or deleting digital assets at death. Fordham Law Rev. 83, 799\u2013854 (2014)"},{"key":"593_CR4","doi-asserted-by":"crossref","unstructured":"Brubaker, J.R., Callison-Burch, V.: Legacy contact: designing and implementing post-mortem stewardship at Facebook. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 2908\u20132919. ACM (2016)","DOI":"10.1145\/2858036.2858254"},{"issue":"1","key":"593_CR5","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143\u2013202 (2000)","journal-title":"J. Cryptol."},{"key":"593_CR6","doi-asserted-by":"crossref","unstructured":"Conner, J.: Digital life after death: the issue of planning for a person\u2019s digital assets after death. Estate Plan. Commun. Property Law J. 3, 301\u2013324 (2010)","DOI":"10.2139\/ssrn.1811044"},{"key":"593_CR7","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I..: A design principle for hash functions. In: Brassard, G. (ed.), Advances in Cryptology\u2014CRYPTO \u201989, 9th Annual International Cryptology Conference, volume 435 of Lecture Notes in Computer Science, pp. 416\u2013427. Springer (1989)","DOI":"10.1007\/0-387-34805-0_39"},{"issue":"6","key":"593_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"593_CR9","unstructured":"DigiLocker Team.: DigiLocker. https:\/\/digilocker.gov.in\/ (last Accessed April 2021) (2015)"},{"key":"593_CR10","unstructured":"DigiPulse Team.: DigiPulse: digital inheritance service. https:\/\/cryptorating.eu\/whitepapers\/DigiPulse\/whitepaper.pdf (last Accessed April 2021) (2018)"},{"key":"593_CR11","unstructured":"GDPR-EU.: General data Protection Regulation-European Union. https:\/\/eugdpr.org\/ (last Accessed July 2020)"},{"key":"593_CR12","unstructured":"Gilden, A.: The social afterlife. Harvard J. Law Technol. (2019) (Forthcoming)"},{"key":"593_CR13","unstructured":"Goldreich, O.: Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press (2007)"},{"key":"593_CR14","doi-asserted-by":"crossref","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","DOI":"10.1137\/0217017"},{"key":"593_CR15","unstructured":"Harbinja, E.: Digital inheritance in the United Kingdom. J. Eur. Consum. Market Law (EuCML) (2017)"},{"key":"593_CR16","doi-asserted-by":"crossref","unstructured":"Harbinja, E.: Post-mortem privacy 2.0: theory, law, and technology. Int. Rev. Law Comput. Technol. 31(1), 26\u201342 (2017)","DOI":"10.1080\/13600869.2017.1275116"},{"key":"593_CR17","unstructured":"Hopkins, J.P.: Afterlife in the cloud: Managing a digital estate. Hastings Sci. Technol. Law J. 5, 209 (2013)"},{"key":"593_CR18","first-page":"539","volume":"58","author":"D Horton","year":"2017","unstructured":"Horton, D.: Tomorrow\u2019s inheritance: the frontiers of estate planning formalism. BCL Rev. 58, 539 (2017)","journal-title":"BCL Rev."},{"key":"593_CR19","unstructured":"Klasi\u010dek, D.: What happens to your Gmail and Facebook account after you die? In: Proceeding of Economics of Digital Transformation Conference, pp. 37\u201356 (2018)"},{"key":"593_CR20","unstructured":"Knapman, H.: What happens to your digital assets when you die? https:\/\/www.moneywise.co.uk\/work\/everyday-life\/what-happens-your-digital-assets-when-you-die (last Accessed April 2021) (2017)"},{"key":"593_CR21","first-page":"1641","volume":"26","author":"N Kutler","year":"2011","unstructured":"Kutler, N.: Protecting your online you: a new approach to handling your online persona after death. Berkeley Technol. Law J. 26, 1641 (2011)","journal-title":"Berkeley Technol. Law J."},{"issue":"2","key":"593_CR22","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1093\/ijlit\/eat012","volume":"22","author":"D McCallig","year":"2014","unstructured":"McCallig, D.: Facebook after death: an evolving policy in a social network. Int. J. Law Inf. Technol 22(2), 107\u2013140 (2014)","journal-title":"Int. J. Law Inf. Technol"},{"key":"593_CR23","first-page":"384","volume":"21","author":"L McCarthy","year":"2015","unstructured":"McCarthy, L.: Digital assets and intestacy. BUJ Sci. Technol. Law J. 21, 384 (2015)","journal-title":"BUJ Sci. Technol. Law J."},{"key":"593_CR24","doi-asserted-by":"publisher","first-page":"117","DOI":"10.12697\/JI.2018.27.12","volume":"27","author":"T Mikk","year":"2018","unstructured":"Mikk, T., Sein, K.: Digital inheritance: Heirs\u2019 right to claim access to online accounts under Estonian law. Juridica Int. 27, 117 (2018)","journal-title":"Juridica Int."},{"key":"593_CR25","unstructured":"Mirshekari, A., Ghasemi, R., Abedi, A.: Inheritance of digital accounts. Natl. J. Cyber Sec. Law 3(1) (2020)"},{"key":"593_CR26","unstructured":"MoneyLife\u00a0Digital Team.: Unclaimed assets with financial regulators. https:\/\/www.moneylife.in\/article\/a-whopping-rs36000-crore-of-peoples-unclaimed-money-lying-with-just-three-financial-regulators\/57587.html (last Accessed April 2021) (2019)"},{"issue":"4","key":"593_CR27","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11023-017-9445-2","volume":"27","author":"C \u00d6hman","year":"2017","unstructured":"\u00d6hman, C., Floridi, L.: The political economy of death in the age of information: a critical approach to the digital afterlife industry. Mind. Mach. 27(4), 639\u2013662 (2017)","journal-title":"Mind. Mach."},{"key":"593_CR28","unstructured":"O\u2019Neill, B.: Document your digital assets. https:\/\/njaes.rutgers.edu\/sshw\/message\/message.php?p=Finance &m=338 (last Accessed April 2021) (2016)"},{"key":"593_CR29","doi-asserted-by":"crossref","unstructured":"Park, Y.J., Sang, Y., Lee, H., Jones-Jang, S.M.: The ontology of digital asset after death: Policy complexities, suggestions and critique of digital platforms. In: Digital Policy, Regulation and Governance (2019)","DOI":"10.2139\/ssrn.3426017"},{"key":"593_CR30","unstructured":"PassOn Team. PassOn.: Inventing digital inheritance. https:\/\/passon.com\/content\/home\/modules\/1-intro-1af8iji\/passon-white-paper.pdf (last Accessed April 2021) (2019)"},{"key":"593_CR31","unstructured":"PBC Library: The Pairing-Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc\/, (last Accessed Dec 2021)"},{"key":"593_CR32","unstructured":"PyCryptodome. https:\/\/pycryptodome.readthedocs.io (last Accessed Dec 2021)"},{"key":"593_CR33","unstructured":"Resta, G.: Personal data and digital assets after death: a comparative law perspective on the BGH Facebook ruling. J. Eur. Consum. Market Law 7(5) (2018)"},{"key":"593_CR34","unstructured":"Ronderos, J.: Is access enough: addressing inheritability of digital assets using the three-tier system under the revised uniform fiduciary access to digital assets act. Trans. Tennessee J. Bus. Law 18, 1031 (2016)"},{"key":"593_CR35","unstructured":"SafeHaven Team.: Safe haven: the solution to digital inheritance. https:\/\/safehaven.io\/files\/SafeHaven_WhitePaper.pdf (last Accessed April 2021) (2019)"},{"key":"593_CR36","unstructured":"Scolyer-Gray, P., Shaghaghi, A., Ashenden, D.: Digging your own digital grave: how should you manage the data you leave behind? https:\/\/theconversation.com\/digging-your-own-digital-grave-how-should-you-manage-the-data-you-leave-behind-143755 (last Accessed April 2021) (2020)"},{"key":"593_CR37","unstructured":"TrustVerse Team.: TrustVerse: AI-wealth management & digital estate planning protocol backed by blockchain. https:\/\/icosbull.com\/eng\/ico\/trustverse\/whitepaper (last Accessed April 2021) (2018)"},{"key":"593_CR38","unstructured":"Walker, M.D.: The new uniform digital assets law: estate planning and administration in the information age. Real Property Trust Estate Law J. 52(1):51\u201378 (2017)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00593-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00593-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00593-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:07:43Z","timestamp":1744200463000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00593-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,30]]},"references-count":38,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["593"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00593-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,30]]},"assertion":[{"value":"30 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}