{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:20Z","timestamp":1750220960083,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Verkehr und Digitale Infrastruktur","award":["FKZ 19\/F2048 D"],"award-info":[{"award-number":["FKZ 19\/F2048 D"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3415282","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"1167-1169","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards transparency-encouraging partial software disclosure to enable trust in data usage"],"prefix":"10.1145","author":[{"given":"Christian","family":"Schindler","sequence":"first","affiliation":[{"name":"University of Mannheim, Mannheim, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.10.009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1318471.1318538"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28641-4_20"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the 36th IEEE Symp. on Security and Privacy. Piscataway: IEEE. 1--2.","author":"Arzt Steven","year":"2015","unstructured":"Steven Arzt, Alexandre Bartel, Richard Gay, Steffen Lortz, Enrico Lovat, Heiko Mantel, Martin Mohr, Benedikt Nordhoff, Matthias Perner, Siegfried Rasthofer, et al. 2015. Poster: Software security for mobile devices. In Proc. of the 36th IEEE Symp. on Security and Privacy. Piscataway: IEEE. 1--2."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378846"},{"volume-title":"Advances in Computers.","author":"Banescu Sebastian","key":"e_1_3_2_1_6_1","unstructured":"Sebastian Banescu and Alexander Pretschner. 2018. A tutorial on software obfuscation. In Advances in Computers. Vol. 108. Elsevier, 283--353."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-010-0102-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_9_1","unstructured":"Luiz Marcio Cysneiros and Vera Maria Benjamim Werneck. 2009. An Initial Analysis on How Software Transparency and Trust Influence each other. In WER."},{"key":"e_1_3_2_1_10_1","volume-title":"Predicate Abstraction in Program Verification: Survey and Current Trends. In 2014 Imperial College Computing Student Workshop. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik.","author":"Daniel Jakub","year":"2014","unstructured":"Jakub Daniel and Pavel Par\u00edzek. 2014. Predicate Abstraction in Program Verification: Survey and Current Trends. In 2014 Imperial College Computing Student Workshop. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632362.2632372"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.114"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.37"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137627.1137636"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384623"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322933"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.19"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58706-6_36"},{"key":"e_1_3_2_1_21_1","volume-title":"Reza Curtmola, and Justin Cappos.","author":"Torres-Arias Santiago","year":"2019","unstructured":"Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, and Justin Cappos. 2019. in-toto: Providing farm-to-table guarantees for bits and bytes. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1393--1410."},{"volume-title":"International Colloquium on Theoretical Aspects of Computing","author":"T\u00f6ws Manuel","key":"e_1_3_2_1_22_1","unstructured":"Manuel T\u00f6ws and Heike Wehrheim. 2018. Information Flow Certificates. In International Colloquium on Theoretical Aspects of Computing. Springer, 435--454."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3415282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3415282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:13Z","timestamp":1750204453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3415282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":22,"alternative-id":["10.1145\/3324884.3415282","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3415282","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}