{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779139,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314344","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"60-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing privacy in identity management systems"],"prefix":"10.1145","author":[{"given":"Steven","family":"Gevers","sequence":"first","affiliation":[{"name":"K.U.Leuven, Leuven, Belgium"}]},{"given":"Verslype","family":"Verslype","sequence":"additional","affiliation":[{"name":"K.U.Leuven, Leuven, Belgium"}]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[{"name":"K.U.Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Sxip identity. http:\/\/www.sxip.com\/.  Sxip identity. http:\/\/www.sxip.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Microsoft cardspace. http:\/\/msdn.microsoft.com\/winfx\/reference\/infocard\/default.aspx.  Microsoft cardspace. http:\/\/msdn.microsoft.com\/winfx\/reference\/infocard\/default.aspx."},{"key":"e_1_3_2_1_3_1","unstructured":"Oasis security services (saml) tc. http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security.  Oasis security services (saml) tc. http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security."},{"key":"e_1_3_2_1_4_1","unstructured":"Xmldap firefox identity selector. http:\/\/www.xmldap.org\/.  Xmldap firefox identity selector. http:\/\/www.xmldap.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Generating infocard parameters. http:\/\/www.identityblog.com\/codesample.php?codesamples\/infocard-params.  Generating infocard parameters. http:\/\/www.identityblog.com\/codesample.php?codesamples\/infocard-params."},{"key":"e_1_3_2_1_6_1","volume-title":"Zurich Research Laboratory","author":"Backes Michael","year":"2006","unstructured":"Michael Backes , Jan Camenisch , and Dieter Sommer . Anonymous yet accountable access control. Technical report, IBM Research , Zurich Research Laboratory , 2006 . Michael Backes, Jan Camenisch, and Dieter Sommer. Anonymous yet accountable access control. Technical report, IBM Research, Zurich Research Laboratory, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE Workshop on Web Services Security (WSSS","author":"Camenisch Jan","year":"2006","unstructured":"Jan Camenisch , Thomas Gross , and Dieter Sommer . Enhancing privacy in identity federation anonymous credentials ensure unlinkability in ws-security . In IEEE Workshop on Web Services Security (WSSS 2006 ). Jan Camenisch, Thomas Gross, and Dieter Sommer. Enhancing privacy in identity federation anonymous credentials ensure unlinkability in ws-security. In IEEE Workshop on Web Services Security (WSSS 2006)."},{"key":"e_1_3_2_1_10_1","first-page":"118","volume-title":"EUROCRYPT \u00bf01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques","author":"Camenisch Jan","year":"2001","unstructured":"Jan Camenisch and Anna Lysyanskaya . An efficient system for non-transferable anonymous credentials with optional anonymity revocation . In EUROCRYPT \u00bf01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques , pages 93\u00bf- 118 , London, UK , 2001 . Springer-Verlag . Jan Camenisch and Anna Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT \u00bf01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pages 93\u00bf-118, London, UK, 2001. Springer-Verlag."},{"key":"e_1_3_2_1_11_1","volume-title":"Zurich Research Laboratory","author":"Camenisch Jan","year":"2006","unstructured":"Jan Camenisch , Dieter Sommer , and Roger Zimmermann . A general certification framework with applications to privacy-enhancing certificate infrastructures. Technical report, IBM Research , Zurich Research Laboratory , 2006 . Jan Camenisch, Dieter Sommer, and Roger Zimmermann. A general certification framework with applications to privacy-enhancing certificate infrastructures. Technical report, IBM Research, Zurich Research Laboratory, 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"December","author":"Cameron Kim","year":"2005","unstructured":"Kim Cameron . The laws of identity , December 2005 . Kim Cameron. The laws of identity, December 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_15_1","volume-title":"IETF RFC Publication","author":"Housley R.","year":"1999","unstructured":"R. Housley , W. Ford , W. Polk , and D. Solo . RFC 2459: Internet X.509 Public Key Infrastructure Certificate and CRL Profile . IETF RFC Publication , January 1999 . R. Housley, W. Ford, W. Polk, and D. Solo. RFC 2459: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC Publication, January 1999."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":14,"alternative-id":["10.1145\/1314333.1314344","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314344","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}