{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:07:35Z","timestamp":1737176855786,"version":"3.33.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10826004","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"6223-6229","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Identity and Access Management in Multiple Cloud Environments: Models, Issues, and Solutions"],"prefix":"10.1109","author":[{"given":"Alfredo","family":"Cuzzocrea","sequence":"first","affiliation":[{"name":"University of Calabria,iDEA Lab,Rende,Italy"}]},{"given":"Islam","family":"Belmerabet","sequence":"additional","affiliation":[{"name":"University of Calabria,iDEA Lab,Rende,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10925-w"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2011.43019"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s42162-021-00143-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5383\/JUSPN.14.02.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3435845"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512533"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216025"},{"key":"ref11","first-page":"61","article-title":"Gaining Back the Control Over Identity Attributes: Access Management Systems Based on Self-Sovereign Identity","author":"Keil","year":"2024","journal-title":"Open Identity Summit"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/c2015-0-00282-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3180367"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.10.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJGUC.2016.081010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.117"},{"volume-title":"Introduction to Computer Security","year":"2005","author":"Bishop","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10233-2_4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19050-6_1"},{"article-title":"SAML: The Secret to Centralized Identity Management","year":"2004","author":"Simon","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427513"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_8"},{"key":"ref23","article-title":"The Inevitable Rise of Self-Sovereign Identity","volume":"29","author":"Tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"volume-title":"The Privacy Act of 1974 A Reference Manual for Compliance","year":"1976","author":"Bushkin","key":"ref24"},{"volume-title":"Dataveillance and Privacy Xamax Consultancy.","author":"Clarke","key":"ref25"},{"volume-title":"Privacy: Federal Law and Selected Court Decisions.","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873812"},{"author":"Nakamoto","key":"ref28","article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System"},{"volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies?","year":"2014","author":"Antonopoulos","key":"ref29"},{"volume-title":"SOLID.","author":"Berners-Lee","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.103"},{"key":"ref32","first-page":"99","article-title":"Trust Requirements in Identity Management","volume-title":"3rd Australasian Information Security Workshop","author":"J\u00f8sang"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"volume":"29115","journal-title":"International Standard ISO\/IEC","year":"2013","key":"ref34"},{"volume-title":"STORK2.0, D3.2 status report, STORK2.0 Deliverable 3.2","key":"ref35"},{"volume-title":"SSEDIC Deliverable Report: Business and Regulatory 5.1, SSEDIC Deliverable 5.1.","year":"2012","key":"ref36"},{"key":"ref37","article-title":"Challenges and Opportunities in Identity Assurance","author":"Crosby","year":"2008","journal-title":"HM Treasury"},{"volume-title":"Code and Other Laws of Cyberspace","year":"2009","author":"Lessig","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0055-x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.03.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221852"},{"volume-title":"Single Sign On - Enterprise Access Made Secure and Easy","key":"ref42"},{"volume-title":"SPML1.1 Service Provisioning Mark-up Language.","key":"ref43"},{"volume-title":"SAML 1.0 Specification Set.","key":"ref44"},{"volume-title":"XACML Specification Set.","key":"ref45"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2007100101"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2009.029076"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671576"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671434"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2010.02.006"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103848"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10826004.pdf?arnumber=10826004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T07:48:59Z","timestamp":1737100139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10826004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10826004","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}