{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:14:24Z","timestamp":1743056064074,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417622"},{"type":"electronic","value":"9783319417639"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_13","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"187-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Technique for Enhanced Provision of Appropriate Access to Evidence Across Service Provision Chains"],"prefix":"10.1007","author":[{"given":"Isaac","family":"Agudo","sequence":"first","affiliation":[]},{"given":"Ali","family":"El Kaafarani","sequence":"additional","affiliation":[]},{"given":"David","family":"Nu\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Siani","family":"Pearson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-11599-3_1","volume-title":"Secure IT Systems","author":"S Pearson","year":"2014","unstructured":"Pearson, S.: Accountability in cloud service provision ecosystems. In: Bernsmed, K., Fischer-H\u00fcbner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 3\u201324. Springer, Heidelberg (2014)"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"13_CR3","unstructured":"Bellare, M., Yee, B.S.: Forward integrity for secure audit logs. Technical report (1997)"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36563-X_1","volume-title":"Topics in Cryptology - CT-RSA 2003","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Yee, B.S.: Forward-security in private-key cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 1\u201318. Springer, Heidelberg (2003)"},{"key":"13_CR5","unstructured":"Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th Conference on USENIX Security Symposium, SSYM 1998, Berkeley, CA, USA, vol. 7, p. 4. USENIX Association (1998)"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.: How to time-stamp a digital document. J. Cryptol. 3(2), 99\u2013111 (1991)","journal-title":"J. Cryptol."},{"key":"13_CR7","unstructured":"M\u00e9tayer, D.L., Mazza, E., Potet, M.L.: Designing log architectures for legal evidence. In: 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 156\u2013165, September 2010"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Butin, D., Chicote, M., Metayer, D.L.: Log design for accountability. In: 2013 IEEE Security and Privacy Workshops (SPW), pp. 1\u20137, May 2013","DOI":"10.1109\/SPW.2013.26"},{"key":"13_CR9","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/B978-155860869-6\/50021-4","volume-title":"VLDB '02: Proceedings of the 28th International Conference on Very Large Databases","author":"Rakesh Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB Endowment, pp. 143\u2013154 (2002)"},{"key":"13_CR10","unstructured":"O\u2019Hara, K.: Transparent government, not transparent citizens: a report on privacy and transparency for the cabinet office (2011)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Pulls, T., Peeters, R., Wouters, K.: Distributed privacy-preserving transparency logging. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES 2013, pp. 83\u201394. ACM, New York (2013)","DOI":"10.1145\/2517840.2517847"},{"key":"13_CR12","unstructured":"Pulls, T., Martucci, L.: D: D-5.2 User-centric transparency tools. In: A4Cloud (2014)"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s12394-009-0023-5","volume":"2","author":"J Camenisch","year":"2009","unstructured":"Camenisch, J., Gro\u00df, T., Heydt-Benjamin, T.: Accountable privacy supporting services. Identity Inf. Soc. 2(3), 241\u2013267 (2009)","journal-title":"Identity Inf. Soc."},{"key":"13_CR14","volume-title":"Privacy-Respecting Intrusion Detection","author":"U Flegel","year":"2007","unstructured":"Flegel, U.: Privacy-Respecting Intrusion Detection, vol. 35. Springer Science & Business Media, New York (2007)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/11599371_22","volume-title":"Cryptology and Network Security","author":"L \u00d8verlier","year":"2005","unstructured":"\u00d8verlier, L., Brekne, T., \u00c5rnes, A.: Non-expanding transaction specific pseudonymization for IP traffic monitoring. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 261\u2013273. Springer, Heidelberg (2005)"},{"key":"13_CR16","unstructured":"Flegel, U.: Evaluating the design of an audit data pseudonymizer using basic building blocks for anonymity. In: Proceedings of SSZ, no. P-62 in Lecture Notes in Informatics, pp. 221\u2013232. GI SIGs SIDAR and PET (2005)"},{"key":"13_CR17","unstructured":"WP7: D 7.12: Behavioural biometric profiling and transparency enhancing tools. In: FIDIS (2009)"},{"key":"13_CR18","unstructured":"WP4.2: D 4.2.2 - end user transparency tools: UI prototypes. PrimeLife (2010)"},{"key":"13_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-14282-6_25","volume-title":"Privacy and Identity Management for Life","author":"H Hedbom","year":"2010","unstructured":"Hedbom, H., Pulls, T., Hj\u00e4rtquist, P., Lav\u00e9n, A.: Adding secure transparency logging to the PRIME core. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) IFIP AICT 320. IFIP AICT, vol. 320, pp. 299\u2013314. Springer, Heidelberg (2010)"},{"key":"13_CR20","unstructured":"R\u00fcbsamen, T., Reich, C., Taherimonfared, A., Wlodarczyk, T., Rong, C.: Evidence for accountable cloud computing services. In: Pre-Proceedings of International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC), p. 1. Citeseer (2013)"},{"key":"13_CR21","unstructured":"Nicolett, M., Kavanagh, K.M.: Critical capabilities for security information and event management technology. Gartner report (2011)"},{"key":"13_CR22","unstructured":"Agrawal, B., Molland, H., Gulzar, H., R\u00fcbsamen, T., Reich, C., Azraoui, M., Onen, M., Pulls, T., Royer, J.C.: D: C-8.1 framework of evidence. In: A4Cloud (2014)"},{"key":"13_CR23","volume-title":"Cryptography: An Introduction","author":"NP Smart","year":"2003","unstructured":"Smart, N.P.: Cryptography: An Introduction, vol. 5. McGraw-Hill, New York (2003)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"B Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53\u201370. Springer, Heidelberg (2011)"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-28914-9_24","volume-title":"Theory of Cryptography","author":"B Parno","year":"2012","unstructured":"Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422\u2013439. Springer, Heidelberg (2012)"},{"key":"13_CR27","unstructured":"Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. Cryptology ePrint Archive, Report 2012\/437 (2012). \n http:\/\/eprint.iacr.org\/"},{"issue":"1","key":"13_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1\u201330 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 185\u2013194. ACM (2007)","DOI":"10.1145\/1315245.1315269"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Weng, J., Deng, R.H., Ding, X., Chu, C.K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, pp. 322\u2013332. ACM (2009)","DOI":"10.1145\/1533057.1533100"},{"key":"13_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-04474-8_13","volume-title":"Information Security","author":"J Weng","year":"2009","unstructured":"Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151\u2013166. Springer, Heidelberg (2009)"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-45539-6_22","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"R Cramer","year":"2000","unstructured":"Cramer, R., Damg\u00e5rd, I.B., Maurer, U.M.: General secure multi-party computation from any linear secret-sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 316\u2013334. Springer, Heidelberg (2000)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:11:41Z","timestamp":1595203901000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}