{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T12:29:15Z","timestamp":1745584155660,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030544546"},{"type":"electronic","value":"9783030544553"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-54455-3_39","type":"book-chapter","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T12:07:37Z","timestamp":1596715657000},"page":"550-567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods"],"prefix":"10.1007","author":[{"given":"Kumaramangalam","family":"Muni Venkateswarlu","sequence":"first","affiliation":[]},{"given":"Sepideh","family":"Avizheh","sequence":"additional","affiliation":[]},{"given":"Reihaneh","family":"Safavi-Naini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"39_CR1","unstructured":"Airbnb: Book homes, hotels, and more on Airbnb (2019). https:\/\/www.airbnb.ca\/"},{"key":"39_CR2","unstructured":"Amazon: AWS IoT Framework (2018). https:\/\/aws.amazon.com\/iot"},{"key":"39_CR3","unstructured":"Apple: The smart home just got smarter (2018). http:\/\/www.apple.com\/ios\/home\/"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Avizheh, S., Doan, T.T., Liu, X., Safavi-Naini, R.: A secure event logging system for smart homes. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 37\u201342. ACM (2017)","DOI":"10.1145\/3139937.3139945"},{"key":"39_CR5","unstructured":"Buterin, V., et al.: A next-generation smart contract and decentralized application platform. White paper 3, no. 37 (2014)"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Doan, T.T., Safavi-Naini, R., Li, S., Avizheh, S., Fong, P.W., et al.: Towards a resilient smart home. In: Proceedings of the 2018 Workshop on IoT Security and Privacy, pp. 15\u201321. ACM (2018)","DOI":"10.1145\/3229565.3229570"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Dupuy, J.C., Torre, A.: Cooperation and trust in spatially clustered firms. In: Trust and Economic Learning, pp. 141\u201361. Edward Elgar, Cheltenham (1998)","DOI":"10.4337\/9781781956731.00016"},{"issue":"5\u20136","key":"39_CR8","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"S Gusmeroli","year":"2013","unstructured":"Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 58(5\u20136), 1189\u20131205 (2013)","journal-title":"Math. Comput. Model."},{"key":"39_CR9","unstructured":"Higginbottom, J.: Governments finally embrace the sharing economy (2018). https:\/\/www.ozy.com\/fast-forward\/governments-finally-embrace-the-sharing-economy\/89688\/"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft), vol. 800, no. 162. NIST special publication (2013)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"39_CR11","unstructured":"Johnson, C.: The rise of the sharing communities (2012). https:\/\/www.shareable.net\/the-rise-of-the-sharing-communities\/"},{"key":"39_CR12","doi-asserted-by":"publisher","DOI":"10.1515\/jeeh-1998-2-311","volume-title":"Trust and Economic Learning","author":"N Lazaric","year":"1998","unstructured":"Lazaric, N., Lorenz, E.: Trust and Economic Learning. Edward Elgar Publishing, Cheltenham (1998)"},{"key":"39_CR13","unstructured":"Maesa, D.D.F., Mori, P., Ricci, L.: Blockchain based access control services. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1379\u20131386. IEEE (2018)"},{"issue":"5","key":"39_CR14","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1080\/09654313.2019.1575338","volume":"27","author":"M Nilsson","year":"2019","unstructured":"Nilsson, M.: Proximity and the trust formation process. Eur. Plan. Stud. 27(5), 841\u2013861 (2019)","journal-title":"Eur. Plan. Stud."},{"issue":"18","key":"39_CR15","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"Ouaddah, A., Abou Elkalam, A., Ait Ouahman, A.: FairAccess: a new blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"39_CR16","unstructured":"Rinne, A.: 4 big trends for the sharing economy in 2019 (2019). https:\/\/www.weforum.org\/agenda\/2019\/01\/sharing-economy\/"},{"issue":"2","key":"39_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"39_CR18","unstructured":"SmartThings: How it works-SmartThings (2018). https:\/\/www.smartthings.com\/getting-started"},{"issue":"4","key":"39_CR19","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1093\/jnlecg\/lbh027","volume":"4","author":"M Storper","year":"2004","unstructured":"Storper, M., Venables, A.J.: Buzz: face-to-face contact and the urban economy. J. Econ. Geogr. 4(4), 351\u2013370 (2004)","journal-title":"J. Econ. Geogr."},{"key":"39_CR20","unstructured":"truffle: truffle suite (2019). https:\/\/www.trufflesuite.com\/truffle"},{"key":"39_CR21","unstructured":"truffle: truffle suite (2019). https:\/\/www.trufflesuite.com\/ganache"},{"key":"39_CR22","unstructured":"Uber: Drive with Uber, earn on your schedule (2019). https:\/\/www.uber.com\/ca\/en\/"},{"key":"39_CR23","unstructured":"Williams, R.: Forrester: millennials boost growth of sharing economy (2018). https:\/\/www.mobilemarketer.com\/news\/forrester-millennials-boost-growth-of-sharing-economy\/515851\/"},{"issue":"2","key":"39_CR24","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/JIOT.2018.2847705","volume":"6","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., Wan, J.: Smart contract-based access control for the Internet of Things. IEEE Internet Things J. 6(2), 1594\u20131605 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-54455-3_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T10:18:14Z","timestamp":1696501094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-54455-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030544546","9783030544553"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-54455-3_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kota Kinabalu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc20.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"162","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}