{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:03Z","timestamp":1750309323511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3636061","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"687-694","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Self-Sovereign Identity to Fiduciary Identity: A Journey Towards Greater User Privacy and Usability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4492-163X","authenticated-orcid":false,"given":"Frederico","family":"Schardong","sequence":"first","affiliation":[{"name":"Instituto Federal do Rio Grande do Sul, Rolante, Brazil"},{"name":"Universidade Federal de Santa Catarina, Florian\u00f3polis, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-5694","authenticated-orcid":false,"given":"Ricardo","family":"Custodio","sequence":"additional","affiliation":[{"name":"Universidade Federal de Santa Catarina, Florian\u00f3polis, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The path to self-sovereign identity. Available online: http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html (accessed on","author":"Allen Christopher","year":"2023","unstructured":"Christopher Allen. 2016. The path to self-sovereign identity. Available online: http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html (accessed on 04 June 2023)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-019-09499-x"},{"key":"e_1_3_2_1_3_1","first-page":"1183","article-title":"Information fiduciaries and the first amendment","volume":"49","author":"Balkin Jack M","year":"2015","unstructured":"Jack M Balkin. 2015. Information fiduciaries and the first amendment. U.C. Davis Law Review 49 (2015), 1183.","journal-title":"U.C. Davis Law Review"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"e_1_3_2_1_5_1","volume-title":"Beyond metaphor: An analysis of fiduciary obligation. Duke Law Journal","author":"DeMott Deborah A","year":"1988","unstructured":"Deborah A DeMott. 1988. Beyond metaphor: An analysis of fiduciary obligation. Duke Law Journal (1988), 879."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Dick Hardt. 2012. The OAuth 2.0 Authorization Framework. 10.17487\/RFC6749","DOI":"10.17487\/RFC6749"},{"key":"e_1_3_2_1_7_1","volume-title":"Security Assertion Markup Language (SAML) V2.0 Technical Overview. Available online: https:\/\/www.oasis-open.org\/committees\/download.php\/14361\/sstc-saml-tech-overview-2.0-draft-08.pdf (accessed on","author":"Hughes John","year":"2023","unstructured":"John Hughes and Eve Maler. 2005. Security Assertion Markup Language (SAML) V2.0 Technical Overview. Available online: https:\/\/www.oasis-open.org\/committees\/download.php\/14361\/sstc-saml-tech-overview-2.0-draft-08.pdf (accessed on 04 June 2023)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2013.860579"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2926471"},{"key":"e_1_3_2_1_11_1","volume-title":"SIMS: Self-Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptology ePrint Archive 2019\/1241","author":"Lee Jeonghyuk","year":"2019","unstructured":"Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, and Jihye Kim. 2019. SIMS: Self-Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptology ePrint Archive 2019\/1241 (2019)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"e_1_3_2_1_14_1","first-page":"921","article-title":"Fiduciary Law's Holy Grail: Reconciling Theory and Practice in Fiduciary Jurisprudence","volume":"91","author":"Rotman Leonard I","year":"2011","unstructured":"Leonard I Rotman. 2011. Fiduciary Law's Holy Grail: Reconciling Theory and Practice in Fiduciary Jurisprudence. Boston University Law Review 91 (2011), 921.","journal-title":"Boston University Law Review"},{"key":"e_1_3_2_1_15_1","volume-title":"Guide to Enterprise Password Management. Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-118\/archive\/2009-04-21 (accessed on","author":"Scarfone Karen","year":"2023","unstructured":"Karen Scarfone and Murugiah Souppaya. 2009. Guide to Enterprise Password Management. Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-118\/archive\/2009-04-21 (accessed on 04 June 2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5220\/0007772903250332"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22155641"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/321160.321170"},{"key":"e_1_3_2_1_20_1","volume-title":"Verifiable Credentials Data Model 1.0. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/ (accessed on","author":"Sporny Manu","year":"2023","unstructured":"Manu Sporny, Dave Longley, and David Chadwick. 2017. Verifiable Credentials Data Model 1.0. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/ (accessed on 04 June 2023)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.27"},{"key":"e_1_3_2_1_22_1","unstructured":"D\u00e9bora Pandolfi \u00c1lves. 2007. Equival\u00eancia de M\u00e1quinas Universais: Demonstra\u00e7\u00e3o An\u00e1lise e Simula\u00e7\u00e3o."}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:00Z","timestamp":1750291440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":21,"alternative-id":["10.1145\/3605098.3636061","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3636061","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}