{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:19:27Z","timestamp":1775470767439,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/ssci50451.2021.9659929","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:09:51Z","timestamp":1643058591000},"page":"1-8","source":"Crossref","is-referenced-by-count":22,"title":["An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Paul","family":"Grace","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE51541.2021.9582472"},{"key":"ref11","article-title":"Self-Sovereign Identity: The ultimate beginners guide!","year":"2021","journal-title":"Tykn tech"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.85"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.22"},{"key":"ref14","article-title":"A primer for Decentralized Identifiers","year":"2019","journal-title":"W3C"},{"key":"ref15","article-title":"Sovrin: A protocol and token for self-sovereign identity and decentralized trust","year":"2018","journal-title":"Sovrin org"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/BESC51023.2020.9348298"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2017.7956534"},{"key":"ref19","author":"kazarian","year":"2016","journal-title":"Why decentralized encryption key management for mobile is dangerous"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE51541.2021.9582551"},{"key":"ref3","article-title":"The inevitable rise of self-sovereign identity","volume":"29","author":"tobin","year":"2016","journal-title":"The Sovrin Foundation"},{"key":"ref6","first-page":"572","article-title":"A system security engineering process","volume":"249","author":"weiss","year":"0","journal-title":"Proceedings of the 14th National Computer Security Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00021"},{"key":"ref8","first-page":"21","article-title":"Attack Trees","volume":"24","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310900"},{"key":"ref2","author":"windley","year":"2017","journal-title":"Fixing the five problems of internet identity"},{"key":"ref1","article-title":"What is Self-Sovereign Identity?","year":"2018","journal-title":"Sovrin org"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272223"},{"key":"ref20","author":"cohen","year":"2019","journal-title":"Spoooooky types of identity fraud"},{"key":"ref22","author":"hayes","year":"2020","journal-title":"The many different forms of identity theft"},{"key":"ref21","article-title":"5 Identity attacks that exploit your broken authentication","year":"2021","journal-title":"Okta com"}],"event":{"name":"2021 IEEE Symposium Series on Computational Intelligence (SSCI)","location":"Orlando, FL, USA","start":{"date-parts":[[2021,12,5]]},"end":{"date-parts":[[2021,12,7]]}},"container-title":["2021 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9659537\/9659538\/09659929.pdf?arnumber=9659929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:28Z","timestamp":1652201788000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9659929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ssci50451.2021.9659929","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}