{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:35:19Z","timestamp":1773174919743,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["318424"],"award-info":[{"award-number":["318424"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,25]]},"DOI":"10.1145\/2613087.2613093","type":"proceedings-article","created":{"date-parts":[[2014,7,1]],"date-time":"2014-07-01T14:23:03Z","timestamp":1404224583000},"page":"153-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["User-centric identity as a service-architecture for eIDs with selective attribute disclosure"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Slamanig","sequence":"first","affiliation":[{"name":"Graz University of Technology (IAIK), Graz, Austria"}]},{"given":"Klaus","family":"Stranacher","sequence":"additional","affiliation":[{"name":"E-Government Innovation Center (EGIZ), Graz, Austria"}]},{"given":"Bernd","family":"Zwattendorfer","sequence":"additional","affiliation":[{"name":"E-Government Innovation Center (EGIZ), Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_1_2_1","volume-title":"FIDIS","author":"Bauer M.","year":"2005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653734"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","volume-title":"EuroPKI","author":"Brzuska C.","year":"2012"},{"key":"e_1_3_2_1_6_1","first-page":"93","volume-title":"An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Advances in Cryptology - EUROCRYPT 2001","volume":"2045","author":"Camenisch J.","year":"2001"},{"key":"e_1_3_2_1_7_1","unstructured":"European Commission. IDABC. 2009. eID Interoperability for PEGS: Update of Country Profiles. 2009.  European Commission. IDABC. 2009. eID Interoperability for PEGS: Update of Country Profiles. 2009."},{"key":"e_1_3_2_1_8_1","unstructured":"European Parliament and the Council. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data . http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:en:HTML 1995.  European Parliament and the Council. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data . http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=CELEX:31995L0046:en:HTML 1995."},{"key":"e_1_3_2_1_9_1","unstructured":"European Union. Directive 1999\/93\/EC of the European Parliament and of the Council of 13. December 1999 on a community framework for electronic signatures.  European Union. Directive 1999\/93\/EC of the European Parliament and of the Council of 13. December 1999 on a community framework for electronic signatures."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484324"},{"key":"e_1_3_2_1_11_1","series-title":"LNCS","first-page":"244","volume-title":"CT-RSA '02","author":"Johnson R.","year":"2002"},{"key":"e_1_3_2_1_12_1","volume-title":"AusCERT 2005","author":"J\u00f8sang A.","year":"2005"},{"key":"e_1_3_2_1_13_1","first-page":"143","volume-title":"ACSW '07","author":"J\u00f8sang A.","year":"2007"},{"key":"e_1_3_2_1_14_1","first-page":"391","volume-title":"Security Architecture of the Austrian Citizen Card Concept. In ACSAC 2002","author":"Leitold H.","year":"2002"},{"key":"e_1_3_2_1_15_1","first-page":"131","volume-title":"Implementation and Pilots. In ISSE 2010","author":"Leitold H.","year":"2010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9788-6_35"},{"key":"e_1_3_2_1_17_1","unstructured":"Modinis. The Status of Identity Management in European eGovernment initiatives. Deliverable D3.5 2006.  Modinis. The Status of Identity Management in European eGovernment initiatives. Deliverable D3.5 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"European Network and Information Security Agency (ENISA)","author":"Naumann I.","year":"2009"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427551"},{"key":"e_1_3_2_1_20_1","unstructured":"J. Palfrey and U. Gasser. CASE STUDY: Digital Identity Interoperability and eInnovation. Berkman Publication Series 2007.  J. Palfrey and U. Gasser. CASE STUDY: Digital Identity Interoperability and eInnovation. Berkman Publication Series 2007."},{"key":"e_1_3_2_1_21_1","unstructured":"Republic of Austria. Austrian Federal Act on Provisions facilitating electronic communications with public Bodies; part I Nr. 10\/2004. Federal law Gazette 2004.  Republic of Austria. Austrian Federal Act on Provisions facilitating electronic communications with public Bodies; part I Nr. 10\/2004. Federal law Gazette 2004."},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","first-page":"218","volume-title":"TrustBus","author":"Sabouri A.","year":"2012"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.08.002"},{"key":"e_1_3_2_1_24_1","first-page":"285","volume-title":"Content Extraction Signatures. In ICISC 2001","volume":"2288","author":"Steinfeld R.","year":"2001"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39218-4_23"},{"key":"e_1_3_2_1_26_1","first-page":"419","volume-title":"SECRYPT","author":"Zwattendorfer B.","year":"2013"}],"event":{"name":"SACMAT '14: 19th ACM Symposium on Access Control Models and Technologies","location":"London Ontario Canada","acronym":"SACMAT '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2613087.2613093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:57Z","timestamp":1750229757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2613087.2613093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":26,"alternative-id":["10.1145\/2613087.2613093","10.1145\/2613087"],"URL":"https:\/\/doi.org\/10.1145\/2613087.2613093","relation":{},"subject":[],"published":{"date-parts":[[2014,6,25]]},"assertion":[{"value":"2014-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}