{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:50:21Z","timestamp":1756000221463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"HEIR Project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635904","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"112-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Disjunctive Multi-Level Digital Forgetting Scheme"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1621-3890","authenticated-orcid":false,"given":"Marwan Adnan","family":"Darwish","sequence":"first","affiliation":[{"name":"Delft University of Technology (TU Delft), Delft, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4127-3617","authenticated-orcid":false,"given":"Georgios","family":"Smaragdakis","sequence":"additional","affiliation":[{"name":"Delft University of Technology (TU Delft), Delft, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806936"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535814"},{"key":"e_1_3_2_1_3_1","unstructured":"The Chain Bulletin. 2019. The Chain Bulletin. https:\/\/chainbulletin.com\/proof-of-work-explained-in-simple-terms."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"e_1_3_2_1_5_1","volume-title":"The Design of Rijndael: The Advanced Encryption Standard (AES)","author":"Daemen Joan","unstructured":"Joan Daemen. 2020. The Design of Rijndael: The Advanced Encryption Standard (AES). Springer; 2nd edition, USA.","edition":"2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555776.3577641"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14445\/22315373\/IJMTT-V34P514"},{"volume-title":"June 29","year":"2023","key":"e_1_3_2_1_8_1","unstructured":"Datasnaek. Accessed: June 29, 2023. YouTube Trending Video Statistics Dataset. https:\/\/www.kaggle.com\/datasets\/datasnaek\/youtube-new"},{"key":"e_1_3_2_1_9_1","volume-title":"Vanish: Increasing Data Privacy with Self-Destructing Data. In USENIX Security","author":"Geambasu Roxana","year":"2009","unstructured":"Roxana Geambasu, Tadayoshi Kohno, Amit A Levy, and Henry M Levy. 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. In USENIX Security, Vol. 316. USENIX, USA, 299--350."},{"key":"e_1_3_2_1_10_1","volume-title":"DPL: A Language for GDPR Enforcement. In 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE, IEEE, Haifa, 112--129","author":"Karami Farzane","year":"2022","unstructured":"Farzane Karami, David Basin, and Einar Broch Johnsen. 2022. DPL: A Language for GDPR Enforcement. In 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE, IEEE, Haifa, 112--129."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400838455"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Paul V Mockapetris. 1987. RFC1035: Domain Names-Implementation and Specification.","DOI":"10.17487\/rfc1035"},{"key":"e_1_3_2_1_13_1","unstructured":"Radia Perlman. 2005. The ephemerizer: Making data disappear."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381976"},{"key":"e_1_3_2_1_16_1","unstructured":"David Reinsel John Gantz and John Rydning. 2018. The Digitization of the World From Edge to Core. https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0013"},{"key":"e_1_3_2_1_19_1","first-page":"5","article-title":"User perception and expectations on deleting instant messages---or---","volume":"4","author":"Schnitzler Theodor","year":"2018","unstructured":"Theodor Schnitzler, Christine Utz, Florian M Farke, Christina P\u00f6pper, and Markus D\u00fcrmuth. 2018. User perception and expectations on deleting instant messages---or---\"what happens if i press this button?\". (GDPR) 4 (2018), 5.","journal-title":"\". (GDPR)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500468.2500474"},{"key":"e_1_3_2_1_21_1","volume-title":"OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. In International Conference on Information Security. Springer","author":"Shen Yanjun","year":"2022","unstructured":"Yanjun Shen, Bin Yu, Shangqi Lai, Xingliang Yuan, Shi-Feng Sun, Joseph K Liu, and Surya Nepal. 2022. OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control. In International Conference on Information Security. Springer, Springer, Switzerland, 269--289."},{"key":"e_1_3_2_1_22_1","volume-title":"Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM computer communication review 31, 4","author":"Stoica Ion","year":"2001","unstructured":"Ion Stoica, Robert Morris, David Karger, M Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM computer communication review 31, 4 (2001), 149--160."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.10.005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.10.017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103629"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym14122656"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857714"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635904","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:14Z","timestamp":1750178174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":27,"alternative-id":["10.1145\/3605098.3635904","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635904","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}