{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:40:34Z","timestamp":1742982034758,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212284"},{"type":"electronic","value":"9783031212291"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-21229-1_26","type":"book-chapter","created":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T13:20:28Z","timestamp":1673097628000},"page":"279-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["\u201cAre You What You Claim to Be?\u201d Attribute Validation with IOTA for Multi Authority CP-ABE"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3339-6895","authenticated-orcid":false,"given":"Aintzane","family":"Mosteiro-Sanchez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5503-074X","authenticated-orcid":false,"given":"Marc","family":"Barcelo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5532-004X","authenticated-orcid":false,"given":"Jasone","family":"Astorga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5836-4198","authenticated-orcid":false,"given":"Aitor","family":"Urbieta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,8]]},"reference":[{"issue":"3","key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102529","volume":"58","author":"L Bader","year":"2021","unstructured":"Bader, L., Pennekamp, J., Matzutt, R., Hedderich, D., Kowalski, M., L\u00fccken, V., Wehrle, K.: Blockchain-based privacy preservation for supply chains supporting lightweight multi-hop information accountability. Inf. Process. Manag. 58(3), 102529 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102529","journal-title":"Inf. Process. Manag."},{"issue":"6","key":"26_CR2","doi-asserted-by":"publisher","first-page":"4134","DOI":"10.1109\/TII.2019.2931157","volume":"16","author":"L Cui","year":"2020","unstructured":"Cui, L., Yang, S., Chen, Z., Pan, Y., Xu, M., Xu, K.: An efficient and compacted dag-based blockchain protocol for industrial internet of things. IEEE Trans. Ind. Inf. 16(6), 4134\u20134145 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2931157","journal-title":"IEEE Trans. Ind. Inf."},{"key":"26_CR3","doi-asserted-by":"publisher","unstructured":"Di Francesco Maesa, D., Lunardelli, A., Mori, P., Ricci, L.: Exploiting blockchain technology for attribute management in access control systems. In: Djemame, K., Altmann, J., Ba\u00f1ares, J.\u00c1., Agmon Ben-Yehuda, O., Naldi, M. (eds.) GECON 2019. LNCS, vol. 11819, pp. 3\u201314. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-36027-6_1","DOI":"10.1007\/978-3-030-36027-6_1"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.cose.2019.03.016","volume":"84","author":"D Di Francesco Maesa","year":"2019","unstructured":"Di Francesco Maesa, D., Mori, P., Ricci, L.: A blockchain based approach for the definition of auditable access control systems. Comput. Secur. 84, 93\u2013119 (2019). https:\/\/doi.org\/10.1016\/j.cose.2019.03.016","journal-title":"Comput. Secur."},{"issue":"4","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/TEM.2020.2965991","volume":"67","author":"G Epiphaniou","year":"2020","unstructured":"Epiphaniou, G., Pillai, P., Bottarelli, M., Al-Khateeb, H., Hammoudesh, M., Maple, C.: Electronic regulation of data sharing and processing using smart ledger technologies for supply-chain security. IEEE Trans. Eng. Manage. 67(4), 1059\u20131073 (2020). https:\/\/doi.org\/10.1109\/TEM.2020.2965991","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"1","key":"26_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jom.2009.06.001","volume":"28","author":"BB Flynn","year":"2010","unstructured":"Flynn, B.B., Huo, B., Zhao, X.: The impact of supply chain integration on performance: A contingency and configuration approach. J. Oper. Manage. 28(1), 58\u201371 (2010). https:\/\/doi.org\/10.1016\/j.jom.2009.06.001","journal-title":"J. Oper. Manage."},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Hardt, D.: The OAuth 2.0 Authorization framework. RFC 6749 (Oct 2012). https:\/\/doi.org\/10.17487\/RFC6749","DOI":"10.17487\/RFC6749"},{"issue":"1","key":"26_CR8","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10796-009-9222-8","volume":"13","author":"R Liu","year":"2011","unstructured":"Liu, R., Kumar, A.: Leveraging information sharing to configure supply chains. Inf. Syst. Front. 13(1), 139\u2013151 (2011). https:\/\/doi.org\/10.1007\/s10796-009-9222-8","journal-title":"Inf. Syst. Front."},{"key":"26_CR9","unstructured":"Mosteiro-Sanchez, A., Barcelo, M., Astorga, J., Urbieta, A.: End to end secure data exchange in value chains with dynamic policy update. Preprint arXiv:2201.06335 (2022)"},{"issue":"5053","key":"26_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21155053","volume":"21","author":"R Nakanishi","year":"2021","unstructured":"Nakanishi, R., Zhang, Y., Sasabe, M., Kasahara, S.: Combining IOTA and attribute-based encryption for access control in the internet of things. Sensors 21(5053), 1\u201315 (2021). https:\/\/doi.org\/10.3390\/s21155053","journal-title":"Sensors"},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Pennekamp, J., Bader, L., Matzutt, R., Niemietz, P., Trauth, D., Henze, M., Bergs, T., Wehrle, K.: Private multi-hop accountability for supply chains. In: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), pp.\u00a01\u20137 (2020). https:\/\/doi.org\/10.1109\/ICCWorkshops49005.2020.9145100","DOI":"10.1109\/ICCWorkshops49005.2020.9145100"},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"8833765","DOI":"10.1155\/2020\/8833765","volume":"2020","author":"D Preuveneers","year":"2020","unstructured":"Preuveneers, D., Joosen, W., Bernal Bernabe, J., Skarmeta, A.F.: Distributed security framework for reliable threat intelligence sharing. Secur. Commun. Netw. 2020, 8833765 (2020). https:\/\/doi.org\/10.1155\/2020\/8833765","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"26_CR13","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1109\/TNET.2016.2536626","volume":"24","author":"S Qi","year":"2016","unstructured":"Qi, S., Zheng, Y., Li, M., Liu, Y., Qiu, J.: Scalable industry data access control in RFID-enabled supply chain. IEEE\/ACM Trans. Netw. 24(6), 3551\u20133564 (2016). https:\/\/doi.org\/10.1109\/TNET.2016.2536626","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-662-47854-7_19","volume-title":"Financial Cryptography and Data Security","author":"Y Rouselakis","year":"2015","unstructured":"Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: B\u00f6hme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315\u2013332. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-47854-7_19"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Stefanescu, D., Gal\u00e1n-Garc\u00eda, P., Montalvillo, L., Unzilla, J., Urbieta, A.: Towards a holistic DLT architecture for\u00a0IIoT: improved DAG for production lines. In: Prieto, J., Partida, A., Leit\u00e3o, P., Pinto, A. (eds.) BLOCKCHAIN 2021. LNNS, vol. 320, pp. 179\u2013188. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-86162-9_18","DOI":"10.1007\/978-3-030-86162-9_18"}],"container-title":["Lecture Notes in Networks and Systems","Blockchain and Applications, 4th International Congress"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21229-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T14:36:53Z","timestamp":1673275013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21229-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031212284","9783031212291"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21229-1_26","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BLOCKCHAIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress on Blockchain and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L\u00b4Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blockchain2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.blockchain-congress.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}