{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:06:03Z","timestamp":1743077163297,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_47","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T12:01:52Z","timestamp":1549540912000},"page":"444-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Study on Application Method for Automation Solution Using Blockchain dApp Platform"],"prefix":"10.1007","author":[{"given":"Seong-Kyu","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hyun-Taek","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Young-Kun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Yong-Pil","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dae-Won","family":"Keum","sequence":"additional","affiliation":[]},{"given":"Ung-Mo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"47_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, pp. 1\u20139 (2008)"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Huh, J.-H., Seo, K.: Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J. Supercomput. 1\u201317 (2018)","DOI":"10.1007\/s11227-018-2496-1"},{"issue":"5","key":"47_CR3","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1007\/s11227-016-1672-4","volume":"72","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862\u20131877 (2016)","journal-title":"J. Supercomput."},{"key":"47_CR4","unstructured":"Chen, Y.: Blockchain tokens and the potential democratization of entrepreneurship and innovation. In: SSRN, pp. 12\u201313 (2017)"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ijinfomgt.2017.12.005","volume":"39","author":"Y Nir Kshetri","year":"2018","unstructured":"Nir Kshetri, Y.: Blockchain\u2019s roles in meeting key supply chain management objectives. Int. J. Inf. Manag. 39, 80\u201382 (2018)","journal-title":"Int. J. Inf. Manag."},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Savelyev, A.: Copyright in the Blockchain Era: promises and challenges. Comput. Law Secur. Rev. (2018)","DOI":"10.2139\/ssrn.3075246"},{"issue":"10","key":"47_CR7","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N.: Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10), 1027\u20131038 (2017)","journal-title":"Telecommun. Policy"},{"issue":"7","key":"47_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/en12010001","volume":"11","author":"S-K Kim","year":"2018","unstructured":"Kim, S.-K., Huh, J.-H.: A study on the improvement of smart grid security performance and blockchain smart grid perspective. Energies 11(7), 1\u201322 (2018). MDPI","journal-title":"Energies"},{"key":"47_CR9","first-page":"187","volume-title":"Handbook of Blockchain, Digital Finance, and Inclusion","author":"RB Levin","year":"2017","unstructured":"Levin, R.B., Waltz, P., LaCount, H.: Betting blockchain will change everything \u2013 SEC and CFTC regulation of blockchain technology. Handbook of Blockchain, Digital Finance, and Inclusion, vol. 2, pp. 187\u2013212. Elsevier, Cambridge (2017)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Prybila, C., Schulte, S., Hochreiner, C., Webe, I.: Runtime verification for business processes utilizing the Bitcoin Blockchain. Future Gener. Comput. Syst. (2017)","DOI":"10.1016\/j.future.2017.08.024"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.apenergy.2017.03.039","volume":"195","author":"JJ Sikorski","year":"2017","unstructured":"Sikorski, J.J., Haughton, J., Kraft, M.: Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl. Energy 195, 234\u2013246 (2017)","journal-title":"Appl. Energy"},{"key":"47_CR12","doi-asserted-by":"crossref","unstructured":"Saberi, S., Kouhizadeh, M., Sarkis, J.: Blockchain technology: a panacea or pariah for resources conservation and recycling. In: TTC, pp. 15\u201316 (2018)","DOI":"10.1016\/j.resconrec.2017.11.020"},{"issue":"9","key":"47_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.14257\/ijhit.2016.9.9.27","volume":"9","author":"J-H Huh","year":"2016","unstructured":"Huh, J.-H., Seo, K.: A typeface searching technique using evaluation functions for shapes and positions of alphabets used in ancient books for image searching. Int. J. Hybrid Inf. Technol. 9(9), 283\u2013292 (2016). SERSC","journal-title":"Int. J. Hybrid Inf. Technol."},{"issue":"6","key":"47_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su10061919","volume":"10","author":"J-H Huh","year":"2018","unstructured":"Huh, J.-H.: Server operation and virtualization to save energy and cost in future sustainable computing. Sustainability 10(6), 1\u201320 (2018). MDPI","journal-title":"Sustainability"},{"key":"47_CR15","doi-asserted-by":"crossref","unstructured":"Qin, B., et al.: Cecoin: a decentralized PKI mitigating MitM attacks. Future Gener. Comput. Syst. (2017)","DOI":"10.1016\/j.future.2017.08.025"},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., He, D., Ji, Y.: Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. In: TTC, pp. 21\u201324 (2017)","DOI":"10.1016\/j.future.2017.06.028"},{"key":"47_CR17","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/B978-0-12-811758-3.00015-2","volume-title":"Innovation and Disruption at the Grid's Edge","author":"Sabine L\u00f6bbe","year":"2017","unstructured":"L\u00f6bbe, S., Hackbarth, A.: The Transformation of the German Electricity Sector and the Emergence of New Business Models in Distributed Energy Systems, pp. 287\u2013318. Elsevier, Cambridge (May 2017). Chapter 15"},{"key":"47_CR18","doi-asserted-by":"crossref","unstructured":"Huh, J.-H.: Smart grid test bed using OPNET and power line communication. In: Advances in Computer and Electrical Engineering, pp. 1\u2013425. IGI Global, USA (2017)","DOI":"10.4018\/978-1-5225-2776-3"},{"key":"47_CR19","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R.: Towards an optimized blockchain for IoT. In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173\u2013178. ACM (2017)","DOI":"10.1145\/3054977.3055003"},{"key":"47_CR20","doi-asserted-by":"publisher","first-page":"162","DOI":"10.3390\/s18010162","volume":"18","author":"C Pop","year":"2018","unstructured":"Pop, C., Cioara, T., Antal, M., Anghel, I., Salomie, I., Bertoncini, M.: Blockchain based decentralized management of demand response programs in smart energy grids. Sensors 18, 162 (2018). MDPI","journal-title":"Sensors"},{"issue":"20","key":"47_CR21","first-page":"1","volume":"7","author":"J-H Huh","year":"2017","unstructured":"Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(20), 1\u201319 (2017)","journal-title":"Hum.-centric Comput. Inf. Sci."},{"key":"47_CR22","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerComWorkshops), Kona, HI, USA, 13\u201317 March 2017 (2017)","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"47_CR23","doi-asserted-by":"crossref","unstructured":"Huh, J.-H., Kim, T.-J.: A location-based mobile health care facility search system for senior citizens. J. Supercomput. 1\u201318 (2018)","DOI":"10.1007\/s11227-018-2342-5"},{"issue":"11","key":"47_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2994581","volume":"59","author":"S Underwood","year":"2016","unstructured":"Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15\u201317 (2016)","journal-title":"Commun. ACM"},{"key":"47_CR25","doi-asserted-by":"crossref","unstructured":"Leiding, B., Memarmoshrefi, P., Hogrefe, D.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137\u2013140. ACM (2016)","DOI":"10.1145\/2968219.2971409"},{"key":"47_CR26","doi-asserted-by":"crossref","unstructured":"Pass, R., Shi, E.: Fruitchains: a fair blockchain. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, pp. 315\u2013324. ACM (2017)","DOI":"10.1145\/3087801.3087809"},{"key":"47_CR27","doi-asserted-by":"crossref","unstructured":"Ngu, H.C.V., Huh, J.-H.: B+-tree construction on massive data with Hadoop. Cluster Comput. 1\u201311 (2017)","DOI":"10.1007\/s10586-017-1183-y"},{"key":"47_CR28","doi-asserted-by":"crossref","unstructured":"Karame, G.: On the security and scalability of bitcoin\u2019s blockchain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1861\u20131862. ACM (2016)","DOI":"10.1145\/2976749.2976756"},{"issue":"9","key":"47_CR29","first-page":"257","volume":"9","author":"J-H Huh","year":"2015","unstructured":"Huh, J.-H., Seo, K.: Hybrid advanced metering infrastructure design for micro grid using the game theory model. Int. J. Softw. Eng. Appl. 9(9), 257\u2013268 (2015). SERSC","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"47_CR30","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Koutsoupias, E., Kyropoulou, M., Tselekounis, Y.: Blockchain mining games. In: Proceedings of the 2016 ACM Conference on Economics and Computation, pp. 365\u2013382. ACM (2016)","DOI":"10.1145\/2940716.2940773"},{"key":"47_CR31","unstructured":"Hori, M., Ohashi, M.: Adaptive Identity authentication of blockchain system-the collaborative cloud educational system. In: EdMedia+Innovate Learning, Association for the Advancement of Computing in Education (AACE), pp. 1339\u20131346 (2018)"},{"key":"47_CR32","doi-asserted-by":"crossref","unstructured":"Lee, S., Huh, J.-H.: An effective security measures for nuclear power plant using big data analysis approach. J. Supercomput. 1\u201328 (2018)","DOI":"10.1007\/s11227-018-2440-4"},{"issue":"22","key":"47_CR33","first-page":"27","volume":"1060","author":"D Florescu","year":"1999","unstructured":"Florescu, D., Kossmann, D.: Storing and querying XML data using an RDMBS. Special Issue IEEE Data Eng. Bull. 1060(22), 27\u201334 (1999). IEEE","journal-title":"Special Issue IEEE Data Eng. Bull."},{"key":"47_CR34","unstructured":"Shanmugasundaram, J., et al.: Relational databases for querying XML documents: limitations and opportunities. In: Proceedings of VLDB, Edinburgh, Scotland (1999)"},{"issue":"2","key":"47_CR35","first-page":"37","volume":"9","author":"J-H Huh","year":"2015","unstructured":"Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. 9(2), 37\u201348 (2015). SERSC","journal-title":"Int. J. Secur. Appl."},{"issue":"5","key":"47_CR36","first-page":"653","volume":"19","author":"IC Lin","year":"2017","unstructured":"Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. I. J. Netw. Secur. 19(5), 653\u2013659 (2017)","journal-title":"I. J. Netw. Secur."},{"key":"47_CR37","doi-asserted-by":"crossref","unstructured":"Eom, S., Huh, J.-H.: Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. J. Ambient Intell. Human. Comput. 1\u201311 (2018)","DOI":"10.1007\/s12652-018-0698-2"},{"issue":"4","key":"47_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147718767630","volume":"14","author":"J-H Huh","year":"2018","unstructured":"Huh, J.-H.: Implementation of lightweight intrusion detection model for security of smart green house and vertical farm. Int. J. Distrib. Sens. Netw. 14(4), 1\u201311 (2018)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"47_CR39","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.telpol.2017.09.003","volume":"41","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N.: Blockchain\u2019s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41, 1027\u20131038 (2017)","journal-title":"Telecommun. Policy"},{"key":"47_CR40","doi-asserted-by":"crossref","unstructured":"Jabbar, K., Bj\u00f8rn, P.: Growing the Blockchain information infrastructure. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 6487\u20136498. ACM (2017)","DOI":"10.1145\/3025453.3025959"},{"key":"47_CR41","unstructured":"Due.com: How blockchain improves security and transaction times. Nasdaq (2017). http:\/\/www.nasdaq.com\/article\/how-blockchain-improves-securityand-transaction-times-cm771339 . Accessed 1 Aug 2018"},{"key":"47_CR42","unstructured":"Higgins, S.: Hours after launch, OpenBazaar sees first drug listings. CoinDesk (2016). http:\/\/www.coindesk.com\/drugs-contraband-openbazaar\/ . Accessed 1 Aug 2018"},{"key":"47_CR43","unstructured":"Young, J.: Hackers eye e-commerce platforms, bitcoin-based OpenBazaar to capitalize. The Cointelegraph (2016). https:\/\/cointelegraph.com\/news\/hackerseye-e-commerce-platforms-bitcoin-based-openbazaar-to-capitalize . Accessed 1 Aug 2018"},{"key":"47_CR44","unstructured":"Mainelli, M.: Blockchain will help us prove our identities in a digital world. Harvard Business Review (2017). https:\/\/hbr.org\/2017\/03\/blockchain-willhelp-us-prove-our-identities-in-a-digital-world . Accessed 1 Aug 2018"},{"issue":"4","key":"47_CR45","first-page":"27","volume":"2","author":"T Bray","year":"1997","unstructured":"Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML). World Wide Web J. 2(4), 27\u201366 (1997)","journal-title":"World Wide Web J."},{"key":"47_CR46","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Fernandez, M., Suciu, D.: Storing semistructured data with STORED. In: Proceedings of ACM SIGMOD. ACM, Philadelphia (1999)","DOI":"10.1145\/304182.304220"},{"key":"47_CR47","unstructured":"Florescu, D., Kossmann, D.: A performance evaluation of alternative mapping schemes for storing XML data in a relational database. Technical report, INRIA, France (1999)"}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T14:41:53Z","timestamp":1662907313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_47","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}