{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:51Z","timestamp":1750309611526,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009112","name":"Istituto Nazionale di Alta Matematica Francesco Severi\"\"","doi-asserted-by":"publisher","award":["E53C23001670001"],"award-info":[{"award-number":["E53C23001670001"]}],"id":[{"id":"10.13039\/100009112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021856","name":"Ministero dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}],"id":[{"id":"10.13039\/501100021856","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707964","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"389-390","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Controlling VC disclosure with Terms of Use and ABAC in SSI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7411-9678","authenticated-orcid":false,"given":"Stefano","family":"Bistarelli","sequence":"first","affiliation":[{"name":"University of Perugia, Perugia, PG, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6846-0922","authenticated-orcid":false,"given":"Chiara","family":"Luchini","sequence":"additional","affiliation":[{"name":"University of Perugia, Perugia, PG, Italy"},{"name":"University of Firenze, Firenze, FI, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3935-4696","authenticated-orcid":false,"given":"Francesco","family":"Santini","sequence":"additional","affiliation":[{"name":"University of Perugia, Perugia, PG, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SSIBAC: Self-Sovereign Identity Based Access Control. In TrustCom","author":"Belchior Rafael","year":"2020","unstructured":"Rafael Belchior, Benedikt Putz, G\u00fcnther Pernul, Miguel Correia, Andr\u00e9 Vasconcelos, and S\u00e9rgio Guerreiro. 2020. SSIBAC: Self-Sovereign Identity Based Access Control. In TrustCom. IEEE, 1935\u20131943."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of the Sixth Distributed Ledger Technology Workshop (DLT","author":"Bistarelli Stefano","year":"2024","unstructured":"Stefano Bistarelli, Chiara Luchini, and Francesco Santini. 2024. Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control. In Proc. of the Sixth Distributed Ledger Technology Workshop (DLT 2024). CEUR-WS."},{"volume-title":"Technical Report","author":"Buchner Daniel","key":"e_1_3_2_1_3_1","unstructured":"Daniel Buchner, Martin Riedel, Brent Zundel, and Kim Hamilton Duffy. 2024. Presentation Exchange 2.0.0. Technical Report. Decentralized Identity Foundation (DIF). https:\/\/identity.foundation\/presentation-exchange\/spec\/v2.0.0\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Identity Theft Resource Center. 2024. 2023 Data Breach Report. https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2024\/01\/ITRC_2023-Annual-Data-Breach-Report.pdf."},{"key":"e_1_3_2_1_5_1","unstructured":"European Blockchain Services Infrastructure (EBSI). 2024. Trust Model. https:\/\/ec.europa.eu\/digital-building-blocks\/sites\/display\/EBSI."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_9_1","unstructured":"Credential Identity and Access Management (ICAM) working group. 2023. Identity Credentials and Access Management. http:\/\/tiny.cc\/gkbpzz."},{"key":"e_1_3_2_1_10_1","volume-title":"Open Identity Summit","author":"Johnson Jeyakumar Isaac H","year":"2022","unstructured":"Isaac H Johnson Jeyakumar, David W Chadwick, and Michael Kubach. 2022. A novel approach to establish trust in verifiable credential issuers in Self-sovereign identity ecosystems using TRAIN. In Open Identity Summit 2022. Gesellschaft f\u00fcr Informatik eV, 27\u201338."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"103577","DOI":"10.1016\/j.jnca.2022.103577","article-title":"Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge","volume":"212","author":"Francesco Maesa Damiano Di","year":"2023","unstructured":"Damiano Di Francesco Maesa, Andrea Lisi, Paolo Mori, Laura Ricci, and Gianluca Boschi. 2023. Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge. J. Netw. Comput. Appl. 212 (2023), 103577.","journal-title":"J. Netw. Comput. Appl."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"e_1_3_2_1_14_1","unstructured":"Verizon. 2024. 2024 Data Breach Investigations Report. https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:37Z","timestamp":1750298257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":11,"alternative-id":["10.1145\/3672608.3707964","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707964","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}