{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T05:04:56Z","timestamp":1734239096295,"version":"3.30.2"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100017413","name":"Innovation Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017413","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1109\/mascots64422.2024.10786564","type":"proceedings-article","created":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:50:09Z","timestamp":1734115809000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Prolog-based Approach to Self-Evaluated, Declarative and Zero-Knowledge Verifiable Policies"],"prefix":"10.1109","author":[{"given":"Martin","family":"Farkas","sequence":"first","affiliation":[{"name":"Budapest University of Technology and Economics,Dept. of Artifical Intelligence and Systems Engineering,Budapest,Hungary"}]},{"given":"Bala\u017as \u00c1d\u00e1m","family":"Toldi","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics,Dept. of Artifical Intelligence and Systems Engineering,Budapest,Hungary"}]},{"given":"Bertalan Zolt\u00e1n","family":"P\u00e9ter","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics,Dept. of Artifical Intelligence and Systems Engineering,Budapest,Hungary"}]},{"given":"Imre","family":"Kocsis","sequence":"additional","affiliation":[{"name":"Budapest University of Technology and Economics,Dept. of Artifical Intelligence and Systems Engineering,Budapest,Hungary"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC","volume":"257","author":"Union","year":"2014","journal-title":"Official Journal of the European Union"},{"volume-title":"Self-Sovereign Identity: Decentralized digital identity and verifiable credentials. Manning","year":"2021","author":"Alex Preukschat","key":"ref2"},{"year":"2022","key":"ref3","article-title":"W3C decentralised identifiers"},{"journal-title":"Verifiable credentials data model v2.0","article-title":"World Wide Web Consortium (W3C)","year":"2024","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.30953\/bhty.v7.344"},{"journal-title":"Project Rosalind: building API prototypes for retail CBDC ecosystem innovation","year":"2023","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3153366"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3074869"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00199"},{"key":"ref11","article-title":"Cairo - a turingcomplete stark-friendly CPU architecture","author":"Goldberg","year":"2021","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3232813"},{"article-title":"Efficient Representation of Numerical Optimization Problems for SNARKs","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Angel","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref15","article-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","author":"Gabizon","year":"2019","journal-title":"Cryptology ePrint Archive"},{"article-title":"fflonk: a Fast-Fourier inspired verifier efficient version of PlonK","year":"2021","author":"Gabizon","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190905033.003.0012"},{"article-title":"The Power of Prolog","year":"2023","author":"Triska","key":"ref18"},{"article-title":"AI Algorithms, Data Structures and Idioms in Prolog, Lisp, and Java","year":"2009","author":"Luger","key":"ref19"},{"key":"ref20","article-title":"Kernels on Prolog Proof Trees: Statistical Learning in the ILP Setting","author":"Passerini","year":"2006","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","start":{"date-parts":[[2024,10,21]]},"location":"Krakow, Poland","end":{"date-parts":[[2024,10,23]]}},"container-title":["2024 32nd International Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10786488\/10786336\/10786564.pdf?arnumber=10786564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T06:34:09Z","timestamp":1734158049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10786564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/mascots64422.2024.10786564","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}