{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:16:38Z","timestamp":1743081398194,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030576714"},{"type":"electronic","value":"9783030576721"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57672-1_24","type":"book-chapter","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T09:31:47Z","timestamp":1597138307000},"page":"325-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Managing Security Risks in Post-Trade Matching and Confirmation Using CorDapp"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0543-613X","authenticated-orcid":false,"given":"Mubashar","family":"Iqbal","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1829-4794","authenticated-orcid":false,"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,12]]},"reference":[{"key":"24_CR1","unstructured":"AccentureSecurity: Future Cyber Threats: Extreme But Plausible Threat Scenarios In Financial Services (2019)"},{"key":"24_CR2","unstructured":"Agarwal, S.: Cybersecurity essentials for capital markets firms in the digital age. http:\/\/bit.ly\/37rdMTe"},{"key":"24_CR3","unstructured":"Al-essa, M.: The Impact of Blockchain Technology on Financial Technology (2019)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts (SoK). POST (2017)","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Baker, R.P.: The Trade Lifecycle: Behind the Scenes of the Trading Process (2015)","DOI":"10.1002\/9781119014393"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Bellekens, X., Hamilton, A., Seeam, P., Nieradzinska, K., Franssen, Q., Seeam, A.: Pervasive eHealth services a security and privacy risk awareness survey. CyberSA$$\\acute{1}$$6 (2016)","DOI":"10.1109\/CyberSA.2016.7503293"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Brubaker, C., Jana, S., Ray, B., Khurshid, S., Shmatikov, V.: Using frankencerts for automated adversarial testing of certificate validation in SSL\/TLS implementations. In: Proceedings - IEEE Symposium on Security and Privacy (2014)","DOI":"10.1109\/SP.2014.15"},{"key":"24_CR8","unstructured":"CMA: Capital Markets Fraud Investigations Unit. http:\/\/bit.ly\/2SVxClg"},{"key":"24_CR9","unstructured":"Dagan, G.: The Actual Networking behind the Ethereum Network: How It Works (2018). http:\/\/bit.ly\/2HjtchG"},{"key":"24_CR10","unstructured":"Docs, C.: Corda Threat Model. http:\/\/bit.ly\/39xcuHJ"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Dubois, \u00c9., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A Systematic Approach to Define the Domain of Information System Security Risk Management (2010)","DOI":"10.1007\/978-3-642-12544-7_16"},{"key":"24_CR12","unstructured":"ECB: Potential Impact of DLTs on Securities Post-Trading Harmonisation and on the Wider EU Financial Market Integration (2017). http:\/\/bit.ly\/37jMFcG"},{"key":"24_CR13","unstructured":"Hearn, M.: Corda: A distributed ledger (Whitepaper) (2016). https:\/\/www.corda.net\/content\/corda-technical-whitepaper.pdf"},{"key":"24_CR14","unstructured":"Hearn, M.: The Future of Corda (2018). https:\/\/www.r3.com\/wp-content\/uploads\/2018\/04\/The-Future-of-Corda-ENG.pdf"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Iqbal, M., Matulevi\u010dius, R.: Blockchain-based application security risks: a systematic literature review. In: CAiSE 2019 Workshop (2019)","DOI":"10.1007\/978-3-030-20948-3_16"},{"key":"24_CR16","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-30429-4_2","volume-title":"Business Process Management: Blockchain and Central and Eastern Europe Forum","author":"M Iqbal","year":"2019","unstructured":"Iqbal, M., Matulevi\u010dius, R.: Comparison of blockchain-based solutions to mitigate data tampering security risk. In: Di Ciccio, C., et al. (eds.) BPM 2019. LNBIP, vol. 361, pp. 13\u201328. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30429-4_2"},{"key":"24_CR17","unstructured":"Koens, T., King, S., Bos, M.V.D., Wijk, C.V., Koren, A.: Solutions for the Corda Security and Privacy Trade-off : Having Your Cake and Eating It (2019)"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Kubo, R.: Detection and mitigation of false data injection attacks for secure interactive networked control systems. ISR (2018)","DOI":"10.1109\/IISR.2018.8535978"},{"key":"24_CR19","doi-asserted-by":"publisher","unstructured":"Matulevicius, R.: Fundamentals of Secure System Modelling. Lecture Notes in Business Information Processing. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61717-6_12","DOI":"10.1007\/978-3-319-61717-6_12"},{"key":"24_CR20","unstructured":"Maurer, T., Levite, A., Perkovich, G.: Toward a global norm against manipulating the integrity of financial data (2017)"},{"key":"24_CR21","unstructured":"Moser, J.: The Application and Impact of the European General Data Protection Regulation on Blockchains (2017)"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Mylrea, M., Gourisetti, S.N.G.: Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In: RWS (2017)","DOI":"10.1109\/RWEEK.2017.8088642"},{"key":"24_CR23","unstructured":"OWASP: A10-Insufficient Logging and Monitoring (2017). http:\/\/bit.ly\/31P2Du7"},{"key":"24_CR24","unstructured":"Plac\u0101ns, J.: Security risk management in corda-based application for capital markets. Master\u2019s thesis, Riga Technical University (2019)"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Polyviou, A., Velanas, P., Soldatos, J.: Blockchain Technology: Financial Sector Applications Beyond Cryptocurrencies (2019)","DOI":"10.3390\/proceedings2019028007"},{"key":"24_CR26","unstructured":"R3: Corda: Secure Coding Guidelines. http:\/\/bit.ly\/2TluaiO"},{"key":"24_CR27","unstructured":"Ruffy, F., Hommel, W., Eye, F.V.: A STRIDE-based security architecture for software-defined networking. ICN 2016 (c) (2016)"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Sato, T., Himura, Y.: Smart-contract based system operations for permissioned Blockchain. In: NTMS 2018 (2018)","DOI":"10.1109\/NTMS.2018.8328745"},{"key":"24_CR29","unstructured":"Sweigart, C.: Global Information Assurance Certification Paper (2003)"},{"key":"24_CR30","unstructured":"Thulasidas, M.: Principles of Quantitative Development (2010)"},{"issue":"5","key":"24_CR31","first-page":"561","volume":"24","author":"J Velissarios","year":"2019","unstructured":"Velissarios, J., Herzig, J., Didem, U.: Blockchain\u2019s potential starts with security. Practice Nurs. 24(5), 561\u2013568 (2019)","journal-title":"Practice Nurs."},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Yin, W.E.I., Wen, Q., Li, W., Zhang, H.U.A., Jin, Z.: An Anti-Quantum Transaction Authentication Approach in Blockchain 6 (2018)","DOI":"10.1109\/ACCESS.2017.2788411"}],"container-title":["Communications in Computer and Information Science","Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57672-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:17:26Z","timestamp":1619223446000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57672-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030576714","9783030576721"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57672-1_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DB&IS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Baltic Conference on Databases and Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbis.ttu.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}