{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:46:25Z","timestamp":1775263585942,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"H2020-MSCA-ITN-2019 CLARIFY","award":["860627"],"award-info":[{"award-number":["860627"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3463274.3463352","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T23:43:11Z","timestamp":1624059791000},"page":"329-335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities"],"prefix":"10.1145","author":[{"given":"Jiahui","family":"Geng","sequence":"first","affiliation":[{"name":"University of Stavanger, Norway"}]},{"given":"Neel","family":"Kanwal","sequence":"additional","affiliation":[{"name":"University of Stavanger, Norway"}]},{"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[{"name":"University of Stavanger, Norway"}]},{"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[{"name":"University of Stavanger, Norway"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Decentralized Identity: Where Did It Come From and Where Is It Going?IEEE Communications Standards Magazine 3, 4","author":"Avellaneda Oscar","year":"2019","unstructured":"Oscar Avellaneda , Alan Bachmann , Abbie Barbir , Joni Brenan , Pamela Dingle , Kim\u00a0Hamilton Duffy , Eve Maler , Drummond Reed , and Manu Sporny . 2019 . Decentralized Identity: Where Did It Come From and Where Is It Going?IEEE Communications Standards Magazine 3, 4 (2019), 10\u201313. Oscar Avellaneda, Alan Bachmann, Abbie Barbir, Joni Brenan, Pamela Dingle, Kim\u00a0Hamilton Duffy, Eve Maler, Drummond Reed, and Manu Sporny. 2019. Decentralized Identity: Where Did It Come From and Where Is It Going?IEEE Communications Standards Magazine 3, 4 (2019), 10\u201313."},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2020 . How to backdoor federated learning . In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948 . Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. PMLR, 2938\u20132948."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20020483"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"e_1_3_2_1_5_1","volume-title":"Blockchain enabled applications","author":"Dhillon Vikram","unstructured":"Vikram Dhillon , David Metcalf , and Max Hooper . 2017. The hyperledger project . In Blockchain enabled applications . Springer , 139\u2013149. Vikram Dhillon, David Metcalf, and Max Hooper. 2017. The hyperledger project. In Blockchain enabled applications. Springer, 139\u2013149."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384943.3409436"},{"key":"e_1_3_2_1_7_1","unstructured":"Clement Fung Chris\u00a0JM Yoon and Ivan Beschastnikh. 2018. Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866(2018).  Clement Fung Chris\u00a0JM Yoon and Ivan Beschastnikh. 2018. Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866(2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19102386"},{"key":"e_1_3_2_1_9_1","unstructured":"Robin\u00a0C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557(2017).  Robin\u00a0C Geyer Tassilo Klein and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557(2017)."},{"key":"e_1_3_2_1_10_1","unstructured":"WA Group 2020. Federated learning white paper v1. 0.  WA Group 2020. Federated learning white paper v1. 0."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Advanced Information Networking and Applications. Springer, Cham, 200\u2013213","author":"Gr\u00fcner Andreas","year":"2019","unstructured":"Andreas Gr\u00fcner , Alexander M\u00fchle , Tatiana Gayvoronskaya , and Christoph Meinel . 2019 . A comparative analysis of trust requirements in decentralized identity management . In International Conference on Advanced Information Networking and Applications. Springer, Cham, 200\u2013213 . Andreas Gr\u00fcner, Alexander M\u00fchle, Tatiana Gayvoronskaya, and Christoph Meinel. 2019. A comparative analysis of trust requirements in decentralized identity management. In International Conference on Advanced Information Networking and Applications. Springer, Cham, 200\u2013213."},{"key":"e_1_3_2_1_12_1","unstructured":"Stephen Hardy Wilko Henecka Hamish Ivey-Law Richard Nock Giorgio Patrini Guillaume Smith and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677(2017).  Stephen Hardy Wilko Henecka Hamish Ivey-Law Richard Nock Giorgio Patrini Guillaume Smith and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677(2017)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00057"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_15_1","volume-title":"Blockchain for identity management","author":"Jacobovitz Ori","year":"2016","unstructured":"Ori Jacobovitz . 2016. Blockchain for identity management . The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University , Beer Sheva ( 2016 ). Ori Jacobovitz. 2016. Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT45670.2019.8944855"},{"key":"e_1_3_2_1_17_1","volume-title":"Federated Optimization: Distributed Optimization Beyond the Datacenter. In NIPS Optimization for Machine Learning Workshop. 5. http:\/\/arxiv.org\/abs\/1511","author":"Konecn\u00fd Jakub","year":"2015","unstructured":"Jakub Konecn\u00fd , Brendan McMahan , and Daniel Ramage . 2015 . Federated Optimization: Distributed Optimization Beyond the Datacenter. In NIPS Optimization for Machine Learning Workshop. 5. http:\/\/arxiv.org\/abs\/1511 .03575 Jakub Konecn\u00fd, Brendan McMahan, and Daniel Ramage. 2015. Federated Optimization: Distributed Optimization Beyond the Datacenter. In NIPS Optimization for Machine Learning Workshop. 5. http:\/\/arxiv.org\/abs\/1511.03575"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426745.3431337"},{"key":"e_1_3_2_1_19_1","unstructured":"Suyi Li Yong Cheng Wei Wang Yang Liu and Tianjian Chen. 2020. Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211(2020).  Suyi Li Yong Cheng Wei Wang Yang Liu and Tianjian Chen. 2020. Learning to detect malicious clients for robust federated learning. arXiv preprint arXiv:2002.00211(2020)."},{"key":"e_1_3_2_1_20_1","unstructured":"Xiang Li Kaixuan Huang Wenhao Yang Shusen Wang and Zhihua Zhang. 2019. On the convergence of fedavg on non-iid data. arXiv preprint arXiv:1907.02189(2019).  Xiang Li Kaixuan Huang Wenhao Yang Shusen Wang and Zhihua Zhang. 2019. On the convergence of fedavg on non-iid data. arXiv preprint arXiv:1907.02189(2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"Luis Paulo\u00a0Barbour Scott, Vin\u00edcius\u00a0Gon\u00e7alves Maltarollo, and Kathia\u00a0Maria Honorio.","author":"Lima Angelica\u00a0Nakagawa","year":"2016","unstructured":"Angelica\u00a0Nakagawa Lima , Eric\u00a0Allison Philot , Gustavo Henrique\u00a0Goulart Trossini , Luis Paulo\u00a0Barbour Scott, Vin\u00edcius\u00a0Gon\u00e7alves Maltarollo, and Kathia\u00a0Maria Honorio. 2016 . Use of machine learning approaches for novel drug discovery. Expert opinion on drug discovery 11, 3 (2016), 225\u2013239. Angelica\u00a0Nakagawa Lima, Eric\u00a0Allison Philot, Gustavo Henrique\u00a0Goulart Trossini, Luis Paulo\u00a0Barbour Scott, Vin\u00edcius\u00a0Gon\u00e7alves Maltarollo, and Kathia\u00a0Maria Honorio. 2016. Use of machine learning approaches for novel drug discovery. Expert opinion on drug discovery 11, 3 (2016), 225\u2013239."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169411"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_3_2_1_24_1","unstructured":"Lingjuan Lyu Han Yu and Qiang Yang. 2020. Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133(2020).  Lingjuan Lyu Han Yu and Qiang Yang. 2020. Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133(2020)."},{"key":"e_1_3_2_1_25_1","volume-title":"Sybil-Resistance, and Accountability.","author":"Maram Deepak","year":"2020","unstructured":"Deepak Maram , Harjasleen Malvai , Fan Zhang , Nerla Jean-Louis , Alexander Frolov , Tyler Kell , Tyrone Lobban , Christine Moy , Ari Juels , and Andrew Miller . 2020. CanDID: Can-Do Decentralized Identity with Legacy Compatibility , Sybil-Resistance, and Accountability. ( 2020 ). Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, and Andrew Miller. 2020. CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. (2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2983007"},{"key":"e_1_3_2_1_27_1","volume-title":"A peer-to-peer electronic cash system. Bitcoin.\u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf 4","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto and A Bitcoin . 2008. A peer-to-peer electronic cash system. Bitcoin.\u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf 4 ( 2008 ). Satoshi Nakamoto and A Bitcoin. 2008. A peer-to-peer electronic cash system. Bitcoin.\u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf 4 (2008)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428757.3429152"},{"key":"e_1_3_2_1_29_1","volume-title":"TensorFlow: biology\u2019s gateway to deep learning?Cell systems 2, 1","author":"Rampasek Ladislav","year":"2016","unstructured":"Ladislav Rampasek and Anna Goldenberg . 2016. TensorFlow: biology\u2019s gateway to deep learning?Cell systems 2, 1 ( 2016 ), 12\u201314. Ladislav Rampasek and Anna Goldenberg. 2016. TensorFlow: biology\u2019s gateway to deep learning?Cell systems 2, 1 (2016), 12\u201314."},{"key":"e_1_3_2_1_30_1","volume-title":"Rebooting the Web of Trust II: ID2020 Design Workshop.","author":"Reed Drummond","year":"2016","unstructured":"Drummond Reed , Les Chasen , and Respect Network . 2016 . Requirements for DIDs (Decentralized Identifiers) . In Rebooting the Web of Trust II: ID2020 Design Workshop. Drummond Reed, Les Chasen, and Respect Network. 2016. Requirements for DIDs (Decentralized Identifiers). In Rebooting the Web of Trust II: ID2020 Design Workshop."},{"key":"e_1_3_2_1_31_1","volume-title":"Decentralized access control with anonymous authentication of data stored in clouds","author":"Ruj Sushmita","year":"2013","unstructured":"Sushmita Ruj , Milos Stojmenovic , and Amiya Nayak . 2013. Decentralized access control with anonymous authentication of data stored in clouds . IEEE transactions on parallel and distributed systems 25, 2 ( 2013 ), 384\u2013394. Sushmita Ruj, Milos Stojmenovic, and Amiya Nayak. 2013. Decentralized access control with anonymous authentication of data stored in clouds. IEEE transactions on parallel and distributed systems 25, 2 (2013), 384\u2013394."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174426"},{"key":"e_1_3_2_1_33_1","unstructured":"Ziteng Sun Peter Kairouz Ananda\u00a0Theertha Suresh and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963(2019).  Ziteng Sun Peter Kairouz Ananda\u00a0Theertha Suresh and H\u00a0Brendan McMahan. 2019. Can you really backdoor federated learning?arXiv preprint arXiv:1911.07963(2019)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"e_1_3_2_1_35_1","volume-title":"Addressing the Challenges Facing Decentralized Iden-tity Systems. EDITORIAL\u2013From the Faculty Editor","author":"Volkov Andrei","year":"2020","unstructured":"Andrei Volkov . 2020. Addressing the Challenges Facing Decentralized Iden-tity Systems. EDITORIAL\u2013From the Faculty Editor ( 2020 ), 10. Andrei Volkov. 2020. Addressing the Challenges Facing Decentralized Iden-tity Systems. EDITORIAL\u2013From the Faculty Editor(2020), 10."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_38_1","volume-title":"ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER.","author":"Wood D.","year":"2014","unstructured":"D. Wood . 2014 . ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER. D. Wood. 2014. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"e_1_3_2_1_40_1","volume-title":"International Conference on Learning Representations.","author":"Xie Chulin","year":"2019","unstructured":"Chulin Xie , Keli Huang , Pin-Yu Chen , and Bo Li . 2019 . Dba: Distributed backdoor attacks against federated learning . In International Conference on Learning Representations. Chulin Xie, Keli Huang, Pin-Yu Chen, and Bo Li. 2019. Dba: Distributed backdoor attacks against federated learning. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00960ED2V01Y201910AIM043"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.2"},{"key":"e_1_3_2_1_44_1","volume-title":"Advances in Computer Science and its Applications","author":"Yin Zhimin","unstructured":"Zhimin Yin , Xiangzhan Yu , and Hongli Zhang . 2014. Commodity recommendation algorithm based on social network . In Advances in Computer Science and its Applications . Springer , 27\u201333. Zhimin Yin, Xiangzhan Yu, and Hongli Zhang. 2014. Commodity recommendation algorithm based on social network. In Advances in Computer Science and its Applications. Springer, 27\u201333."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32388-2_46"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"}],"event":{"name":"EASE 2021: Evaluation and Assessment in Software Engineering","location":"Trondheim Norway","acronym":"EASE 2021"},"container-title":["Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463274.3463352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463274.3463352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:27Z","timestamp":1750195887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463274.3463352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":46,"alternative-id":["10.1145\/3463274.3463352","10.1145\/3463274"],"URL":"https:\/\/doi.org\/10.1145\/3463274.3463352","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}