{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:11:15Z","timestamp":1777338675603,"version":"3.51.4"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,13]]},"DOI":"10.1109\/isse51541.2021.9582551","type":"proceedings-article","created":{"date-parts":[[2021,10,28]],"date-time":"2021-10-28T19:39:46Z","timestamp":1635449986000},"page":"1-7","source":"Crossref","is-referenced-by-count":47,"title":["Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2019","journal-title":"Sovrin Governance Framework V2"},{"key":"ref11","author":"windley","year":"2019","journal-title":"Fidelity Provenance and Trust"},{"key":"ref12","year":"2018","journal-title":"What is Self-Sovereign Identity?"},{"key":"ref13","year":"2021","journal-title":"Self-Sovereign Identity The ultimate beginners guide!"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.85"},{"key":"ref15","year":"2019","journal-title":"A primer for Decentralized Identifiers"},{"key":"ref16","year":"2018","journal-title":"Sovrin A protocol and token for self-sovereign identity and decentralized trust"},{"key":"ref17","author":"windley","year":"2020","journal-title":"The Sovrin SSI Stack"},{"key":"ref18","author":"tobin","year":"2018","journal-title":"Sovrin What Goes on the Ledger?"},{"key":"ref19","author":"reed","year":"2016","journal-title":"The Technical Foundations of Sovrin"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00021"},{"key":"ref3","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE51541.2021.9582472"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"ref8","year":"2020","journal-title":"Innovation meets compliance data privacy regulation and distributed ledger technology"},{"key":"ref7","year":"2021","journal-title":"sovrin sovrin Control your digital identity"},{"key":"ref2","author":"palomares","year":"2019","journal-title":"The next identity management evolution Self sovereign identity"},{"key":"ref9","year":"2021","journal-title":"What is Hyperledger Indy?"},{"key":"ref1","author":"ruff","year":"2018","journal-title":"The three models of digital identity relationships"},{"key":"ref20","year":"2018","journal-title":"How does Sovrin work?"},{"key":"ref22","author":"allen","year":"2016","journal-title":"Self-sovereign identity principles"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272212"},{"key":"ref24","author":"graglia","year":"2018","journal-title":"The nail finds a hammer self-sovereign identity design principles and property rights in the developing world"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.22"},{"key":"ref26","article-title":"Your identity is yours: Take back control of your identity using GDPR compatible self-sovereign identity","author":"naik","year":"2020","journal-title":"7th International Conference on Behavioural and Social Computing (BESC2020)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2017.7956534"}],"event":{"name":"2021 IEEE International Symposium on Systems Engineering (ISSE)","location":"Vienna, Austria","start":{"date-parts":[[2021,9,13]]},"end":{"date-parts":[[2021,10,13]]}},"container-title":["2021 IEEE International Symposium on Systems Engineering (ISSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9582418\/9582438\/09582551.pdf?arnumber=9582551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:47Z","timestamp":1652201747000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9582551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isse51541.2021.9582551","relation":{},"subject":[],"published":{"date-parts":[[2021,9,13]]}}}