{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:40:08Z","timestamp":1743079208777,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819944293"},{"type":"electronic","value":"9789819944309"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-4430-9_14","type":"book-chapter","created":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:04:44Z","timestamp":1689789884000},"page":"195-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Token-Based Access Control Mechanism for\u00a0the\u00a0Internet of\u00a0Things Using Blockchain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9068-4589","authenticated-orcid":false,"given":"Yuzheng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Haoxiang","family":"Song","sequence":"additional","affiliation":[]},{"given":"Huachun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,20]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Chopra, K., Gupta, K., Lambora, A.: Future internet: the internet of things-a literature review. In: 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), pp. 135\u2013139. IEEE (2019) Location (1999)","DOI":"10.1109\/COMITCon.2019.8862269"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.jnca.2017.04.002","volume":"88","author":"FA Alaba","year":"2017","unstructured":"Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 10\u201328 (2017). https:\/\/doi.org\/10.1016\/j.jnca.2017.04.002","journal-title":"J. Netw. Comput. Appl."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.eng.2021.10.002","volume":"8","author":"XS Shen","year":"2022","unstructured":"Shen, X.S., Liu, D., Huang, C., Xue, L., Yin, H., Zhuang, W., et al.: Blockchain for transparent data management toward 6G. Engineering 8, 74\u201385 (2022). https:\/\/doi.org\/10.1016\/j.eng.2021.10.002","journal-title":"Engineering"},{"key":"14_CR4","unstructured":"Zhang, Y., Wu, X.: Access control in internet of things: a survey. arXiv preprint arXiv:1610.01065 (2016)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8\u201327 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2017.11.002","journal-title":"J. Inf. Secur. Appl."},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations. In: Proceedings of the Annual Computer Security Applications Conference, Los Alamitos, Calif, (1995). https:\/\/doi.org\/10.1145\/266741.266758","DOI":"10.1145\/266741.266758"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Kuhn, D.R., Ferraiolo, D.F., Voas, J.: Attribute-based access control. Computer 48(2), 85\u201388 (2015). https:\/\/doi.org\/10.1109\/MC.2015.33","journal-title":"Computer"},{"issue":"5\u20136","key":"14_CR8","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"S Gusmeroli","year":"2013","unstructured":"Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58(5\u20136), 1189\u20131205 (2013). https:\/\/doi.org\/10.1016\/j.mcm.2013.02.006","journal-title":"Math. Comput. Model."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"54189","DOI":"10.1109\/ACCESS.2020.2979746","volume":"8","author":"G Gan","year":"2020","unstructured":"Gan, G., Chen, E., Zhou, Z., Zhu, Y.: Token-based access control. IEEE Access 8, 54189\u201354199 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2979746","journal-title":"IEEE Access"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1587\/transinf.2019INI0002","volume":"103","author":"W Li","year":"2020","unstructured":"Li, W., Meng, W., Liu, Z., Au, M.: Towards blockchain-based software-defined networking: security challenges and solutions. IEICE Trans. Inf. Syst. 103(2), 196\u2013203 (2020). https:\/\/doi.org\/10.1587\/transinf.2019INI0002","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"10","key":"14_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8832568","volume":"2020","author":"S Sun","year":"2020","unstructured":"Sun, S., Chen, S., Du, R.: Trusted and efficient cross-domain access control system based on blockchain. Sci. Program. 2020(10), 1\u201313 (2020). https:\/\/doi.org\/10.1155\/2020\/8832568","journal-title":"Sci. Program."},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Xu, R., Chen, Y., Blasch, E., Chen, G.: Blendcac: a blockchain-enabled decentralized capability-based access control for IoTs. In: 2018 IEEE International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1027\u20131034. IEEE (2018). https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00191","DOI":"10.1109\/Cybermatics_2018.2018.00191"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-4430-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T18:19:21Z","timestamp":1689790761000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-4430-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819944293","9789819944309"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-4430-9_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisecsymposium2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.info\/conf\/mobisec22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}