{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:58:07Z","timestamp":1770832687076,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T00:00:00Z","timestamp":1604534400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,5]]},"DOI":"10.1109\/besc51023.2020.9348298","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:16:41Z","timestamp":1619061401000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["Your Identity is Yours: Take Back Control of Your Identity Using GDPR Compatible Self-Sovereign Identity"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[{"name":"School of Informatics and Digital Engineering, Aston University,United Kingdom"}]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University,United Kingdom"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00021"},{"key":"ref11","year":"2020","journal-title":"Guide to the General Data Protection Regulation (GDPR)"},{"key":"ref12","year":"2020","journal-title":"Eu blockchain observatory and forum An initiative of the european commission"},{"key":"ref13","year":"2020","journal-title":"uport identity system"},{"key":"ref14","author":"lundkvist","year":"2018","journal-title":"Uport a Platform for Self-Sovereign Identity"},{"key":"ref15","article-title":"uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain","author":"naik","year":"0","journal-title":"2020 IEEE International Symposium on Systems Engineering (ISSE)"},{"key":"ref16","author":"sena","year":"2018","journal-title":"Privacy preserving identity system for Ethereum dApps"},{"key":"ref17","author":"braendgaard","year":"2017","journal-title":"What is a uPort identity?"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"ref19","year":"2020","journal-title":"Innovation meets compliance data privacy regulation and distributed ledger technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.85"},{"key":"ref3","author":"windley","year":"2017","journal-title":"Fixing the five problems of internet identity"},{"key":"ref6","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2017.7998280"},{"key":"ref8","article-title":"Governing principles of self-sovereign identity applied to blockchain enabled privacy preserving identity management systems","author":"naik","year":"0","journal-title":"2020 IEEE International Symposium on Systems Engineering (ISSE)"},{"key":"ref7","author":"palomares","year":"2019","journal-title":"The next identity management evolution Self sovereign identity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2017.7956534"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.22"},{"key":"ref9","year":"2018","journal-title":"Sovrin A protocol and token for self-sovereign identity and decentralized trust"},{"key":"ref20","year":"2019","journal-title":"Sovrin Glossary V2"}],"event":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","location":"Bournemouth, United Kingdom","start":{"date-parts":[[2020,11,5]]},"end":{"date-parts":[[2020,11,7]]}},"container-title":["2020 7th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9348100\/9348278\/09348298.pdf?arnumber=9348298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:49:00Z","timestamp":1656452940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9348298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/besc51023.2020.9348298","relation":{},"subject":[],"published":{"date-parts":[[2020,11,5]]}}}