{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:37:23Z","timestamp":1774604243849,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030129415","type":"print"},{"value":"9783030129422","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12942-2_23","type":"book-chapter","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T08:26:50Z","timestamp":1549355210000},"page":"300-313","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Rantos","sequence":"first","affiliation":[]},{"given":"George","family":"Drosatos","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Demertzis","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Ilioudis","sequence":"additional","affiliation":[]},{"given":"Alexandros","family":"Papanikolaou","sequence":"additional","affiliation":[]},{"given":"Antonios","family":"Kritsas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,6]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-50953-2_17","volume-title":"New Frontiers in Artificial Intelligence","author":"C Bartolini","year":"2017","unstructured":"Bartolini, C., Muthuri, R., Santos, C.: Using ontologies to model data protection requirements in workflows. In: Otake, M., Kurahashi, S., Ota, Y., Satoh, K., Bekki, D. (eds.) New Frontiers in Artificial Intelligence, vol. 10091, pp. 233\u2013248. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-50953-2_17"},{"key":"23_CR2","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform (n.d.). \n                    https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper\n                    \n                  . Accessed 02 Oct 2018"},{"issue":"99","key":"23_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2018.2799942","volume":"PP","author":"SC Cha","year":"2018","unstructured":"Cha, S.C., Chen, J.F., Su, C., Yeh, K.H.: A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access PP(99), 1\u20131 (2018). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2018.2799942","journal-title":"IEEE Access"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Cha, S.C., Tsai, T.Y., Peng, W.C., Huang, T.C., Hsu, T.Y.: Privacy-aware and blockchain connected gateways for users to access legacy IoT devices. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1\u20133, October 2017. \n                    https:\/\/doi.org\/10.1109\/GCCE.2017.8229327","DOI":"10.1109\/GCCE.2017.8229327"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Conoscenti, M., Vetr\u00f2, A., Martin, J.C.D.: Blockchain for the Internet of Things: a systematic literature review. In: 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1\u20136, November 2016. \n                    https:\/\/doi.org\/10.1109\/AICCSA.2016.7945805","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Copigneaux, B.: Semi-autonomous, context-aware, agent using behaviour modelling and reputation systems to authorize data operation in the Internet of Things. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 411\u2013416, March 2014. \n                    https:\/\/doi.org\/10.1109\/WF-IoT.2014.6803201","DOI":"10.1109\/WF-IoT.2014.6803201"},{"issue":"1","key":"23_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/17512549.2017.1325401","volume":"12","author":"K Demertzis","year":"2018","unstructured":"Demertzis, K., Iliadis, L.S., Anezakis, V.D.: An innovative soft computing system for smart energy grids cybersecurity. Adv. Build. Energy Res. 12(1), 3\u201324 (2018). \n                    https:\/\/doi.org\/10.1080\/17512549.2017.1325401","journal-title":"Adv. Build. Energy Res."},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-02121-3_15","volume-title":"The Semantic Web: Research and Applications","author":"K Eckert","year":"2009","unstructured":"Eckert, K., Meilicke, C., Stuckenschmidt, H.: Improving ontology matching using meta-level learning. In: Aroyo, L., et al. (eds.) ESWC 2009. LNCS, vol. 5554, pp. 158\u2013172. Springer, Heidelberg (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-02121-3_15"},{"key":"23_CR9","unstructured":"EnCoRe Project: Ensuring consent and revocation (2010). \n                    www.hpl.hp.com\/breweb\/encoreproject\/\n                    \n                  . Accessed 02 Oct 2018"},{"key":"23_CR10","unstructured":"European Parliament and Council: Regulation (EU) 2016\/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union (Apr 2016), \n                    http:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A32016R0679"},{"key":"23_CR11","unstructured":"Fortinet Inc.: Fortinet reveals \u201cInternet of Things: connected home\u201d survey results (2014). \n                    https:\/\/www.fortinet.com\/corporate\/about-us\/newsroom\/press-releases\/2014\/internet-of-things.html\n                    \n                  . Accessed 02 Oct 2018"},{"key":"23_CR12","unstructured":"IERC: European Research Cluster on the Internet of Things, Internet of Things: IoT governance, privacy and security issues (2015). \n                    http:\/\/www.internet-of-things-research.eu\/pdf\/IERC_Position_Paper_IoT_Governance_Privacy_Security_Final.pdf\n                    \n                  . Accessed 02 Oct 2018"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.csbj.2018.08.002","volume":"16","author":"AS Kleinaki","year":"2018","unstructured":"Kleinaki, A.S., Mytis-Gkometh, P., Drosatos, G., Efraimidis, P.S., Kaldoudi, E.: A blockchain-based notarization service for biomedical knowledge retrieval. Comput. Struct. Biotechnol. J. 16, 288\u2013297 (2018). \n                    https:\/\/doi.org\/10.1016\/j.csbj.2018.08.002","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"23_CR14","unstructured":"Musolesi, M.: UPRISE-IoT: User-centric PRIvacy & Security in IoT (2017). \n                    http:\/\/gtr.rcuk.ac.uk\/projects?ref=EP%2FP016278%2F1\n                    \n                  . Accessed 02 Oct 2018"},{"key":"23_CR15","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). \n                    https:\/\/bitcoin.org\/bitcoin.pdf\n                    \n                  . Accessed 02 Oct 2018"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.12688\/f1000research.9756.1","volume":"5","author":"Timothy Nugent","year":"2016","unstructured":"Nugent, T., Upton, D., Cimpoesu, M.: Improving data transparency in clinical trials using blockchain smart contracts. F1000Research 5, 2541 (2016). \n                    https:\/\/doi.org\/10.12688\/f1000research.9756.1","journal-title":"F1000Research"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1016\/j.procs.2017.08.329","volume":"113","author":"Y O\u2019Connor","year":"2017","unstructured":"O\u2019Connor, Y., Rowan, W., Lynch, L., Heavin, C.: Privacy by design: informed consent and internet of things for smart health. Procedia Comput. Sci. 113, 653\u2013658 (2017). \n                    https:\/\/doi.org\/10.1016\/j.procs.2017.08.329","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"23_CR18","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.eswa.2014.08.032","volume":"42","author":"L Otero-Cerdeira","year":"2015","unstructured":"Otero-Cerdeira, L., Rodr\u00edguez-Mart\u00ednez, F.J., G\u00f3mez-Rodr\u00edguez, A.: Ontology matching. Expert Syst. Appl. 42(2), 949\u2013971 (2015). \n                    https:\/\/doi.org\/10.1016\/j.eswa.2014.08.032","journal-title":"Expert Syst. Appl."},{"key":"23_CR19","doi-asserted-by":"publisher","unstructured":"Rantos, K., Drosatos, G., Demertzis, K., Ilioudis, C., Papanikolaou, A.: Blockchain-based consents management for personal data processing in the IoT ecosystem. In: 15th International Conference on Security and Cryptography (SECRYPT 2018), part of ICETE, pp. 572\u2013577. SciTePress, Porto (2018). \n                    https:\/\/doi.org\/10.5220\/0006911005720577","DOI":"10.5220\/0006911005720577"},{"key":"23_CR20","unstructured":"Russell, B., Garlat, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). White paper, Cloud Security Alliance, April 2015"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015). \n                    https:\/\/doi.org\/10.1016\/j.comnet.2014.11.008","journal-title":"Comput. Netw."},{"issue":"1","key":"23_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic, J.A.: Research directions for the Internet of Things. IEEE Internet Things J. 1(1), 3\u20139 (2014). \n                    https:\/\/doi.org\/10.1109\/JIOT.2014.2312291","journal-title":"IEEE Internet Things J."},{"key":"23_CR23","doi-asserted-by":"publisher","unstructured":"Shih, Y.-Y., Liu, D.-R.: Hybrid recommendation approaches: collaborative filtering via valuable content information, p. 217b. IEEE (2005). \n                    https:\/\/doi.org\/10.1109\/HICSS.2005.302","DOI":"10.1109\/HICSS.2005.302"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.1109\/ACCESS.2016.2573314","volume":"4","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Wu, B., Zheng, K., Wang, X., Lei, L.: A survey of collaborative filtering-based recommender systems for mobile internet applications. IEEE Access 4, 3273\u20133287 (2016). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2573314","journal-title":"IEEE Access"},{"issue":"10","key":"23_CR25","doi-asserted-by":"publisher","first-page":"e0163477","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K.: Where is current research on blockchain technology?\u2014A systematic review. PLoS ONE 11(10), e0163477 (2016). \n                    https:\/\/doi.org\/10.1371\/journal.pone.0163477","journal-title":"PLoS ONE"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 7th International Conference on Service-Oriented Computing and Applications, pp. 230\u2013234. IEEE, November 2014. \n                    https:\/\/doi.org\/10.1109\/SOCA.2014.58","DOI":"10.1109\/SOCA.2014.58"},{"key":"23_CR27","unstructured":"Zhu, X., Ghahramani, Z., Lafferty, J.: Semi-supervised learning using Gaussian fields and harmonic functions. In: IN ICML, pp. 912\u2013919 (2003)"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12942-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:39:26Z","timestamp":1558478366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12942-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030129415","9783030129422"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12942-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SECITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security for Information Technology and Communications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"5.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Three papers of invited keynote speakers are included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}