Changes
On July 23, 2021 at 10:15:05 AM UTC, admin:
-
No fields were updated. See the metadata diff for more details.
f | 1 | { | f | 1 | { |
2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | 2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | ||
3 | "author_email": "brenner@luis.uni-hannover.de", | 3 | "author_email": "brenner@luis.uni-hannover.de", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "extras": [], | 5 | "extras": [], | ||
6 | "groups": [], | 6 | "groups": [], | ||
7 | "id": "38af0487-f342-4399-850c-dbccc5e5bb79", | 7 | "id": "38af0487-f342-4399-850c-dbccc5e5bb79", | ||
8 | "isopen": true, | 8 | "isopen": true, | ||
9 | "license_id": "cc-by", | 9 | "license_id": "cc-by", | ||
10 | "license_title": "Creative Commons Attribution", | 10 | "license_title": "Creative Commons Attribution", | ||
11 | "license_url": "http://www.opendefinition.org/licenses/cc-by", | 11 | "license_url": "http://www.opendefinition.org/licenses/cc-by", | ||
12 | "maintainer": "Michael Brenner", | 12 | "maintainer": "Michael Brenner", | ||
13 | "maintainer_email": "brenner@luis.uni-hannover.de", | 13 | "maintainer_email": "brenner@luis.uni-hannover.de", | ||
14 | "metadata_created": "2021-07-23T10:13:58.750187", | 14 | "metadata_created": "2021-07-23T10:13:58.750187", | ||
n | 15 | "metadata_modified": "2021-07-23T10:15:05.591354", | n | 15 | "metadata_modified": "2021-07-23T10:15:05.699885", |
16 | "name": "wahc20", | 16 | "name": "wahc20", | ||
17 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | 17 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | ||
18 | Applied Homomorphic Cryptography", | 18 | Applied Homomorphic Cryptography", | ||
19 | "num_resources": 1, | 19 | "num_resources": 1, | ||
20 | "num_tags": 3, | 20 | "num_tags": 3, | ||
21 | "organization": { | 21 | "organization": { | ||
22 | "approval_status": "approved", | 22 | "approval_status": "approved", | ||
23 | "created": "2021-07-23T10:11:22.945699", | 23 | "created": "2021-07-23T10:11:22.945699", | ||
24 | "description": "Leibniz Universit\u00e4t IT Services | 24 | "description": "Leibniz Universit\u00e4t IT Services | ||
25 | \r\nhttps://www.luis.uni-hannover.de/", | 25 | \r\nhttps://www.luis.uni-hannover.de/", | ||
26 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 26 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
27 | "image_url": | 27 | "image_url": | ||
28 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | 28 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | ||
29 | "is_organization": true, | 29 | "is_organization": true, | ||
30 | "name": "luis", | 30 | "name": "luis", | ||
31 | "state": "active", | 31 | "state": "active", | ||
32 | "title": "LUIS", | 32 | "title": "LUIS", | ||
33 | "type": "organization" | 33 | "type": "organization" | ||
34 | }, | 34 | }, | ||
35 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 35 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
36 | "private": false, | 36 | "private": false, | ||
37 | "relationships_as_object": [], | 37 | "relationships_as_object": [], | ||
38 | "relationships_as_subject": [], | 38 | "relationships_as_subject": [], | ||
39 | "resources": [ | 39 | "resources": [ | ||
40 | { | 40 | { | ||
41 | "cache_last_updated": null, | 41 | "cache_last_updated": null, | ||
42 | "cache_url": null, | 42 | "cache_url": null, | ||
43 | "created": "2021-07-23T10:15:05.602107", | 43 | "created": "2021-07-23T10:15:05.602107", | ||
44 | "datastore_active": false, | 44 | "datastore_active": false, | ||
45 | "description": "Proceedings of the 8th Workshop on Encrypted | 45 | "description": "Proceedings of the 8th Workshop on Encrypted | ||
46 | Computing and Applied Homomorphic Cryptography", | 46 | Computing and Applied Homomorphic Cryptography", | ||
47 | "format": "PDF", | 47 | "format": "PDF", | ||
48 | "hash": "", | 48 | "hash": "", | ||
49 | "id": "9fb5e34f-4bf8-41e8-b8fa-d59bb8edfcaf", | 49 | "id": "9fb5e34f-4bf8-41e8-b8fa-d59bb8edfcaf", | ||
50 | "last_modified": null, | 50 | "last_modified": null, | ||
n | 51 | "metadata_modified": "2021-07-23T10:15:05.594347", | n | 51 | "metadata_modified": "2021-07-23T10:15:05.702690", |
52 | "mimetype": "application/pdf", | 52 | "mimetype": "application/pdf", | ||
53 | "mimetype_inner": null, | 53 | "mimetype_inner": null, | ||
54 | "name": "Proceedings of the 8th Workshop on Encrypted ...", | 54 | "name": "Proceedings of the 8th Workshop on Encrypted ...", | ||
55 | "package_id": "38af0487-f342-4399-850c-dbccc5e5bb79", | 55 | "package_id": "38af0487-f342-4399-850c-dbccc5e5bb79", | ||
56 | "position": 0, | 56 | "position": 0, | ||
57 | "resource_type": null, | 57 | "resource_type": null, | ||
58 | "size": null, | 58 | "size": null, | ||
59 | "state": "active", | 59 | "state": "active", | ||
60 | "url": | 60 | "url": | ||
61 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | 61 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | ||
62 | "url_type": null | 62 | "url_type": null | ||
63 | } | 63 | } | ||
64 | ], | 64 | ], | ||
t | 65 | "state": "draft", | t | 65 | "state": "active", |
66 | "tags": [ | 66 | "tags": [ | ||
67 | { | 67 | { | ||
68 | "display_name": "computer security", | 68 | "display_name": "computer security", | ||
69 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 69 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
70 | "name": "computer security", | 70 | "name": "computer security", | ||
71 | "state": "active", | 71 | "state": "active", | ||
72 | "vocabulary_id": null | 72 | "vocabulary_id": null | ||
73 | }, | 73 | }, | ||
74 | { | 74 | { | ||
75 | "display_name": "cryptography", | 75 | "display_name": "cryptography", | ||
76 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | 76 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | ||
77 | "name": "cryptography", | 77 | "name": "cryptography", | ||
78 | "state": "active", | 78 | "state": "active", | ||
79 | "vocabulary_id": null | 79 | "vocabulary_id": null | ||
80 | }, | 80 | }, | ||
81 | { | 81 | { | ||
82 | "display_name": "homomorphic encryption", | 82 | "display_name": "homomorphic encryption", | ||
83 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | 83 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | ||
84 | "name": "homomorphic encryption", | 84 | "name": "homomorphic encryption", | ||
85 | "state": "active", | 85 | "state": "active", | ||
86 | "vocabulary_id": null | 86 | "vocabulary_id": null | ||
87 | } | 87 | } | ||
88 | ], | 88 | ], | ||
89 | "title": "wahc20", | 89 | "title": "wahc20", | ||
90 | "type": "dataset", | 90 | "type": "dataset", | ||
91 | "url": "", | 91 | "url": "", | ||
92 | "version": "1.0" | 92 | "version": "1.0" | ||
93 | } | 93 | } |