{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T07:39:10Z","timestamp":1771054750251,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,14]]},"DOI":"10.1145\/3486622.3493914","type":"proceedings-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T01:18:53Z","timestamp":1649899133000},"page":"438-445","source":"Crossref","is-referenced-by-count":9,"title":["Self-Sovereign Identity and User Control for Privacy-Preserving Contact Tracing"],"prefix":"10.1145","author":[{"given":"Wenting","family":"Song","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, United States"}]},{"given":"Razieh","family":"Nokhbeh Zaeem","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"David","family":"Liau","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, United States"}]},{"given":"Kai Chih","family":"Chang","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, United States"}]},{"given":"Michael R.","family":"Lamison","sequence":"additional","affiliation":[{"name":"Verizon, United States"}]},{"given":"Manah M.","family":"Khalil","sequence":"additional","affiliation":[{"name":"Verizon, United States"}]},{"given":"K. Suzanne","family":"Barber","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Privacy-Preserving Contact Tracing - Apple and Google. https:\/\/covid19.apple.com\/contacttracing  [n.d.]. Privacy-Preserving Contact Tracing - Apple and Google. https:\/\/covid19.apple.com\/contacttracing"},{"key":"e_1_3_2_1_2_1","volume-title":"COVID-19 contact tracing and data protection can go together. JMIR mHealth and uHealth 8, 4","author":"Abeler Johannes","year":"2020","unstructured":"Johannes Abeler , Matthias B\u00e4cker , Ulf Buermeyer , and Hannah Zillessen . 2020. COVID-19 contact tracing and data protection can go together. JMIR mHealth and uHealth 8, 4 ( 2020 ), e19359. Johannes Abeler, Matthias B\u00e4cker, Ulf Buermeyer, and Hannah Zillessen. 2020. COVID-19 contact tracing and data protection can go together. JMIR mHealth and uHealth 8, 4 (2020), e19359."},{"key":"e_1_3_2_1_3_1","volume-title":"The path to self-sovereign identity. Life with Alacrity","author":"Allen Christopher","year":"2016","unstructured":"Christopher Allen . 2016. The path to self-sovereign identity. Life with Alacrity ( 2016 ). Christopher Allen. 2016. The path to self-sovereign identity. Life with Alacrity (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422886"},{"key":"e_1_3_2_1_5_1","volume-title":"A gentle introduction to self-sovereign identity. https:\/\/bitsonblocks.net\/2017\/05\/17\/gentle-introduction-self-sovereign-identity\/ Accessed","year":"2020","unstructured":"antonylewis2015. [n.d.]. A gentle introduction to self-sovereign identity. https:\/\/bitsonblocks.net\/2017\/05\/17\/gentle-introduction-self-sovereign-identity\/ Accessed : Nov 23, 2020 . antonylewis2015. [n.d.]. A gentle introduction to self-sovereign identity. https:\/\/bitsonblocks.net\/2017\/05\/17\/gentle-introduction-self-sovereign-identity\/ Accessed: Nov 23, 2020."},{"key":"e_1_3_2_1_6_1","volume-title":"Exposure Notifications Android. https:\/\/github.com\/google\/exposure-notifications-android Accessed","author":"Google Apple","year":"2021","unstructured":"Apple and Google . [n.d.]. Exposure Notifications Android. https:\/\/github.com\/google\/exposure-notifications-android Accessed : Nov 4, 2021 . Apple and Google. [n.d.]. Exposure Notifications Android. https:\/\/github.com\/google\/exposure-notifications-android Accessed: Nov 4, 2021."},{"key":"e_1_3_2_1_7_1","volume-title":"Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.IACR Cryptol. ePrint Arch. 2020","author":"Avitabile Gennaro","year":"2020","unstructured":"Gennaro Avitabile , Vincenzo Botta , Vincenzo Iovino , and Ivan Visconti . 2020. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.IACR Cryptol. ePrint Arch. 2020 ( 2020 ), 493. Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, and Ivan Visconti. 2020. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.IACR Cryptol. ePrint Arch. 2020 (2020), 493."},{"key":"e_1_3_2_1_10_1","volume-title":"Decentralized Contact Tracing Using a DHT and Blind Signatures.IACR Cryptol. ePrint Arch. 2020","author":"Brack Samuel","year":"2020","unstructured":"Samuel Brack , Leonie Reichert , and Bj\u00f6rn Scheuermann . 2020. Decentralized Contact Tracing Using a DHT and Blind Signatures.IACR Cryptol. ePrint Arch. 2020 ( 2020 ), 398. Samuel Brack, Leonie Reichert, and Bj\u00f6rn Scheuermann. 2020. Decentralized Contact Tracing Using a DHT and Blind Signatures.IACR Cryptol. ePrint Arch. 2020 (2020), 398."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2992341"},{"key":"e_1_3_2_1_12_1","volume-title":"Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv preprint arXiv:2004.03544(2020).","author":"Chan Justin","year":"2020","unstructured":"Justin Chan , Shyam Gollakota , Eric Horvitz , Joseph Jaeger , Sham Kakade , Tadayoshi Kohno , John Langford , Jonathan Larson , Sudheesh Singanamalla , Jacob Sunshine , 2020 . Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv preprint arXiv:2004.03544(2020). Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, 2020. Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv preprint arXiv:2004.03544(2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"Hyunghoon Cho Daphne Ippolito and Yun\u00a0William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511(2020).  Hyunghoon Cho Daphne Ippolito and Yun\u00a0William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511(2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423993"},{"key":"e_1_3_2_1_15_1","volume-title":"Jolocom: Self-sovereign and decentralised identity by design. White paper","author":"Fei Ch","year":"2018","unstructured":"Ch Fei , J Lohkamp , E Rusu , K Szawan , K Wagner , and N Wittenberg . 2018 . Jolocom: Self-sovereign and decentralised identity by design. White paper (2018). Ch Fei, J Lohkamp, E Rusu, K Szawan, K Wagner, and N Wittenberg. 2018. Jolocom: Self-sovereign and decentralised identity by design. White paper (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"e_1_3_2_1_17_1","volume-title":"Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368, 6491","author":"Ferretti Luca","year":"2020","unstructured":"Luca Ferretti , Chris Wymant , Michelle Kendall , Lele Zhao , Anel Nurtay , Lucie Abeler-D\u00f6rner , Michael Parker , David Bonsall , and Christophe Fraser . 2020. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368, 6491 ( 2020 ). Luca Ferretti, Chris Wymant, Michelle Kendall, Lele Zhao, Anel Nurtay, Lucie Abeler-D\u00f6rner, Michael Parker, David Bonsall, and Christophe Fraser. 2020. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing. Science 368, 6491 (2020)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Joel Hellewell Sam Abbott Amy Gimma Nikos\u00a0I Bosse Christopher\u00a0I Jarvis Timothy\u00a0W Russell James\u00a0D Munday Adam\u00a0J Kucharski W\u00a0John Edmunds Fiona Sun 2020. Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts. The Lancet Global Health(2020).  Joel Hellewell Sam Abbott Amy Gimma Nikos\u00a0I Bosse Christopher\u00a0I Jarvis Timothy\u00a0W Russell James\u00a0D Munday Adam\u00a0J Kucharski W\u00a0John Edmunds Fiona Sun 2020. Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts. The Lancet Global Health(2020).","DOI":"10.1101\/2020.02.08.20021162"},{"key":"e_1_3_2_1_19_1","volume-title":"Performance of digital contact tracing tools for COVID-19 response","author":"Huang Zhilian","year":"2020","unstructured":"Zhilian Huang , Huiling Guo , Yee-Mun Lee , Eu\u00a0Chin Ho , Hou Ang , and Angela Chow . 2020. Performance of digital contact tracing tools for COVID-19 response in Singapore : cross-sectional study. JMIR mHealth and uHealth 8, 10 ( 2020 ), e23148. Zhilian Huang, Huiling Guo, Yee-Mun Lee, Eu\u00a0Chin Ho, Hou Ang, and Angela Chow. 2020. Performance of digital contact tracing tools for COVID-19 response in Singapore: cross-sectional study. JMIR mHealth and uHealth 8, 10 (2020), e23148."},{"key":"e_1_3_2_1_20_1","first-page":"528","article-title":"Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.","volume":"2020","author":"Liu K","year":"2020","unstructured":"Joseph\u00a0 K Liu , Man\u00a0Ho Au , Tsz\u00a0Hon Yuen , Cong Zuo , Jiawei Wang , Amin Sakzad , Xiapu Luo , and Li Li . 2020 . Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020 (2020), 528 . Joseph\u00a0K Liu, Man\u00a0Ho Au, Tsz\u00a0Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. 2020. Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.IACR Cryptol. ePrint Arch. 2020 (2020), 528.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_21_1","volume-title":"Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf(2017).","author":"Lundkvist Christian","year":"2017","unstructured":"Christian Lundkvist , Rouven Heck , Joel Torstensson , Zac Mitton , and Michael Sena . 2017 . Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf(2017). Christian Lundkvist, Rouven Heck, Joel Torstensson, Zac Mitton, and Michael Sena. 2017. Uport: A platform for self-sovereign identity. URL: https:\/\/whitepaper.uport.me\/uPort_whitepaper_DRAFT20170221.pdf(2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto . 2019 . Bitcoin: A peer-to-peer electronic cash system (2008). Technical Report. Manubot . Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system (2008). Technical Report. Manubot."},{"key":"e_1_3_2_1_23_1","volume-title":"Information technology\u2013based tracing strategy in response to COVID-19 in South Korea\u2014privacy controversies. Jama","author":"Park Sangchul","year":"2020","unstructured":"Sangchul Park , Gina\u00a0Jeehyun Choi , and Haksoo Ko. 2020. Information technology\u2013based tracing strategy in response to COVID-19 in South Korea\u2014privacy controversies. Jama ( 2020 ). Sangchul Park, Gina\u00a0Jeehyun Choi, and Haksoo Ko. 2020. Information technology\u2013based tracing strategy in response to COVID-19 in South Korea\u2014privacy controversies. Jama (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3459237"},{"key":"e_1_3_2_1_25_1","unstructured":"Drummond Reed Jason Law and Daniel Hardman. 2016. The technical foundations of sovrin. The Technical Foundations of Sovrin(2016).  Drummond Reed Jason Law and Daniel Hardman. 2016. The technical foundations of sovrin. The Technical Foundations of Sovrin(2016)."},{"key":"e_1_3_2_1_26_1","volume-title":"Privacy-Preserving Contact Tracing of COVID-19 Patients.IACR Cryptol. ePrint Arch. 2020","author":"Reichert Leonie","year":"2020","unstructured":"Leonie Reichert , Samuel Brack , and Bj\u00f6rn Scheuermann . 2020. Privacy-Preserving Contact Tracing of COVID-19 Patients.IACR Cryptol. ePrint Arch. 2020 ( 2020 ), 375. Leonie Reichert, Samuel Brack, and Bj\u00f6rn Scheuermann. 2020. Privacy-Preserving Contact Tracing of COVID-19 Patients.IACR Cryptol. ePrint Arch. 2020 (2020), 375."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102178"},{"key":"e_1_3_2_1_28_1","unstructured":"Philipp Schmidt. 2016. Blockcerts\u2014An open infrastructure for academic credentials on the blockchain. MLLearning (24\/10\/2016)(2016).  Philipp Schmidt. 2016. Blockcerts\u2014An open infrastructure for academic credentials on the blockchain. MLLearning (24\/10\/2016)(2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"The inevitable rise of self-sovereign identity","author":"Tobin Andrew","year":"2016","unstructured":"Andrew Tobin and Drummond Reed . 2016. The inevitable rise of self-sovereign identity . The Sovrin Foundation 29, 2016 (2016). Andrew Tobin and Drummond Reed. 2016. The inevitable rise of self-sovereign identity. The Sovrin Foundation 29, 2016 (2016)."},{"key":"e_1_3_2_1_30_1","unstructured":"Hao Xu Lei Zhang Oluwakayode Onireti Yang Fang William\u00a0Bill Buchanan and Muhammad\u00a0Ali Imran. 2020. BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. arXiv preprint arXiv:2005.10103(2020).  Hao Xu Lei Zhang Oluwakayode Onireti Yang Fang William\u00a0Bill Buchanan and Muhammad\u00a0Ali Imran. 2020. BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. arXiv preprint arXiv:2005.10103(2020)."},{"key":"e_1_3_2_1_31_1","volume-title":"Peer-to-Peer contact tracing: development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4","author":"Yasaka M","year":"2020","unstructured":"Tyler\u00a0 M Yasaka , Brandon\u00a0 M Lehrich , and Ronald Sahyouni . 2020. Peer-to-Peer contact tracing: development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4 ( 2020 ), e18936. Tyler\u00a0M Yasaka, Brandon\u00a0M Lehrich, and Ronald Sahyouni. 2020. Peer-to-Peer contact tracing: development of a privacy-preserving smartphone app. JMIR mHealth and uHealth 8, 4 (2020), e18936."}],"event":{"name":"WI-IAT '21: IEEE\/WIC\/ACM International Conference on Web Intelligence","location":"ESSENDON VIC Australia","acronym":"WI-IAT '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493914","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486622.3493914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:06Z","timestamp":1750191126000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":29,"alternative-id":["10.1145\/3486622.3493914","10.1145\/3486622"],"URL":"https:\/\/doi.org\/10.1145\/3486622.3493914","relation":{},"subject":[],"published":{"date-parts":[[2021,12,14]]}}}