Changes
On January 12, 2023 at 1:14:30 PM UTC, admin:
-
Changed value of field
source_metadata_modified
to2022-01-20T11:00:37.019006
in wahc20 -
Deleted resource All resource data from wahc20
-
Removed field
datastore_active
from resource Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography in wahc20
f | 1 | { | f | 1 | { |
2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | 2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | ||
3 | "author_email": "brenner@luis.uni-hannover.de", | 3 | "author_email": "brenner@luis.uni-hannover.de", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "doi": "10.25835/0072999", | 5 | "doi": "10.25835/0072999", | ||
6 | "doi_date_published": "2020-12-18", | 6 | "doi_date_published": "2020-12-18", | ||
7 | "doi_publisher": "LUIS", | 7 | "doi_publisher": "LUIS", | ||
8 | "doi_status": "true", | 8 | "doi_status": "true", | ||
9 | "domain": "https://data.uni-hannover.de", | 9 | "domain": "https://data.uni-hannover.de", | ||
10 | "groups": [], | 10 | "groups": [], | ||
11 | "have_copyright": "Yes", | 11 | "have_copyright": "Yes", | ||
12 | "id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | 12 | "id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | ||
13 | "isopen": false, | 13 | "isopen": false, | ||
14 | "license_id": "CC-BY-3.0", | 14 | "license_id": "CC-BY-3.0", | ||
15 | "license_title": "CC-BY-3.0", | 15 | "license_title": "CC-BY-3.0", | ||
16 | "maintainer": "Michael Brenner", | 16 | "maintainer": "Michael Brenner", | ||
17 | "maintainer_email": "brenner@luis.uni-hannover.de", | 17 | "maintainer_email": "brenner@luis.uni-hannover.de", | ||
18 | "metadata_created": "2021-10-14T10:16:10.076969", | 18 | "metadata_created": "2021-10-14T10:16:10.076969", | ||
n | 19 | "metadata_modified": "2021-10-14T10:16:10.076974", | n | 19 | "metadata_modified": "2023-01-12T13:14:30.360444", |
20 | "name": "luh-wahc20", | 20 | "name": "luh-wahc20", | ||
21 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | 21 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | ||
22 | Applied Homomorphic Cryptography", | 22 | Applied Homomorphic Cryptography", | ||
n | 23 | "num_resources": 2, | n | 23 | "num_resources": 1, |
24 | "num_tags": 3, | 24 | "num_tags": 3, | ||
25 | "organization": { | 25 | "organization": { | ||
26 | "approval_status": "approved", | 26 | "approval_status": "approved", | ||
27 | "created": "2021-07-23T10:11:22.945699", | 27 | "created": "2021-07-23T10:11:22.945699", | ||
28 | "description": "Leibniz Universit\u00e4t IT Services | 28 | "description": "Leibniz Universit\u00e4t IT Services | ||
29 | \r\nhttps://www.luis.uni-hannover.de/", | 29 | \r\nhttps://www.luis.uni-hannover.de/", | ||
30 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 30 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
31 | "image_url": | 31 | "image_url": | ||
32 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | 32 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | ||
33 | "is_organization": true, | 33 | "is_organization": true, | ||
34 | "name": "luis", | 34 | "name": "luis", | ||
35 | "state": "active", | 35 | "state": "active", | ||
36 | "title": "LUIS", | 36 | "title": "LUIS", | ||
37 | "type": "organization" | 37 | "type": "organization" | ||
38 | }, | 38 | }, | ||
39 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 39 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
40 | "private": false, | 40 | "private": false, | ||
41 | "relationships_as_object": [], | 41 | "relationships_as_object": [], | ||
42 | "relationships_as_subject": [], | 42 | "relationships_as_subject": [], | ||
43 | "repository_name": "Leibniz University Hannover", | 43 | "repository_name": "Leibniz University Hannover", | ||
44 | "resources": [ | 44 | "resources": [ | ||
45 | { | 45 | { | ||
46 | "cache_last_updated": null, | 46 | "cache_last_updated": null, | ||
47 | "cache_url": null, | 47 | "cache_url": null, | ||
n | 48 | "created": "2020-12-18T13:39:49.038154", | n | ||
49 | "datastore_active": false, | ||||
50 | "description": "", | ||||
51 | "downloadall_datapackage_hash": | ||||
52 | "b8733ad32083ec5154dabba7185649b2", | ||||
53 | "downloadall_metadata_modified": "2021-01-02T23:40:33.382028", | ||||
54 | "format": "ZIP", | ||||
55 | "hash": "", | ||||
56 | "id": "1dc7f596-c293-40c2-b175-528f68390ff5", | ||||
57 | "last_modified": "2021-01-02T23:40:43.707376", | ||||
58 | "metadata_modified": "2021-10-14T10:16:10.070216", | ||||
59 | "mimetype": "application/zip", | ||||
60 | "mimetype_inner": null, | ||||
61 | "name": "All resource data", | ||||
62 | "package_id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | ||||
63 | "position": 0, | ||||
64 | "resource_type": null, | ||||
65 | "revision_id": "0ed462dc-e46a-4a18-83d1-8a32bf47f779", | ||||
66 | "size": 475, | ||||
67 | "state": "active", | ||||
68 | "url": | ||||
69 | urce/1dc7f596-c293-40c2-b175-528f68390ff5/download/wahc20-daj9c5.zip", | ||||
70 | "url_type": "" | ||||
71 | }, | ||||
72 | { | ||||
73 | "cache_last_updated": null, | ||||
74 | "cache_url": null, | ||||
75 | "created": "2020-12-18T22:20:30.850997", | 48 | "created": "2020-12-18T22:20:30.850997", | ||
n | 76 | "datastore_active": false, | n | ||
77 | "description": "Proceedings of the 8th Workshop on Encrypted | 49 | "description": "Proceedings of the 8th Workshop on Encrypted | ||
78 | Computing and Applied Homomorphic Cryptography", | 50 | Computing and Applied Homomorphic Cryptography", | ||
79 | "format": "PDF", | 51 | "format": "PDF", | ||
80 | "hash": "", | 52 | "hash": "", | ||
81 | "id": "1984c6d3-0b30-485f-bc2e-7f0cbbf3cdee", | 53 | "id": "1984c6d3-0b30-485f-bc2e-7f0cbbf3cdee", | ||
82 | "last_modified": "2021-01-02T23:40:33.360811", | 54 | "last_modified": "2021-01-02T23:40:33.360811", | ||
n | 83 | "metadata_modified": "2021-10-14T10:16:10.071458", | n | 55 | "metadata_modified": "2023-01-12T13:14:30.364114", |
84 | "mimetype": "application/pdf", | 56 | "mimetype": "application/pdf", | ||
85 | "mimetype_inner": null, | 57 | "mimetype_inner": null, | ||
86 | "name": "Proceedings of the 8th Workshop on Encrypted Computing | 58 | "name": "Proceedings of the 8th Workshop on Encrypted Computing | ||
87 | and Applied Homomorphic Cryptography", | 59 | and Applied Homomorphic Cryptography", | ||
88 | "package_id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | 60 | "package_id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | ||
n | 89 | "position": 1, | n | 61 | "position": 0, |
90 | "resource_type": null, | 62 | "resource_type": null, | ||
n | 91 | "revision_id": "0b4b4c48-db60-418e-81b1-cbcb128a3ddd", | n | ||
92 | "size": 8741494, | 63 | "size": 8741494, | ||
93 | "state": "active", | 64 | "state": "active", | ||
94 | "url": | 65 | "url": | ||
95 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | 66 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | ||
96 | "url_type": "" | 67 | "url_type": "" | ||
97 | } | 68 | } | ||
98 | ], | 69 | ], | ||
99 | "source_metadata_created": "2020-12-18T13:39:43.808809", | 70 | "source_metadata_created": "2020-12-18T13:39:43.808809", | ||
t | 100 | "source_metadata_modified": "2021-09-03T06:48:53.657589", | t | 71 | "source_metadata_modified": "2022-01-20T11:00:37.019006", |
101 | "state": "active", | 72 | "state": "active", | ||
102 | "tags": [ | 73 | "tags": [ | ||
103 | { | 74 | { | ||
104 | "display_name": "computer security", | 75 | "display_name": "computer security", | ||
105 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 76 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
106 | "name": "computer security", | 77 | "name": "computer security", | ||
107 | "state": "active", | 78 | "state": "active", | ||
108 | "vocabulary_id": null | 79 | "vocabulary_id": null | ||
109 | }, | 80 | }, | ||
110 | { | 81 | { | ||
111 | "display_name": "cryptography", | 82 | "display_name": "cryptography", | ||
112 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | 83 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | ||
113 | "name": "cryptography", | 84 | "name": "cryptography", | ||
114 | "state": "active", | 85 | "state": "active", | ||
115 | "vocabulary_id": null | 86 | "vocabulary_id": null | ||
116 | }, | 87 | }, | ||
117 | { | 88 | { | ||
118 | "display_name": "homomorphic encryption", | 89 | "display_name": "homomorphic encryption", | ||
119 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | 90 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | ||
120 | "name": "homomorphic encryption", | 91 | "name": "homomorphic encryption", | ||
121 | "state": "active", | 92 | "state": "active", | ||
122 | "vocabulary_id": null | 93 | "vocabulary_id": null | ||
123 | } | 94 | } | ||
124 | ], | 95 | ], | ||
125 | "terms_of_usage": "Yes", | 96 | "terms_of_usage": "Yes", | ||
126 | "title": "wahc20", | 97 | "title": "wahc20", | ||
127 | "type": "vdataset", | 98 | "type": "vdataset", | ||
128 | "url": "https://data.uni-hannover.de/dataset/wahc20", | 99 | "url": "https://data.uni-hannover.de/dataset/wahc20", | ||
129 | "version": "1.0" | 100 | "version": "1.0" | ||
130 | } | 101 | } |