{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T05:39:55Z","timestamp":1744695595802,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031314193"},{"type":"electronic","value":"9783031314209"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31420-9_3","type":"book-chapter","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T13:03:24Z","timestamp":1682687004000},"page":"32-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Combining ID\u2019s, Attributes, and\u00a0Policies in\u00a0Hyperledger Fabric"],"prefix":"10.1007","author":[{"given":"Daan","family":"Gordijn","sequence":"first","affiliation":[]},{"given":"Roland","family":"Kromes","sequence":"additional","affiliation":[]},{"given":"Thanassis","family":"Giannetsos","sequence":"additional","affiliation":[]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,29]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Bandara, H.D., Chen, S., Staples, M., Sai, Y.: Modeling multi-layer access control policies of a hyperledger-fabric-based agriculture supply chain. In: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), pp. 355\u2013364 (2021). https:\/\/doi.org\/10.1109\/TPSISA52974.2021.00039","DOI":"10.1109\/TPSISA52974.2021.00039"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Cai, W., Hong, Z., Wang, Z., Feng, C.: Decentralized applications: the blockchain-empowered software system. IEEE Access (2018). https:\/\/www.researchgate.net\/publication\/327711685_Decentralized_Applications_The_Blockchain-Empowered_Software_System","DOI":"10.1109\/ACCESS.2018.2870644"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Ding, S., Cao, J., Li, C., Fan, K., Li, H.: A novel attribute-based access control scheme using blockchain for IoT. IEEE Access 7, 38431\u201338441 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2905846, https:\/\/ieeexplore.ieee.org\/document\/8668769","DOI":"10.1109\/ACCESS.2019.2905846"},{"key":"3_CR4","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-981-287-990-5_7","volume-title":"Advances in Ubiquitous Networking","author":"M Ed-Daibouni","year":"2016","unstructured":"Ed-Daibouni, M., Lebbat, A., Tallal, S., Medromi, H.: Toward a new extension of the access control model ABAC for cloud computing. In: Sabir, E., Medromi, H., Sadik, M. (eds.) Advances in Ubiquitous Networking. LNEE, vol. 366, pp. 79\u201389. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-287-990-5_7"},{"key":"3_CR5","unstructured":"Ethereum: Smart Contract Languages. https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/languages\/"},{"key":"3_CR6","unstructured":"Frankenfield, J.: Smart Contracts. https:\/\/www.investopedia.com\/terms\/s\/smart-contracts.asp"},{"key":"3_CR7","unstructured":"Hyperledger: Fabric CA User\u2019s Guide. https:\/\/hyperledger-fabric-ca.readthedocs.io\/en\/release-1.4\/users-guide.html"},{"key":"3_CR8","unstructured":"Hyperledger: Hyperledger Caliper. https:\/\/hyperledger.github.io\/caliper\/v0.5.0\/getting-started\/"},{"key":"3_CR9","unstructured":"Hyperledger: Hyperledger Fabric Documentation. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/"},{"key":"3_CR10","unstructured":"Hyperledger: Hyperledger Fabric SDKs. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/fabric-sdks.html"},{"key":"3_CR11","unstructured":"Hyperledger: Using the Fabric Test Network. https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/test_network.html"},{"key":"3_CR12","unstructured":"Hyperledger: What is Hyperledger Fabric? https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.2\/whatis.html"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Iftekhar, A., Cui, X., Tao, Q., Zheng, C.: Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy 23(8) (2021). https:\/\/doi.org\/10.3390\/e23081054, https:\/\/www.mdpi.com\/1099-4300\/23\/8\/1054","DOI":"10.3390\/e23081054"},{"key":"3_CR14","unstructured":"International Telecommunication Union: Public-Key and Attribute Certificate Frameworks. https:\/\/www.itu.int\/rec\/T-REC-X.509-201910-I\/en"},{"key":"3_CR15","unstructured":"IPFS: IPFS Documentation. https:\/\/docs.ipfs.io\/"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Islam, M.A., Madria, S.: A permissioned blockchain based access control system for IOT. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 469\u2013476 (2019). https:\/\/doi.org\/10.1109\/Blockchain.2019.00071","DOI":"10.1109\/Blockchain.2019.00071"},{"key":"3_CR17","unstructured":"Kelleher, J.: Why do bitcoins have value? https:\/\/www.investopedia.com\/ask\/answers\/100314\/why-do-bitcoins-have-value.asp"},{"key":"3_CR18","unstructured":"KeyFactor: What is PKI and How Does it Work? https:\/\/www.keyfactor.com\/resources\/what-is-pki\/"},{"key":"3_CR19","unstructured":"Lutkevich, B.: What is access control? https:\/\/www.techtarget.com\/searchsecurity\/definition\/access-control0"},{"key":"3_CR20","unstructured":"McGovern, T.: How many blockchains are there in 2022? https:\/\/earthweb.com\/how-many-blockchains-are-there\/"},{"key":"3_CR21","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Bitcoin.org (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"3_CR22","unstructured":"National Institute of Standards and Technology: X.509 Public Key Certificate. https:\/\/csrc.nist.gov\/glossary\/term\/x_509_public_key_certificate"},{"key":"3_CR23","unstructured":"Peng, L., Feng, W., Yan, Z., Li, Y., Zhou, X., Shimizu, S.: Privacy preservation in permissionless blockchain: a survey. Digit. Commun. Netw. (2020). https:\/\/www.researchgate.net\/publication\/342455474_Privacy_preservation_in_permissionless_blockchain_A_survey"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Rouhani, S., Deters, R.: Blockchain based access control systems: state of the art and challenges. In: IEEE\/WIC\/ACM International Conference on Web Intelligence, WI 2019, pp. 423\u2013428. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3350546.3352561","DOI":"10.1145\/3350546.3352561"},{"key":"3_CR25","unstructured":"Solana: Command Line Wallets. https:\/\/docs.solana.com\/wallet-guide\/cli"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Song, L., Li, M., Zhu, Z., Yuan, P., He, Y.: Attribute-based access control using smart contracts for the internet of things. Proc. Comput. Sci. 174, 231\u2013242 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.06.079, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050920315933. 2019 International Conference on Identification, Information and Knowledge in the Internet of Things","DOI":"10.1016\/j.procs.2020.06.079"},{"key":"3_CR27","unstructured":"SSL.com: What is a certificate authority? https:\/\/www.ssl.com\/faqs\/what-is-a-certificate-authority\/"},{"key":"3_CR28","unstructured":"Tapscott, D., Tapscott, A.: The blockchain revolution: how the technology behind bitcoin is changing money, business, and the world (2016)"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Xu, M., Chen, X., Kou, G.: A systematic review of blockchain. Financial Innovation (2019). https:\/\/jfin-swufe.springeropen.com\/articles\/10.1186\/s40854-019-0147-z","DOI":"10.1186\/s40854-019-0147-z"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Yang, Z., Shao, D., Qu, L., Zhang, M.: Internet of things access control system based on hyperledger. J. Phys.: Conf. Ser. 1748(4), 042031 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1748\/4\/042031","DOI":"10.1088\/1742-6596\/1748\/4\/042031"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Yutaka, M., Zhang, Y., Sasabe, M., Kasahara, S.: Using ethereum blockchain for distributed attribute-based access control in the internet of things. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9014155","DOI":"10.1109\/GLOBECOM38437.2019.9014155"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Zhao, X., Wang, S., Zhang, Y., Wang, Y.: Attribute-based access control scheme for data sharing on hyperledger fabric. J. Inf. Secur. Appl. 67, 103182 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103182, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212622000643","DOI":"10.1016\/j.jisa.2022.103182"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Blockchain Technology and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31420-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T13:03:48Z","timestamp":1682687028000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31420-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031314193","9783031314209"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31420-9_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockTEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain Technology and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocktea2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}