{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T08:29:15Z","timestamp":1768465755665,"version":"3.49.0"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korea government","award":["NRF-2022R1C1C1010494"],"award-info":[{"award-number":["NRF-2022R1C1C1010494"]}]},{"name":"Institute for Information &amp; communications Technology Promotion","award":["2020-0-00666"],"award-info":[{"award-number":["2020-0-00666"]}]},{"name":"Research on Security of 5G-data-intensive Computing Platforms Based on Disaggregated Architecture","award":["2019-0-00421"],"award-info":[{"award-number":["2019-0-00421"]}]},{"DOI":"10.13039\/501100002647","name":"Sungkyunkwan University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002647","id-type":"DOI","asserted-by":"publisher"}]},{"name":"AI Platform to Fully Adapt and Reflect Privacy-Policy Changes","award":["2022-0-00688"],"award-info":[{"award-number":["2022-0-00688"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/tdsc.2023.3235951","type":"journal-article","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T21:49:41Z","timestamp":1673646581000},"page":"4881-4898","source":"Crossref","is-referenced-by-count":16,"title":["DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID Architecture"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0430-3004","authenticated-orcid":false,"given":"Siwon","family":"Huh","sequence":"first","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]},{"given":"Myungkyu","family":"Shim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]},{"given":"Jihwan","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]},{"given":"Simon S.","family":"Woo","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1605-3866","authenticated-orcid":false,"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-6266","authenticated-orcid":false,"given":"Hojoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, Sungkyunkwan University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Together we\u2019re building a new identity ecosystem","year":"2021"},{"key":"ref2","article-title":"ION:ION is an open, public, permissionless layer 2 decentralized identifier network that runs atop the bitcoin blockchain","year":"2021"},{"key":"ref3","article-title":"Data meets identity","year":"2021"},{"key":"ref4","article-title":"Home - sovrin","year":"2021"},{"key":"ref5","article-title":"IBM verify credentials:transforming digital identity into decentralized identity","year":"2021"},{"key":"ref6","article-title":"Decentralized identifiers (DIDs) v1.0: Core architecture, data model, and representations","year":"2021"},{"key":"ref7","article-title":"Universal resolver","author":"Foundation","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref9","article-title":"Arm trustzone technology","year":"2021"},{"key":"ref10","article-title":"Strengthen enclave trust with attestation","author":"Corporation","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134038"},{"key":"ref12","article-title":"Intel sgx and side-channels","author":"Johnson","year":"2018"},{"key":"ref13","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Bulck"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2021.24330","article-title":"OblivSketch: Oblivious network measurement as a cloud service","volume-title":"Proc. 28th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Lai"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2019.23513","article-title":"OBFUSCURO: A commodity obfuscation engine on Intel SGX","volume-title":"Proc. 26th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Ahmad"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813634"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660365"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"ref19","first-page":"415","article-title":"Constants count: Practical improvements to oblivious RAM","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Ren"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"ref21","article-title":"Vaccine passport apps are here. but the technical challenges are still coming","author":"Rachel Lerman","year":"2021"},{"key":"ref22","article-title":"Home - uport","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/mascots.2018.00034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ccwc.2019.8666535"},{"key":"ref25","first-page":"1041","article-title":"Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Bulck"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref27","article-title":"Software grand exposure: SGX cache attacks are practical","volume-title":"Proc. 11th USENIX Workshop Offensive Technol.","author":"Brasser"},{"key":"ref28","article-title":"Embedded TLS library for applications, devices, IoT, and the cloud","year":"2021"},{"key":"ref29","article-title":"cloud-security-research\/sgx-ra-tls","year":"2021"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23239","article-title":"ZeroTrace: Oblivious memory primitives from Intel SGX","volume-title":"Proc. 25th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Sasy"},{"key":"ref31","first-page":"303","article-title":"TOR: The second-generation onion router","volume-title":"Proc. 13th USENIX Secur. Symp.","author":"Dingledine"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_36"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/p2p.2010.5569976"},{"key":"ref34","article-title":"Intel software guard extensions","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339814"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3431171"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2993318.2993348"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.95"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s18124215"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/icbc48266.2020.9169411"},{"key":"ref41","article-title":"Droplet: Decentralized authorization for IoT data streams","author":"Shafagh","year":"2018"},{"key":"ref42","article-title":"Decentralized identifiers (DIDs) v1.0: Core architecture, data model, and representations","year":"2021"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219594"},{"key":"ref44","article-title":"Decentralized identity and access management framework for Internet of Things devices","author":"Sghaier Omar","year":"2020"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64357-7_7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054887"},{"key":"ref47","article-title":"Building a secure system using trustzone technolog","author":"Limited","year":"2009"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1145\/2988336.2988350","article-title":"SecureKeeper: Confidential zookeeper using Intel SGX","volume-title":"Proc. 17th Int. Middleware Conf.","author":"Brenner"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2015.10"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2018.00025"},{"key":"ref51","article-title":"Azure confidential computing","author":"Azure","year":"2021"},{"key":"ref52","article-title":"Confidential computing","author":"Cloud","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2015.45"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"ref55","first-page":"69","article-title":"CacheZoom: How SGX amplifies the power of cache attacks","volume-title":"Proc. 19th Int. Conf. Cryptographic Hardware Embedded Syst.","author":"Moghimi"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243822"},{"key":"ref57","first-page":"44","article-title":"Off-limits: Abusing legacy x86 memory segmentation to spy on enclaved execution","volume-title":"Proc. 10th Int. Symp. Eng. Secure Softw. Syst.","author":"Gyselinck"},{"key":"ref58","first-page":"719","article-title":"FLUSH RELOAD: A high resolution, low noise, L3 cache side-channel attack","volume-title":"Proc. 23rd USENIX Secur. Symp.","author":"Yarom"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173204"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2019.2963021"},{"key":"ref61","doi-asserted-by":"crossref","DOI":"10.1109\/MDAT.2024.3352537","article-title":"Spectre returns! speculation attacks using the return stack buffer","volume-title":"Proc. 12th USENIX Workshop Offensive Technol.","author":"Koruyeh"},{"key":"ref62","first-page":"991","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Bulck"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363219"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28416"},{"key":"ref65","first-page":"431","article-title":"Raccoon: Closing digital side-channels through obfuscated execution","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Rane"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2018.23284","article-title":"OBLIVIATE: A data oblivious filesystem for Intel SGX","volume-title":"Proc. 25th Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Ahmad"},{"key":"ref67","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Secur. Symp.","author":"Ohrimenko"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359809"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3193111.3193119"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10314839\/10017188.pdf?arnumber=10017188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T07:10:05Z","timestamp":1707808205000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":69,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3235951","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11]]}}}