{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:41Z","timestamp":1750221041583,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T00:00:00Z","timestamp":1537920000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,26]]},"DOI":"10.1145\/3278681.3278683","type":"proceedings-article","created":{"date-parts":[[2018,11,9]],"date-time":"2018-11-09T13:05:43Z","timestamp":1541768743000},"page":"10-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Toward distributed key management for offline authentication"],"prefix":"10.1145","author":[{"given":"Gregory","family":"Linklater","sequence":"first","affiliation":[{"name":"Rhodes University, Grahamstown, South Africa"}]},{"given":"Christian","family":"Smith","sequence":"additional","affiliation":[{"name":"Stranger Labs"}]},{"given":"Alan","family":"Herbert","sequence":"additional","affiliation":[{"name":"Rhodes University, Grahamstown, South Africa"}]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[{"name":"Rhodes University, Grahamstown, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hal Abelson Ross Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Whitfield Diffie John Gilmore Peter G. Neumann Ronald L. Rivest Jeffrey I. Schiller and Bruce Schneier. 1997. The Risks of Key Recovery Key Escrow and Trusted Third-Party Encryption. Group Report. Center for Democracy and Technology. https:\/\/cdt.org\/files\/pdfs\/paper-key-escrow.pdf  Hal Abelson Ross Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Whitfield Diffie John Gilmore Peter G. Neumann Ronald L. Rivest Jeffrey I. Schiller and Bruce Schneier. 1997. The Risks of Key Recovery Key Escrow and Trusted Third-Party Encryption. Group Report. Center for Democracy and Technology. https:\/\/cdt.org\/files\/pdfs\/paper-key-escrow.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Christopher Allen. 2016. The Path to Self-Sovereign Identity. (Apr 2016). http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html  Christopher Allen. 2016. The Path to Self-Sovereign Identity. (Apr 2016). http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Christopher Allen Arthur Brock Vitalik Buterin Jon Callas Duke Dorje Christian Lundkvist Pavel Kravchenko Jude Nelson Drummond Reed Markus Sabadello Greg Slepak Noah Thorp and Harlan T. Wood. 2015. Decentralized Public Key Infrastructure. Group Report. Rebooting the Web of Trust (RWoT). https:\/\/danubetech.com\/download\/dpki.pdf  Christopher Allen Arthur Brock Vitalik Buterin Jon Callas Duke Dorje Christian Lundkvist Pavel Kravchenko Jude Nelson Drummond Reed Markus Sabadello Greg Slepak Noah Thorp and Harlan T. Wood. 2015. Decentralized Public Key Infrastructure. Group Report. Rebooting the Web of Trust (RWoT). https:\/\/danubetech.com\/download\/dpki.pdf"},{"key":"e_1_3_2_1_4_1","first-page":"800","article-title":"A Framework for Designing Cryptographic Key Management Systems","author":"Barker Elaine","year":"2013","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"C. Bormann and P. Hoffman. 2013. RFC7049: Concise Binary Object Representation. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7049  C. Bormann and P. Hoffman. 2013. RFC7049: Concise Binary Object Representation. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7049","DOI":"10.17487\/rfc7049"},{"key":"e_1_3_2_1_6_1","unstructured":"Pelle Braendgaard. 2018. Different Approaches to Ethereum Identity Standards. Medium. (Jan 2018). https:\/\/medium.com\/uport\/different-approaches-to-ethereum-identity-standards-a09488347c87  Pelle Braendgaard. 2018. Different Approaches to Ethereum Identity Standards. Medium. (Jan 2018). https:\/\/medium.com\/uport\/different-approaches-to-ethereum-identity-standards-a09488347c87"},{"key":"e_1_3_2_1_7_1","unstructured":"Pelle Braendgaard. 2018. What is a uPort identity? Medium. (Jan 2018). https:\/\/medium.com\/uport\/what-is-a-uport-identity-b790b065809c  Pelle Braendgaard. 2018. What is a uPort identity? Medium. (Jan 2018). https:\/\/medium.com\/uport\/what-is-a-uport-identity-b790b065809c"},{"key":"e_1_3_2_1_8_1","unstructured":"Vitalik Buterin. 2017. The Meaning of Decentralization. Available: https:\/\/medium.com\/@VitalikButerin\/the-meaning-of-decentralization-a0c92b76a274. (Feb 2017).  Vitalik Buterin. 2017. The Meaning of Decentralization. Available: https:\/\/medium.com\/@VitalikButerin\/the-meaning-of-decentralization-a0c92b76a274. (Feb 2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Clayton G. Danezis and M. Kuhn. 2001. Real World Patterns of Failure in Anonymity Systems. Lecture Notes in Computer Science. University of Cambridge Cambridge United Kingdom. http:\/\/www.cl.cam.ac.uk\/~rnc1\/Patterns_of_Failure.pdf   R. Clayton G. Danezis and M. Kuhn. 2001. Real World Patterns of Failure in Anonymity Systems. Lecture Notes in Computer Science. University of Cambridge Cambridge United Kingdom. http:\/\/www.cl.cam.ac.uk\/~rnc1\/Patterns_of_Failure.pdf","DOI":"10.1007\/3-540-45496-9_17"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0124-7"},{"key":"e_1_3_2_1_11_1","unstructured":"Digital Bazaar. 2018. Veres One. Website. (2018). https:\/\/veres.one\/  Digital Bazaar. 2018. Veres One. Website. (2018). https:\/\/veres.one\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_3_2_1_13_1","unstructured":"Niels Ferguson Bruce Schneier and Tadayoshi Kohno. 2010. Cryptography Engineering. Wiley.  Niels Ferguson Bruce Schneier and Tadayoshi Kohno. 2010. Cryptography Engineering. Wiley."},{"key":"e_1_3_2_1_14_1","unstructured":"Conner Fromknecht Dragos Velicanu and Sophia Yakoubov. 2014. A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptology ePrint Archive (2014) 803. https:\/\/allquantor.at\/blockchainbib\/pdf\/fromknecht2014decentralized.pdf  Conner Fromknecht Dragos Velicanu and Sophia Yakoubov. 2014. A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptology ePrint Archive (2014) 803. https:\/\/allquantor.at\/blockchainbib\/pdf\/fromknecht2014decentralized.pdf"},{"key":"e_1_3_2_1_15_1","first-page":"201","article-title":"Personal Identity Verification (PIV) of Federal Employees and Contractors","author":"Gallagher Patrick D.","year":"2013","journal-title":"Federal Information Processing Standards Publication (FIPS)"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Security Assertions Markup Language","volume":"14","author":"Hallam-Baker Phillip","year":"2001","journal-title":"OASIS Standard"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2459"},{"key":"e_1_3_2_1_18_1","unstructured":"Russell Housley W. Ford W. Polk and D. Solo. 2013. RFC6818 Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc6818  Russell Housley W. Ford W. Polk and D. Solo. 2013. RFC6818 Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc6818"},{"key":"e_1_3_2_1_19_1","unstructured":"Vincent C. Hu David Ferraiolo Rick Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162. National Institute of Science and Technology https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/NIST.SP.800-162.pdf.  Vincent C. Hu David Ferraiolo Rick Kuhn Adam Schnitzer Kenneth Sandlin Robert Miller and Karen Scarfone. 2014. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. NIST Special Publication 800--162. National Institute of Science and Technology https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/NIST.SP.800-162.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"International Telecommunications Union. 2002. X.609 Abstract Syntax Notation One (ASN.1) Encoding Rules. ITU Recommendation. International Telecommunications Union. https:\/\/www.itu.int\/ITU-T\/studygroups\/com17\/languages\/X. 690-0207.pdf  International Telecommunications Union. 2002. X.609 Abstract Syntax Notation One (ASN.1) Encoding Rules. ITU Recommendation. International Telecommunications Union. https:\/\/www.itu.int\/ITU-T\/studygroups\/com17\/languages\/X. 690-0207.pdf"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Michael Jones. 2015. RFC7518 JSON Web Algorithms (JWA) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7518  Michael Jones. 2015. RFC7518 JSON Web Algorithms (JWA) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7518","DOI":"10.17487\/RFC7518"},{"key":"e_1_3_2_1_22_1","unstructured":"Michael Jones Paul Tarjan J Bradley Yaron Goland Nat Sakimura John Panzer and Dirk Balfanz. 2011. RFC7515 JSON Web Signature (JWS) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7515  Michael Jones Paul Tarjan J Bradley Yaron Goland Nat Sakimura John Panzer and Dirk Balfanz. 2011. RFC7515 JSON Web Signature (JWS) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7515"},{"key":"e_1_3_2_1_23_1","unstructured":"Michael Jones Paul Tarjan J Bradley Yaron Goland Nat Sakimura John Panzer and Dirk Balfanz. 2012. RFC7519 JSON Web Token (JWT) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7519  Michael Jones Paul Tarjan J Bradley Yaron Goland Nat Sakimura John Panzer and Dirk Balfanz. 2012. RFC7519 JSON Web Token (JWT) Specification. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc7519"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"B. Laurie A. Langley and E. Kasper. 2013. RFC6962 Certificate Transparency. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc6962  B. Laurie A. Langley and E. Kasper. 2013. RFC6962 Certificate Transparency. IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc6962","DOI":"10.17487\/rfc6962"},{"volume-title":"Proceedings of the 20th Southern Africa Telecommunication Networks and Applications Conference (SATNAC).","year":"2017","author":"Linklater Gregory C. M.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","unstructured":"Dave Longley Manu Sporny Shane McCarron and Christopher Allen. 2017. Linked Data Signatures. W3C Community Group Draft Report v1.0. W3C Credentials Community Group https:\/\/w3c-dvcg.github.io\/ld-signatures\/.  Dave Longley Manu Sporny Shane McCarron and Christopher Allen. 2017. Linked Data Signatures. W3C Community Group Draft Report v1.0. W3C Credentials Community Group https:\/\/w3c-dvcg.github.io\/ld-signatures\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Chip Morningstar. 2017. What are Capabilties? Blog. http:\/\/habitatchronicles.com\/2017\/05\/what-are-capabilities\/. (May 2017).  Chip Morningstar. 2017. What are Capabilties? Blog. http:\/\/habitatchronicles.com\/2017\/05\/what-are-capabilities\/. (May 2017)."},{"key":"e_1_3_2_1_29_1","unstructured":"Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2018. Decentralized Identifiers (DIDs). W3C Community Group Draft Report v0.9. W3C Credentials Community Group https:\/\/w3cccg.github.io\/did-spec\/.  Drummond Reed Manu Sporny Dave Longley Christopher Allen Ryan Grant and Markus Sabadello. 2018. Decentralized Identifiers (DIDs) . W3C Community Group Draft Report v0.9. W3C Credentials Community Group https:\/\/w3cccg.github.io\/did-spec\/."},{"key":"e_1_3_2_1_30_1","unstructured":"E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3 draftietf-tls-tls13-28. IETF Internet Draft 28. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-28  E. Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3 draftietf-tls-tls13-28. IETF Internet Draft 28. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-28"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"P. Saint-Andre. 2017. RFC8141 Uniform Resource Names (URNs). IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc8141  P. Saint-Andre. 2017. RFC8141 Uniform Resource Names (URNs) . IETF RFC. Internet Engineering Task Force. https:\/\/tools.ietf.org\/html\/rfc8141","DOI":"10.17487\/RFC8141"},{"key":"e_1_3_2_1_32_1","unstructured":"Natsuhiko Sakimura J Bradley M Jones B de Medeiros and C Mortimore. 2014. OpenID Connect Core Specification. The OpenID Foundation (2014).  Natsuhiko Sakimura J Bradley M Jones B de Medeiros and C Mortimore. 2014. OpenID Connect Core Specification. The OpenID Foundation (2014)."},{"key":"e_1_3_2_1_33_1","unstructured":"Bruce Schneier. 1996. Applied Cryptography (2 ed.). Wiley.  Bruce Schneier. 1996. Applied Cryptography (2 ed.). Wiley."},{"key":"e_1_3_2_1_34_1","unstructured":"Bruce Schneier. 2011. Secrets and Lies: Digital Security in a Networked World. Wiley.   Bruce Schneier. 2011. Secrets and Lies: Digital Security in a Networked World. Wiley."},{"key":"e_1_3_2_1_35_1","unstructured":"Manu Sporny Dave Longley Daniel Burnett and Gregg Kellogg. 2018. Verifiable Credentials Data Model. W3C Community Group Editor's Draft v1.0. W3C Credentials Community Group https:\/\/w3c.github.io\/vc-data-model\/.  Manu Sporny Dave Longley Daniel Burnett and Gregg Kellogg. 2018. Verifiable Credentials Data Model. W3C Community Group Editor's Draft v1.0. W3C Credentials Community Group https:\/\/w3c.github.io\/vc-data-model\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Manu Sporny Dave Longley and Christopher Lemmer Webber. 2018. Veres One DID Method Specification 1.0. W3C Community Group Draft Report. Digital Bazaar. https:\/\/w3c-ccg.github.io\/didm-veres-one\/  Manu Sporny Dave Longley and Christopher Lemmer Webber. 2018. Veres One DID Method Specification 1.0. W3C Community Group Draft Report. Digital Bazaar. https:\/\/w3c-ccg.github.io\/didm-veres-one\/"},{"volume-title":"Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust","year":"2018","author":"Foundation The Sovrin","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Paul Voigt and Axel von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide (1st ed.). Springer.   Paul Voigt and Axel von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide (1st ed.). Springer.","DOI":"10.1007\/978-3-319-57959-7_1"}],"event":{"name":"SAICSIT '18: 2018 Annual Conference of the South African Institute of Computer Scientists and Information Technologists","acronym":"SAICSIT '18","location":"Port Elizabeth South Africa"},"container-title":["Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278681.3278683","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3278681.3278683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:54Z","timestamp":1750207434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278681.3278683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,26]]},"references-count":38,"alternative-id":["10.1145\/3278681.3278683","10.1145\/3278681"],"URL":"https:\/\/doi.org\/10.1145\/3278681.3278683","relation":{},"subject":[],"published":{"date-parts":[[2018,9,26]]},"assertion":[{"value":"2018-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}