{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T08:26:54Z","timestamp":1743755214661,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100015539","name":"Australian Government","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647805","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials"],"prefix":"10.1109","author":[{"given":"Nikesh","family":"Lalchandani","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank","family":"Jiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jongkil Jay","family":"Jeong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yevhen","family":"Zolotavkin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robin","family":"Doss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Horizon scan report, theme 1.3: Development of next generation authentication technologies","author":"jongkil jay jeong","year":"2019","journal-title":"Cyber Security Cooperative Research Centre"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/3407023.3407026","article-title":"An overview of limitations and approaches in identity management","author":"p\u00f6hn","year":"2020","journal-title":"Proceedings of International Conference on Availability Reliability and Security"},{"key":"ref12","first-page":"10","article-title":"Addressing the challenges facing decentralized identity systems","volume":"15","author":"volkov","year":"2020","journal-title":"ISChannel"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/BRAINS49436.2020.9223292"},{"journal-title":"Self-Issued OpenID Connect Provider DID Profile v0 1","year":"2020","author":"terbu","key":"ref14"},{"key":"ref15","article-title":"Introduction to did auth","author":"sabadello","year":"0","journal-title":"Rebooting the Web of Trust 2018 dID Ceremony proving ownership of a DID with relationship to VCs"},{"journal-title":"Didcomm messaging","year":"2020","author":"hardman","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2896587"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-019-09476-z"},{"key":"ref19","first-page":"1","article-title":"An examination of initiation, organization, participation, leadership, and control of successful open source software development projects","volume":"5","author":"conlon","year":"2007","journal-title":"Information Systems Education Journal"},{"journal-title":"APIs A Strategy Guide","year":"2012","author":"daniel jacobson","key":"ref4"},{"key":"ref3","first-page":"121","article-title":"Online privacy - self-sovereign identity","volume":"16","author":"sunda","year":"2020","journal-title":"Information and System Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456428"},{"article-title":"Verifiable credentials data model 1.0","year":"2019","author":"sporny","key":"ref5"},{"article-title":"Aries rfc 0003: Protocols","year":"2019","author":"hardman","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00128"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref2"},{"key":"ref1","article-title":"The path to self-sovereign identity","author":"allen","year":"2016","journal-title":"2016 sSI - 4 types 10 principles"},{"key":"ref9","article-title":"Selfsovereign and decentralized identity as the future of identity management?","author":"kubach","year":"2020","journal-title":"Open Identity Summit 2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1144359.1144363"},{"journal-title":"W3C Working Group Note","article-title":"W3c verifiable credentials use cases","year":"2019","key":"ref22"},{"key":"ref21","article-title":"Did and vc: Untangling decentralized identifiers and verifiable credentials for the web of trust","author":"brunner","year":"2020","journal-title":"ACM"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939249"},{"journal-title":"Github Dif wallet and credential interactions","year":"2021","key":"ref23"},{"journal-title":"Github W3c credentials community group - vc-http-api","year":"2021","key":"ref26"},{"key":"ref25","article-title":"Decentralized ssi governance, the missing link in automating business decisions","author":"rieks joosten","year":"2021","journal-title":"Research Gate"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647805.pdf?arnumber=9647805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647805","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}