{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:21:05Z","timestamp":1768281665941,"version":"3.49.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031524257","type":"print"},{"value":"9783031524264","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-52426-4_8","type":"book-chapter","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:02:28Z","timestamp":1706076148000},"page":"100-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain-Driven Animal Healthcare: Leveraging NFTs, IPFS, and\u00a0Smart Contracts for\u00a0Comprehensive Animal Medical Record"],"prefix":"10.1007","author":[{"given":"T. L.","family":"Quy","sequence":"first","affiliation":[]},{"given":"N. D. P.","family":"Trong","sequence":"additional","affiliation":[]},{"given":"H. V.","family":"Khanh","sequence":"additional","affiliation":[]},{"given":"H. L.","family":"Huong","sequence":"additional","affiliation":[]},{"given":"T. D.","family":"Khoa","sequence":"additional","affiliation":[]},{"given":"H. G.","family":"Khiem","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Phuc","sequence":"additional","affiliation":[]},{"given":"M. D.","family":"Hieu","sequence":"additional","affiliation":[]},{"given":"V. C. P.","family":"Loc","sequence":"additional","affiliation":[]},{"given":"N. H.","family":"Kha","sequence":"additional","affiliation":[]},{"given":"N. T.","family":"Anh","sequence":"additional","affiliation":[]},{"given":"Q. N.","family":"Hien","sequence":"additional","affiliation":[]},{"given":"L. K.","family":"Bang","sequence":"additional","affiliation":[]},{"given":"Q. T.","family":"Bao","sequence":"additional","affiliation":[]},{"given":"N. T. K.","family":"Ngan","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Triet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"key":"8_CR1","unstructured":"Aigner, C.: Prototypical implementation of an animal health record (AHR) for livestock management. Ph.D. thesis (2014)"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.prevetmed.2014.01.017","volume":"113","author":"RM Anholt","year":"2014","unstructured":"Anholt, R.M., Berezowski, J., Jamal, I., Ribble, C., Stephen, C.: Mining free-text medical records for companion animal enteric syndrome surveillance. Prev. Vet. Med. 113(4), 417\u2013422 (2014)","journal-title":"Prev. Vet. Med."},{"key":"8_CR3","unstructured":"Anholt, R.: Informatics and the electronic medical record for syndromic surveillance in companion animals: development, application and utility. Ph.D. thesis, University of Calgary (2013)"},{"issue":"6","key":"8_CR4","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1177\/1098612X16656706","volume":"19","author":"S Burke","year":"2017","unstructured":"Burke, S., Black, V., S\u00e1nchez-Vizca\u00edno, F., Radford, A., Hibbert, A., Tasker, S.: Use of cefovecin in a UK population of cats attending first-opinion practices as recorded in electronic health records. J. Feline Med. Surg. 19(6), 687\u2013692 (2017)","journal-title":"J. Feline Med. Surg."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Duong-Trung, N., et al.: Multi-sessions mechanism for decentralized cash on delivery system. Int. J. Adv. Comput. Sci. Appl. 10(9) (2019)","DOI":"10.14569\/IJACSA.2019.0100973"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1080\/00480169.2019.1585990","volume":"67","author":"M Gates","year":"2019","unstructured":"Gates, M., Zito, S., Harvey, L., Dale, A., Walker, J.: Assessing obesity in adult dogs and cats presenting for routine vaccination appointments in the north island of New Zealand using electronic medical records data. N. Z. Vet. J. 67(3), 126\u2013133 (2019)","journal-title":"N. Z. Vet. J."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Gray, C., Radford, A.: Using electronic health records to explore negotiations around euthanasia decision making for dogs and cats in the UK. Vet. Rec. 190(9), no-no (2022)","DOI":"10.1002\/vetr.1379"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: Dem-cod: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71\u201378. IEEE (2020)","DOI":"10.1109\/TrustCom50675.2020.00023"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-68851-6_15","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"XS Ha","year":"2021","unstructured":"Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in\u00a0cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214\u2013227. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68851-6_15"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116\u2013120 (2019)","DOI":"10.1145\/3309074.3309097"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"e1940","DOI":"10.7717\/peerj.1940","volume":"4","author":"PH Kass","year":"2016","unstructured":"Kass, P.H., et al.: Syndromic surveillance in companion animals utilizing electronic medical records data: development and proof of concept. PeerJ 4, e1940 (2016)","journal-title":"PeerJ"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"e5161","DOI":"10.7717\/peerj.5161","volume":"6","author":"E Kim","year":"2018","unstructured":"Kim, E., et al.: Major medical causes by breed and life stage for dogs presented at veterinary clinics in the republic of Korea: a survey of electronic medical records. PeerJ 6, e5161 (2018)","journal-title":"PeerJ"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Le, H.T., et al.: Introducing multi shippers mechanism for decentralized cash on delivery system. Int. J. Adv. Comput. Sci. Appl. 10(6) (2019)","DOI":"10.14569\/IJACSA.2019.0100676"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1007\/978-3-030-96772-7_54","volume-title":"Parallel and Distributed Computing, Applications and Technologies","author":"HT Le","year":"2022","unstructured":"Le, H.T.: Patient-chain: patient-centered healthcare system a\u00a0blockchain-based technology in\u00a0dealing with\u00a0emergencies. In: Shen, H., et al. (eds.) PDCAT 2021. LNCS, vol. 13148, pp. 576\u2013583. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-96772-7_54"},{"issue":"5","key":"8_CR15","first-page":"677","volume":"10","author":"NTT Le","year":"2019","unstructured":"Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677\u2013684 (2019)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"8","key":"8_CR16","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1136\/vr.163.8.241","volume":"163","author":"S Men\u00e9ndez","year":"2008","unstructured":"Men\u00e9ndez, S., Steiner, A., Witschi, U., Danuser, J., Weber, U., Regula, G.: Data quality of animal health records on swiss dairy farms. Vet. Rec. 163(8), 241\u2013246 (2008)","journal-title":"Vet. Rec."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"e950","DOI":"10.7717\/peerj-cs.950","volume":"8","author":"LTT Nguyen","year":"2022","unstructured":"Nguyen, L.T.T., et al.: BMDD: a novel approach for IoT platform (broker-less and microservice architecture, decentralized identity, and dynamic transmission messages). PeerJ Comput. Sci. 8, e950 (2022)","journal-title":"PeerJ Comput. Sci."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-031-14391-5_14","volume-title":"Mobile Web and Intelligent Information Systems","author":"KL Quoc","year":"2022","unstructured":"Quoc, K.L., et al.: SSSB: an approach to insurance for cross-border exchange by using smart contracts. In: Awan, I., Younas, M., Poniszewska-Mara\u0144da, A. (eds.) MobiWIS 2022. LNCS, vol. 13475, pp. 179\u2013192. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-14391-5_14"},{"key":"8_CR19","unstructured":"Romar, A.: Fine-grained access control in an animal health record. Ph.D. thesis, Wien (2018)"},{"issue":"4","key":"8_CR20","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1093\/gerona\/glac220","volume":"78","author":"C Salt","year":"2023","unstructured":"Salt, C., Saito, E.K., O\u2019Flynn, C., Allaway, D.: Stratification of companion animal life stages from electronic medical record diagnosis data. J. Gerontol. Ser. A 78(4), 579\u2013586 (2023)","journal-title":"J. Gerontol. Ser. A"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12917-017-1138-9","volume":"13","author":"F S\u00e1nchez-Vizca\u00edno","year":"2017","unstructured":"S\u00e1nchez-Vizca\u00edno, F., et al.: Demographics of dogs, cats, and rabbits attending veterinary practices in great Britain as recorded in their electronic health records. BMC Vet. Res. 13, 1\u201313 (2017)","journal-title":"BMC Vet. Res."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Singleton, D.A., et al.: Pharmaceutical prescription in canine acute diarrhoea: a longitudinal electronic health record analysis of first opinion veterinary practices. Front. Vet. Sci. 218 (2019)","DOI":"10.3389\/fvets.2019.00218"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Son, H.X., Chen, E.: Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution. Int. J. Adv. Comput. Sci. Appl. 10(2) (2019)","DOI":"10.14569\/IJACSA.2019.0100265"},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-72389-1_40","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"HX Son","year":"2017","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501\u2013515. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_40"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76\u201380 (2019)","DOI":"10.1145\/3309074.3309091"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Son, H.X., et al.: Towards a mechanism for protecting seller\u2019s interest of cash on delivery by using smart contract in hyperledger. Int. J. Adv. Comput. Sci. Appl. 10(4) (2019)","DOI":"10.14569\/IJACSA.2019.0100405"},{"key":"8_CR27","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-030-20005-3_8","volume-title":"International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)","author":"HX Son","year":"2020","unstructured":"Son, H.X., Nguyen, M.H., Vo, H.K., Nguyen, T.P.: Toward an privacy protection based on access control model in hybrid cloud for healthcare systems. In: Mart\u00ednez \u00c1lvarez, F., Troncoso Lora, A., S\u00e1ez Mu\u00f1oz, J.A., Quinti\u00e1n, H., Corchado, E. (eds.) CISIS\/ICEUTE -2019. AISC, vol. 951, pp. 77\u201386. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-20005-3_8"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/978-3-030-86653-2_47","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"LNT Thanh","year":"2021","unstructured":"Thanh, L.N.T., et al.: Toward a security IoT platform with high rate transmission and low energy consumption. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12949, pp. 647\u2013662. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86653-2_47"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Thanh, L.N.T., et al.: UIP2SOP: a unique IoT network applying single sign-on and message queue protocol. Int. J. Adv. Comput. Sci. Appl. 12(6) (2021)","DOI":"10.14569\/IJACSA.2021.0120603"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-319-72389-1_44","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"QNT Thi","year":"2017","unstructured":"Thi, Q.N.T., Dang, T.K., Van, H.L., Son, H.X.: Using JSON to specify privacy preserving-enabled attribute-based access control policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 561\u2013570. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_44"},{"issue":"10","key":"8_CR31","doi-asserted-by":"publisher","first-page":"2020","DOI":"10.1017\/S0950268817000826","volume":"145","author":"J Tulloch","year":"2017","unstructured":"Tulloch, J., McGinley, L., S\u00e1nchez-Vizca\u00edno, F., Medlock, J., Radford, A.: The passive surveillance of ticks using companion animal electronic health records. Epidemiol. Infect. 145(10), 2020\u20132029 (2017)","journal-title":"Epidemiol. Infect."},{"key":"8_CR32","unstructured":"Willner, V.: Erhebung und Analyse der Anforderungen an einen Animal Health Record (AHR) f\u00fcr Kleintiere. Ph.D. thesis (2011)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Xuan, S.H., et al.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25\u201331. IEEE (2016)","DOI":"10.1109\/ACOMP.2016.014"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-52426-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:03:13Z","timestamp":1706076193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-52426-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031524257","9783031524264"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-52426-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MSPN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile, Secure, and Programmable Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mspn2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mspn2023.roc.cnam.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}