{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:45:30Z","timestamp":1725407130309},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/cisti.2018.8399301","type":"proceedings-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T22:29:31Z","timestamp":1530224971000},"page":"1-4","source":"Crossref","is-referenced-by-count":1,"title":["A propose for a federated ledger for regulated self-sovereignty"],"prefix":"10.23919","author":[{"given":"Pedro","family":"Coelho","sequence":"first","affiliation":[]},{"given":"Andre","family":"Zuquete","sequence":"additional","affiliation":[]},{"given":"Helder","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Blockchain Blueprint for a New Economy","year":"2015","author":"swan","key":"ref4"},{"journal-title":"The Inevitable Rise of Self-Sovereign Identity","year":"2017","author":"tobin","key":"ref3"},{"year":"0","author":"wuillem","key":"ref10"},{"journal-title":"Credentials Community Group","year":"0","author":"reed","key":"ref6"},{"journal-title":"ID 2020 Design Workshop","year":"0","key":"ref11"},{"journal-title":"The Sovrin Foundation","article-title":"SovrinTM: A Protocol and Token for Self- Sovereign Identity and Decentralized Trust","year":"2018","key":"ref5"},{"key":"ref8","article-title":"Towards Self-Sovereign Identity using Blockchain Technology","author":"baars","year":"2016","journal-title":"University of Twente"},{"journal-title":"Hypercerts A Non-Siloed Blockchain-Based Certification Service","year":"2017","author":"santos","key":"ref7"},{"key":"ref2","first-page":"189","article-title":"Credential Design in Attribute-Based Identity Management","author":"alp\u00e1r","year":"2013","journal-title":"Bridg distances Technol Regul"},{"journal-title":"Uport a Platform for Self-Sovereign Identity","year":"2017","author":"lundkvist","key":"ref9"},{"journal-title":"International Organization for Standardization","article-title":"Information technology - security techniques - a framework for identity management - part 1: Terminology and concepts","year":"2011","key":"ref1"}],"event":{"name":"2018 13th Iberian Conference on Information Systems and Technologies (CISTI)","start":{"date-parts":[[2018,6,13]]},"location":"Caceres","end":{"date-parts":[[2018,6,16]]}},"container-title":["2018 13th Iberian Conference on Information Systems and Technologies (CISTI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8390719\/8398632\/08399301.pdf?arnumber=8399301","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T22:36:01Z","timestamp":1531780561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8399301\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.23919\/cisti.2018.8399301","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}