{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:04:03Z","timestamp":1752667443533,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T00:00:00Z","timestamp":1554249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,3]]},"DOI":"10.1145\/3326365.3326411","type":"proceedings-article","created":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T12:58:31Z","timestamp":1558357111000},"page":"348-353","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Security and Trustworthiness in Online Public Services"],"prefix":"10.1145","author":[{"given":"Jo\u00e3o Marco C.","family":"Silva","sequence":"first","affiliation":[{"name":"INESC TEC &amp; University of Minho, Portugal"}]},{"given":"V\u00edtor","family":"Fonte","sequence":"additional","affiliation":[{"name":"United Nations University (UNU-EGOV) &amp; University of Minho, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2019,4,3]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"Official Journal of the European Union L119 (may","author":"2016. Regulation (EU) 2016\/679of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Da.","year":"2016","unstructured":"2016. Regulation (EU) 2016\/679of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Da. Official Journal of the European Union L119 (may 2016 ), 1--88. 2016. Regulation (EU) 2016\/679of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Da. Official Journal of the European Union L119 (may 2016), 1--88."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987462"},{"key":"e_1_3_2_1_5_1","unstructured":"Michael E. Whitman and Herbert J. Mattord.2011. Principles of information security. Cengage Learning.   Michael E. Whitman and Herbert J. Mattord.2011. Principles of information security. Cengage Learning."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504755"},{"key":"e_1_3_2_1_12_1","volume-title":"Computer Networks","author":"Tanenbaum Andrew S","unstructured":"Andrew S Tanenbaum and David J Wetherall . 2010. Computer Networks ( 5 th ed.). Prentice Hall Press , Upper Saddle River, NJ, USA. Andrew S Tanenbaum and David J Wetherall. 2010. Computer Networks (5th ed.). Prentice Hall Press, Upper Saddle River, NJ, USA.","edition":"5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1200305"},{"key":"e_1_3_2_1_14_1","volume-title":"Common Vulnerability Scoring System v3.0: Specification Document. First. org","author":"Team C S","year":"2015","unstructured":"C S Team . 2015. Common Vulnerability Scoring System v3.0: Specification Document. First. org ( 2015 ). C S Team. 2015. Common Vulnerability Scoring System v3.0: Specification Document. First. org (2015)."},{"volume-title":"Published by FIRST-Forum of Incident Response and Security Teams","author":"Mell Peter","key":"e_1_3_2_1_15_1","unstructured":"Peter Mell , Karen Scarfone , and Sasha Romanosky . 2007. A complete guide to the common vulnerability scoring system version 2.0 . In Published by FIRST-Forum of Incident Response and Security Teams , Vol. 1 . 23. Peter Mell, Karen Scarfone, and Sasha Romanosky. 2007. A complete guide to the common vulnerability scoring system version 2.0. In Published by FIRST-Forum of Incident Response and Security Teams, Vol. 1. 23."},{"key":"e_1_3_2_1_16_1","volume-title":"Improved Generalized Birthday Attack. IACR Cryptology ePrint Archive 2011","author":"Kirchner Paul","year":"2011","unstructured":"Paul Kirchner . 2011. Improved Generalized Birthday Attack. IACR Cryptology ePrint Archive 2011 ( 2011 ), 377. Paul Kirchner. 2011. Improved Generalized Birthday Attack. IACR Cryptology ePrint Archive 2011 (2011), 377."}],"event":{"name":"ICEGOV2019: 12th International Conference on Theory and Practice of Electronic Governance","acronym":"ICEGOV2019","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326365.3326411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3326365.3326411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:18Z","timestamp":1750204398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3326365.3326411"}},"subtitle":["An Assessment of Portuguese Institutions"],"short-title":[],"issued":{"date-parts":[[2019,4,3]]},"references-count":9,"alternative-id":["10.1145\/3326365.3326411","10.1145\/3326365"],"URL":"https:\/\/doi.org\/10.1145\/3326365.3326411","relation":{},"subject":[],"published":{"date-parts":[[2019,4,3]]},"assertion":[{"value":"2019-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}