Changes
On July 23, 2021 at 10:15:05 AM UTC, admin:
-
Added resource Proceedings of the 8th Workshop on Encrypted ... to wahc20
f | 1 | { | f | 1 | { |
2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | 2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | ||
3 | "author_email": "brenner@luis.uni-hannover.de", | 3 | "author_email": "brenner@luis.uni-hannover.de", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "extras": [], | 5 | "extras": [], | ||
6 | "groups": [], | 6 | "groups": [], | ||
7 | "id": "38af0487-f342-4399-850c-dbccc5e5bb79", | 7 | "id": "38af0487-f342-4399-850c-dbccc5e5bb79", | ||
8 | "isopen": true, | 8 | "isopen": true, | ||
9 | "license_id": "cc-by", | 9 | "license_id": "cc-by", | ||
10 | "license_title": "Creative Commons Attribution", | 10 | "license_title": "Creative Commons Attribution", | ||
11 | "license_url": "http://www.opendefinition.org/licenses/cc-by", | 11 | "license_url": "http://www.opendefinition.org/licenses/cc-by", | ||
12 | "maintainer": "Michael Brenner", | 12 | "maintainer": "Michael Brenner", | ||
13 | "maintainer_email": "brenner@luis.uni-hannover.de", | 13 | "maintainer_email": "brenner@luis.uni-hannover.de", | ||
14 | "metadata_created": "2021-07-23T10:13:58.750187", | 14 | "metadata_created": "2021-07-23T10:13:58.750187", | ||
n | 15 | "metadata_modified": "2021-07-23T10:13:58.750193", | n | 15 | "metadata_modified": "2021-07-23T10:15:05.591354", |
16 | "name": "wahc20", | 16 | "name": "wahc20", | ||
17 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | 17 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | ||
18 | Applied Homomorphic Cryptography", | 18 | Applied Homomorphic Cryptography", | ||
n | 19 | "num_resources": 0, | n | 19 | "num_resources": 1, |
20 | "num_tags": 3, | 20 | "num_tags": 3, | ||
21 | "organization": { | 21 | "organization": { | ||
22 | "approval_status": "approved", | 22 | "approval_status": "approved", | ||
23 | "created": "2021-07-23T10:11:22.945699", | 23 | "created": "2021-07-23T10:11:22.945699", | ||
24 | "description": "Leibniz Universit\u00e4t IT Services | 24 | "description": "Leibniz Universit\u00e4t IT Services | ||
25 | \r\nhttps://www.luis.uni-hannover.de/", | 25 | \r\nhttps://www.luis.uni-hannover.de/", | ||
26 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 26 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
27 | "image_url": | 27 | "image_url": | ||
28 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | 28 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | ||
29 | "is_organization": true, | 29 | "is_organization": true, | ||
30 | "name": "luis", | 30 | "name": "luis", | ||
31 | "state": "active", | 31 | "state": "active", | ||
32 | "title": "LUIS", | 32 | "title": "LUIS", | ||
33 | "type": "organization" | 33 | "type": "organization" | ||
34 | }, | 34 | }, | ||
35 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 35 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
36 | "private": false, | 36 | "private": false, | ||
37 | "relationships_as_object": [], | 37 | "relationships_as_object": [], | ||
38 | "relationships_as_subject": [], | 38 | "relationships_as_subject": [], | ||
t | 39 | "resources": [], | t | 39 | "resources": [ |
40 | { | ||||
41 | "cache_last_updated": null, | ||||
42 | "cache_url": null, | ||||
43 | "created": "2021-07-23T10:15:05.602107", | ||||
44 | "datastore_active": false, | ||||
45 | "description": "Proceedings of the 8th Workshop on Encrypted | ||||
46 | Computing and Applied Homomorphic Cryptography", | ||||
47 | "format": "PDF", | ||||
48 | "hash": "", | ||||
49 | "id": "9fb5e34f-4bf8-41e8-b8fa-d59bb8edfcaf", | ||||
50 | "last_modified": null, | ||||
51 | "metadata_modified": "2021-07-23T10:15:05.594347", | ||||
52 | "mimetype": "application/pdf", | ||||
53 | "mimetype_inner": null, | ||||
54 | "name": "Proceedings of the 8th Workshop on Encrypted ...", | ||||
55 | "package_id": "38af0487-f342-4399-850c-dbccc5e5bb79", | ||||
56 | "position": 0, | ||||
57 | "resource_type": null, | ||||
58 | "size": null, | ||||
59 | "state": "active", | ||||
60 | "url": | ||||
61 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | ||||
62 | "url_type": null | ||||
63 | } | ||||
64 | ], | ||||
40 | "state": "draft", | 65 | "state": "draft", | ||
41 | "tags": [ | 66 | "tags": [ | ||
42 | { | 67 | { | ||
43 | "display_name": "computer security", | 68 | "display_name": "computer security", | ||
44 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 69 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
45 | "name": "computer security", | 70 | "name": "computer security", | ||
46 | "state": "active", | 71 | "state": "active", | ||
47 | "vocabulary_id": null | 72 | "vocabulary_id": null | ||
48 | }, | 73 | }, | ||
49 | { | 74 | { | ||
50 | "display_name": "cryptography", | 75 | "display_name": "cryptography", | ||
51 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | 76 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | ||
52 | "name": "cryptography", | 77 | "name": "cryptography", | ||
53 | "state": "active", | 78 | "state": "active", | ||
54 | "vocabulary_id": null | 79 | "vocabulary_id": null | ||
55 | }, | 80 | }, | ||
56 | { | 81 | { | ||
57 | "display_name": "homomorphic encryption", | 82 | "display_name": "homomorphic encryption", | ||
58 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | 83 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | ||
59 | "name": "homomorphic encryption", | 84 | "name": "homomorphic encryption", | ||
60 | "state": "active", | 85 | "state": "active", | ||
61 | "vocabulary_id": null | 86 | "vocabulary_id": null | ||
62 | } | 87 | } | ||
63 | ], | 88 | ], | ||
64 | "title": "wahc20", | 89 | "title": "wahc20", | ||
65 | "type": "dataset", | 90 | "type": "dataset", | ||
66 | "url": "", | 91 | "url": "", | ||
67 | "version": "1.0" | 92 | "version": "1.0" | ||
68 | } | 93 | } |