{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T21:20:55Z","timestamp":1725398455604},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553801","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T10:35:25Z","timestamp":1215081325000},"page":"2-7","source":"Crossref","is-referenced-by-count":2,"title":["Controlled sharing of identity attributes for better privacy"],"prefix":"10.1109","author":[{"given":"Rodrigo","family":"Lopes","sequence":"first","affiliation":[]},{"family":"Dongwan Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Senate bill 1386","year":"2002","key":"ref10"},{"journal-title":"Notice of security breach state laws","year":"2007","author":"union","key":"ref11"},{"key":"ref12","article-title":"User centric identity management","author":"josang","year":"2005","journal-title":"Asia Pacific Information Technology Security Conference AusCERT2005"},{"key":"ref13","article-title":"Community support and identity management","author":"koch","year":"2001","journal-title":"Seventh European Conference on Computer-Supported Cooperative Work - ECSCW 2001"},{"key":"ref14","article-title":"Global identity management to boost personalization","author":"koch","year":"2002","journal-title":"Ninth Research Symposium on Emerging Electronic Markets"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"ref16","first-page":"8","author":"clau","year":"2002","journal-title":"The IPTS Report Special Issue Identity and Privacy"},{"key":"ref17","article-title":"Ensuring information assurance in federated identity management","author":"shin","year":"2004","journal-title":"23rd IEEE International Performance Computing and Communications Conference (IPCCC)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102492"},{"journal-title":"Online Profiling - A Report to Congress part 2","year":"2002","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","author":"brands","year":"2000","journal-title":"Rethinking Public Key Infrastructures and Digital Certificates Building in Privacy"},{"journal-title":"The Personal Information Protection and Electronic Documents Act","year":"0","key":"ref6"},{"journal-title":"EU directive on privacy","year":"1995","key":"ref5"},{"journal-title":"Can-spam act","year":"0","key":"ref8"},{"journal-title":"The Children's Online Privacy Protection Act","year":"0","key":"ref7"},{"journal-title":"The Laws of identity","year":"2005","author":"cameron","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179531"},{"journal-title":"U s federal laws","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932160"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref22"},{"journal-title":"Efficient authenticated dictionaries with skip lists and commutative hashing","year":"2000","author":"goodrich","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102489"},{"journal-title":"The Art of Computer Programming Volume 2 Seminumerical Algorithms","year":"1997","author":"knuth","key":"ref23"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553801.pdf?arnumber=4553801","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T09:16:45Z","timestamp":1557652605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553801\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553801","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}