{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:38Z","timestamp":1750220618844,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T00:00:00Z","timestamp":1602806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"York-Maastricht partnership's Responsible Data Science by Design programme"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,16]]},"DOI":"10.1145\/3417990.3420043","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T14:03:18Z","timestamp":1604325798000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards model-based development of decentralised peer-to-peer data vaults"],"prefix":"10.1145","author":[{"given":"Alfa","family":"Yohannis","sequence":"first","affiliation":[{"name":"University of York, York, United Kingdom"}]},{"given":"Alfonso","family":"de la Vega","sequence":"additional","affiliation":[{"name":"University of York, York, United Kingdom"}]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[{"name":"University of York, York, United Kingdom"}]},{"given":"Dimitris","family":"Kolovos","sequence":"additional","affiliation":[{"name":"University of York, York, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998443"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297362"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00015"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Goldreich Oded","year":"2002","unstructured":"Oded Goldreich . 2002 . Secure Multi-Party Computation (Final (incomplete) Draft, Version 1.4) . Retrieved July 14, 2020 from http:\/\/www.wisdom.weizmann.ac.il\/~oded\/PSX\/prot.pdf. Oded Goldreich. 2002. Secure Multi-Party Computation (Final (incomplete) Draft, Version 1.4). Retrieved July 14, 2020 from http:\/\/www.wisdom.weizmann.ac.il\/~oded\/PSX\/prot.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"Australian Electronic Governance Conference","author":"Henman Paul","year":"2004","unstructured":"Paul Henman and Mitchell Dean . 2004 . The governmental powers of welfare e-administration . In Australian Electronic Governance Conference 2004. Melbourne, Australia : Department of Political Science, University of Melbourne. Paul Henman and Mitchell Dean. 2004. The governmental powers of welfare e-administration. In Australian Electronic Governance Conference 2004. Melbourne, Australia: Department of Political Science, University of Melbourne."},{"key":"e_1_3_2_1_7_1","volume-title":"ISD 2019 - 28th International Conference on Information Systems Development","author":"Ladjel Riad","year":"2019","unstructured":"Riad Ladjel , Nicolas Anciaux , Philippe Pucheral , and Guillaume Scerri . 2019 . A manifest-based framework for organizing the management of personal data at the edge of the network . In ISD 2019 - 28th International Conference on Information Systems Development . Toulon, France. https:\/\/hal.archives-ouvertes.fr\/hal-02269203 Riad Ladjel, Nicolas Anciaux, Philippe Pucheral, and Guillaume Scerri. 2019. A manifest-based framework for organizing the management of personal data at the edge of the network. In ISD 2019 - 28th International Conference on Information Systems Development. Toulon, France. https:\/\/hal.archives-ouvertes.fr\/hal-02269203"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.00265"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921191"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_11_1","unstructured":"Oracle. 2020 . Java Cryptography Architecture Standard Algorithm Name Documentation for JDK 8 . Retrieved July 12, 2020 from https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/Standard-Names.html#KeyPairGenerator. Oracle. 2020. Java Cryptography Architecture Standard Algorithm Name Documentation for JDK 8. Retrieved July 12, 2020 from https:\/\/docs.oracle.com\/javase\/8\/docs\/technotes\/guides\/security\/Standard-Names.html#KeyPairGenerator."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7518-7_2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41533-3_4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.023"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_16_1","volume-title":"Polack","author":"Rose Louis M.","year":"2008","unstructured":"Louis M. Rose , Richard F. Paige , Dimitrios S. Kolovos , and Fiona A. C . Polack . 2008 . The Epsilon Generation Language. In Model Driven Architecture - Foundations and Applications, Ina Schieferdecker and Alan Hartman (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 1--16. Louis M. Rose, Richard F. Paige, Dimitrios S. Kolovos, and Fiona A. C. Polack. 2008. The Epsilon Generation Language. In Model Driven Architecture - Foundations and Applications, Ina Schieferdecker and Alan Hartman (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--16."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_3_2_1_18_1","volume-title":"Official Journal of the European Union 59 (May","author":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union 59 (May 2016 ). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union 59 (May 2016). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"}],"event":{"name":"MODELS '20: ACM\/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Canada","acronym":"MODELS '20"},"container-title":["Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417990.3420043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3417990.3420043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:15Z","timestamp":1750197675000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3417990.3420043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,16]]},"references-count":19,"alternative-id":["10.1145\/3417990.3420043","10.1145\/3417990"],"URL":"https:\/\/doi.org\/10.1145\/3417990.3420043","relation":{},"subject":[],"published":{"date-parts":[[2020,10,16]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}