{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:55:29Z","timestamp":1728176129596},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T00:00:00Z","timestamp":1528761600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Microsoft Research through its Ph.D. Scholarship Programme"},{"name":"German Federal Ministry of Education and Research"},{"name":"European Research Council Synergy Grant imPACT","award":["n. 610150"]},{"name":"Research Council KU Leuven","award":["C16\/15\/058"]},{"name":"European Commission project","award":["H2020-DS-2014-653497 PANORAMIX"]},{"name":"KU Leuven BOF","award":["OT\/13\/070"]},{"name":"Center for IT-Security, Privacy and Accountability","award":["FKZ: 16KIS0345"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"