{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T19:50:00Z","timestamp":1761853800140,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000080"},{"type":"electronic","value":"9783030000097"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00009-7_63","type":"book-chapter","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T21:20:42Z","timestamp":1537478442000},"page":"706-717","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and Implementation of Web System Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Ting","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Yongfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"key":"63_CR1","first-page":"217","volume":"2","author":"ES Soro","year":"1999","unstructured":"Soro, E.S.: Sociology on the Internet and the Internet for sociology. Empiria: Rev. Metod. Cienc. Soc. 2, 217\u2013241 (1999)","journal-title":"Empiria: Rev. Metod. Cienc. Soc."},{"key":"63_CR2","unstructured":"http:\/\/www.wuzhenwic.org\/download\/ReportonWorldInternetDevelopment2017overview.pdf . Accessed 21 Mar 2018"},{"key":"63_CR3","unstructured":"https:\/\/baike.baidu.com\/item\/web\/150564?fr=aladdin . Accessed 21 Mar 2018"},{"issue":"1","key":"63_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jwsr.2008010101","volume":"5","author":"GOM Yee","year":"2008","unstructured":"Yee, G.O.M., Korba, L.: Security personalization for Internet and web services. Int. J. Web Serv. Res. 5(1), 1\u201323 (2008)","journal-title":"Int. J. Web Serv. Res."},{"issue":"62","key":"63_CR5","first-page":"8","volume":"8","author":"K Umapathy","year":"2010","unstructured":"Umapathy, K., Wallace, L.F.: The role of the web server in a Capstone web application course. Inf. Syst. Educ. J. 8(62), 8 (2010)","journal-title":"Inf. Syst. Educ. J."},{"key":"63_CR6","unstructured":"Dusza, D.L., Nelson, N.: World Wide Web server benchmark. Comput. Technol. Rev. 20\u201325 (1996)"},{"key":"63_CR7","unstructured":"Mohamed, S.M., Abdelbaki, N., Shosha, A.F.: Digital forensic analysis of web-browser based attacks. In: Proceedings of the International Conference on Security and Management (SAM), p. 237 (2016)"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Huo, J., Qu, H.: Design and implementation of automatic defensive websites tamper-resistant based on OpenStack cloud system. In: IEEE Conference Proceedings on the Institute of Electrical and Electronics Engineers, Inc. vol. 01, pp. 280\u2013284 (2015)","DOI":"10.1109\/ICCSNT.2015.7490752"},{"key":"63_CR9","unstructured":"https:\/\/baike.baidu.com\/item\/http . Accessed 21 Mar 2018"},{"key":"63_CR10","unstructured":"https:\/\/baike.baidu.com\/item\/https\/285356 . Accessed 21 Mar 2018"},{"key":"63_CR11","doi-asserted-by":"crossref","unstructured":"Aledhari, M., Saeed, F.: Design and implementation of network transfer protocol for big genomic data. In: IEEE Conferences, pp. 281\u2013288 (2015)","DOI":"10.1109\/BigDataCongress.2015.47"},{"issue":"1","key":"63_CR12","first-page":"50","volume":"19","author":"J Zhou","year":"2000","unstructured":"Zhou, J.: The Internet, the World Wide Web, library web browsers, and library web servers. Inf. Technol. Libr. 19(1), 50\u201352 (2000)","journal-title":"Inf. Technol. Libr."},{"issue":"1","key":"63_CR13","first-page":"164","volume":"2","author":"NF Awang","year":"2012","unstructured":"Awang, N.F., Ahmad, A., Ahmad, S.R.: Preventing web browser from cyber attack. GSTF J. Comput. (JoC) 2(1), 164 (2012)","journal-title":"GSTF J. Comput. (JoC)"},{"key":"63_CR14","unstructured":"Sriraghav, K., et al.: Transaction overhead reduction by server localization in bank database management systems. Int. J. Comput. Appl. 158(3), 11\u201316 (2017)"},{"key":"63_CR15","unstructured":"https:\/\/baike.baidu.com\/item\/dos%E6%94%BB%E5%87%BB\/3792374?fr=aladdin . Accessed 21 Mar 2018"},{"key":"63_CR16","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%88%86%E5%B8%83%E5%BC%8F%E6%8B%92%E7%BB%9D%E6%9C%8D%E5%8A%A1%E6%94%BB%E5%87%BB\/3802159?fr=aladdin&fromid=177090&fromtitle=DDOS%E6%94%BB%E5%87%BB . Accessed 21 Mar 2018"},{"key":"63_CR17","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. Eprint Arxiv (2014)"},{"key":"63_CR18","unstructured":"https:\/\/gguoss.github.io\/2017\/05\/28\/ipfs\/ . Accessed 21 Mar 2018"},{"key":"63_CR19","doi-asserted-by":"crossref","unstructured":"http:\/\/ipfser.org\/2018\/01\/25\/r20\/ . Accessed 21 Mar 2018","DOI":"10.18261\/ISSN.0805-9535-2018-03-04"},{"key":"63_CR20","unstructured":"https:\/\/www.cnblogs.com\/fengzhiwu\/p\/5524324.html . Accessed 21 Mar 2018"},{"key":"63_CR21","unstructured":"http:\/\/www.8btc.com\/how-does-ethereum-work-anyway . Accessed 21 Mar 2018"},{"key":"63_CR22","unstructured":"Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper (2014)"},{"key":"63_CR23","doi-asserted-by":"crossref","unstructured":"https:\/\/baike.baidu.com\/item\/%E4%BB%A5%E5%A4%AA%E5%9D%8A\/20865117?fr=aladdin . Accessed 21 Mar 2018","DOI":"10.1097\/01.EBP.0000545200.82075.84"},{"key":"63_CR24","doi-asserted-by":"crossref","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%8C%BA%E5%9D%97%E9%93%BE\/13465666?fr=aladdin . Accessed 21 Mar 2018","DOI":"10.1093\/sf\/soy053"},{"key":"63_CR25","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%8C%BA%E5%9D%97%E9%93%BE2.0\/22415327?fr=aladdin . Accessed 21 Mar 2018"},{"key":"63_CR26","doi-asserted-by":"crossref","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%8C%BA%E5%9D%97%E9%93%BE1.0\/22415324?fr=aladdin . Accessed 21 Mar 2018","DOI":"10.1093\/sf\/soy053"},{"key":"63_CR27","unstructured":"Narayanan, A., et al.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction (2016)"},{"key":"63_CR28","first-page":"118","volume":"95","author":"M Iansiti","year":"2017","unstructured":"Iansiti, M., Lakhani, K.R.: The truth about blockchain. Harv. Bus. Rev. 95, 118\u2013127 (2017)","journal-title":"Harv. Bus. Rev."},{"key":"63_CR29","unstructured":"Lauc, D.: Logical reconstruction of programming language paradigms. Int. J. Adv. Res. Comput. Sci. 4(10), 17\u201320 (2013)"},{"key":"63_CR30","unstructured":"https:\/\/baike.baidu.com\/item\/%E6%99%BA%E8%83%BD%E5%90%88%E7%BA%A6\/19770937?fr=aladdin . Accessed 21 Mar 2018"},{"key":"63_CR31","unstructured":"https:\/\/gendal.me\/2015\/02\/10\/a-simple-model-for-smart-contracts\/ . Accessed 21 Mar 2018"},{"key":"63_CR32","doi-asserted-by":"crossref","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%AF%B9%E7%AD%89%E7%BD%91%E7%BB%9C\/5482934?fr=aladdin . Accessed 21 Mar 2018","DOI":"10.1136\/jnnp-2016-315510corr1"},{"key":"63_CR33","unstructured":"https:\/\/en.wikipedia.org\/wiki\/InterPlanetary_File_System . Accessed 21 Mar 2018"},{"key":"63_CR34","unstructured":"https:\/\/medium.com\/@ConsenSys\/an-introduction-to-ipfs-9bba4860abd0 . Accessed 21 Mar 2018"},{"key":"63_CR35","unstructured":"https:\/\/www.jianshu.com\/p\/8da05084d9d7 . Accessed 21 Mar 2018"},{"key":"63_CR36","unstructured":"https:\/\/media.readthedocs.org\/pdf\/solidity\/v0.4.21\/solidity.pdf . Accessed 21 Mar 2018"},{"key":"63_CR37","unstructured":"https:\/\/baike.baidu.com\/item\/DHT\/1007999?fr=aladdin . Accessed 21 Mar 2018"},{"key":"63_CR38","doi-asserted-by":"crossref","unstructured":"Baumgart, I., Mies, S.: S\/Kademlia: a practicable approach towards secure key-based routing. In: 2007 International Conference on Parallel and Distributed Systems, vol. 2, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/ICPADS.2007.4447808"},{"key":"63_CR39","unstructured":"https:\/\/baike.baidu.com\/item\/Kademlia\/3106849?fr=aladdin . Accessed 21 Mar 2018"},{"key":"63_CR40","unstructured":"http:\/\/www.8btc.com\/51attack . Accessed 21 Mar 2018"},{"key":"63_CR41","unstructured":"https:\/\/www.iplaysoft.com\/encrypt-arithmetic.html . Accessed 21 Mar 2018"},{"key":"63_CR42","doi-asserted-by":"crossref","unstructured":"https:\/\/baike.baidu.com\/item\/%E5%8A%A0%E5%AF%86%E7%AE%97%E6%B3%95\/2816213 . Accessed 21 Mar 2018","DOI":"10.1016\/S1278-3218(17)30115-4"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00009-7_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T10:50:42Z","timestamp":1751971842000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00009-7_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000080","9783030000097"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00009-7_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}