{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:38:58Z","timestamp":1770748738626,"version":"3.50.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00919-8","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:48:15Z","timestamp":1730303295000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case"],"prefix":"10.1007","volume":"24","author":[{"given":"Manal","family":"Jlil","sequence":"first","affiliation":[]},{"given":"Kaoutar","family":"Jouti","sequence":"additional","affiliation":[]},{"given":"Jaouad","family":"Boumhidi","sequence":"additional","affiliation":[]},{"given":"Chakir","family":"Loqman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"919_CR1","unstructured":"Singore, O., Chesi, F., Pallotti, M.: E-Government: Challenges and Opportunities, CMG Italy XIX Annual Conference, (2005)"},{"key":"919_CR2","unstructured":"Ntulo, G. Otike, J.: E-Government: Its Role, Importance and Challenges, Academia, (2013)"},{"key":"919_CR3","first-page":"154","volume":"107214","author":"S Majdoub","year":"2021","unstructured":"Majdoub, S., Loqman, C.: A new integer model for the management of booking stays at summer resorts. Comput. Ind. Eng. 107214, 154 (2021)","journal-title":"Comput. Ind. Eng."},{"key":"919_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.14569\/IJACSA.2021.0121008","volume":"12","author":"B Oumkaltoum","year":"2021","unstructured":"Oumkaltoum, B., Omar, E.B., Loqman, C., Aris, O.: Hybrid e-government framework based on datawarehousing and MAS for data interoperability. IJACSA 12, 10 (2021)","journal-title":"IJACSA"},{"key":"919_CR5","unstructured":"COMNET-IT: Country profiles of e-governance, (2002)"},{"issue":"1","key":"919_CR6","first-page":"9","volume":"4","author":"ZB Nechba","year":"2022","unstructured":"Nechba, Z.B., Boujibar, A., Alj, A.: Good governance and digitalization in Morocco: state of the art. Int. J. Bus. Technol. Stud. Res. 4(1), 9 (2022)","journal-title":"Int. J. Bus. Technol. Stud. Res."},{"key":"919_CR7","unstructured":"Abdelkhalek, T., et al.: How Can the Digital Economy Benefit Morocco and All Moroccans? The Economic Research Forum, Working Paper N 1503, p. 38, (2021)"},{"key":"919_CR8","unstructured":"United Nations, E-Government Survey 2022 The Future of Digital Government, New York, p. 63, (2022)"},{"key":"919_CR9","doi-asserted-by":"crossref","unstructured":"Collomosse, J., Bui, T., Brown, A., Sheridan, J., Green, A., Bell, M., Fawcett, J., Higgins, J., Thereaux, O.: Trusted archives of digital public documents, arXiv, p. 1804.08342v1, (2018)","DOI":"10.1145\/3209280.3229120"},{"key":"919_CR10","doi-asserted-by":"crossref","unstructured":"Bui, T., Cooper, D., Collomosse, J., Bell, M., Green, A., Sheridan, J., Higgins, J., Das, A., Keller, J., Thereaux, O., Brown, A.: Brown, ARCHANGEL: Tamper-proofing video archives using temporal content hashes on the Blockchain, arXiv, 1904.12059v1, (2019)","DOI":"10.1109\/CVPRW.2019.00338"},{"issue":"10","key":"919_CR11","doi-asserted-by":"publisher","first-page":"e0163477","DOI":"10.1371\/journal.pone.0163477","volume":"11","author":"J Yli-Huumo","year":"2016","unstructured":"Yli-Huumo, J., Ko, D., Choi, S., Park, S., Smolander, K.: Where is current research on blockchain technology?\u2014A systematic review. PLoS ONE 11(10), e0163477 (2016)","journal-title":"PLoS ONE"},{"key":"919_CR12","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.giq.2017.09.007","volume":"34","author":"S \u00d8lnesa","year":"2017","unstructured":"\u00d8lnesa, S., Ubachtb, J., Janssen, M.: Blockchain in government: benefits and implications of distributed ledger technology for information sharing. Gov. Inf. Q. 34, 355\u2013364 (2017)","journal-title":"Gov. Inf. Q."},{"key":"919_CR13","doi-asserted-by":"publisher","unstructured":"Zhou, I., Makhdoom, I., Abolhasan, M., Lipman, J. Shariati, N.: A Blockchain-based File-sharing System for Academic Paper Review. (2019). https:\/\/doi.org\/10.1109\/ICSPCS47537.2019.9008695","DOI":"10.1109\/ICSPCS47537.2019.9008695"},{"key":"919_CR14","unstructured":"Adjei-Mensah, I., Agyemang, I.O., Sey, C., Fiasam, L.D. and Salako, A.A.: Securing music sharing platforms: A blockchain-based approach. arXiv preprint arXiv:2110.05949. (2021)"},{"issue":"7","key":"919_CR15","doi-asserted-by":"publisher","first-page":"2621","DOI":"10.3390\/app10072621","volume":"10","author":"I Permatasari","year":"2020","unstructured":"Permatasari, I., Essaid, M., Kim, H., Ju, H.: Blockchain implementation to verify archives integrity on Cilegon e-archive. Appl. Sci. 10(7), 2621 (2020)","journal-title":"Appl. Sci."},{"key":"919_CR16","doi-asserted-by":"publisher","first-page":"9118","DOI":"10.3390\/s22239118","volume":"22","author":"M Pincheira","year":"2022","unstructured":"Pincheira, M., Donini, E., Vecchio, M., Kanhere, S.: A decentralized architecture for trusted dataset sharing using smart contracts and distributed storage. Sens. MDPI 22, 9118 (2022). https:\/\/doi.org\/10.3390\/s22239118","journal-title":"Sens. MDPI"},{"key":"919_CR17","doi-asserted-by":"crossref","unstructured":"Nyaletey, E., Parizi, R.M., Zhang, Q., Choo, K.K.R.: BlockIPFS-blockchain-enabled interplanetary file system for forensic and trusted data traceability. In: Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, pp.18\u201325, (2019)","DOI":"10.1109\/Blockchain.2019.00012"},{"key":"919_CR18","doi-asserted-by":"crossref","unstructured":"Pincheira, M.; Donini, E.; Giaffreda, R.; Vecchio, M. A.: Blockchain-Based Approach To Enable Remote Sensing Trusted Data. In: Proceedings of the 2020 IEEE Latin American GRSS and ISPRS Remote Sensing Conference (LAGIRS), Santiago, Chile, pp. 652\u2013657, (2020)","DOI":"10.1109\/LAGIRS48042.2020.9165589"},{"key":"919_CR19","unstructured":"Andreas M. Antonopoulos, Mastering Bitcoin, O\u2019Reilly Media, 1005 Gravenstein Highway North, Sebastopol, CA 95472, (2014)"},{"key":"919_CR20","doi-asserted-by":"crossref","unstructured":"Paik, H.Y., Xu, X., Bandara, H.D., Lee, S.U. Lo, S.K., Analysis of Data Management in Blockchain-based Systems: From Architecture to Governance, IEEE Access, p. 2961404. (2019)","DOI":"10.1109\/ACCESS.2019.2961404"},{"key":"919_CR21","unstructured":"Pors, M.: Understanding the IPFS White Paper part 2. Accessed, https:\/\/decentralized.blog\/understanding-the-ipfswhite-paper-part-2.html. (2023)"},{"key":"919_CR22","doi-asserted-by":"crossref","unstructured":"Nizamuddin, N., Hasan, H.R., Salah K.: IPFS-blockchain-based authenticity of online publications, pp. 199\u2013212. Springer (2018)","DOI":"10.1007\/978-3-319-94478-4_14"},{"key":"919_CR23","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-eer electronic cash system, bitcoin white paper, (2008)"},{"issue":"15","key":"919_CR24","doi-asserted-by":"publisher","first-page":"26","DOI":"10.35429\/JRD.2019.15.5.26.37","volume":"5","author":"A Antolino-Hern\u00e1ndez","year":"2019","unstructured":"Antolino-Hern\u00e1ndez, A., Ferreira-Medina, H., Torres-Millarez, C., Olivares-Rojas, J.C.: Management of digital documents with encrypted signature, through the use of centralized PKI, and distributed using blockchain for a secure exchange. J. Res. Dev. 5(15), 26\u201337 (2019)","journal-title":"J. Res. Dev."},{"key":"919_CR25","doi-asserted-by":"crossref","unstructured":"Alslman, Y.S., Taleb, AA.: Exchanging Digital Documents Using Blockchain Technology, the 3rd International Conference on Electrical, Communication and Computer Engineering (ICECCE), (2021)","DOI":"10.1109\/ICECCE52056.2021.9514253"},{"key":"919_CR26","unstructured":"Zaanoun A.: Morocco: The Impact of the digitization of public services, Arab Reform Initiative (2023)"},{"issue":"4","key":"919_CR27","first-page":"4","volume":"2","author":"C Elhilali","year":"2022","unstructured":"Elhilali, C.: Public administration reform and development stakes in Morocco. J. Legal Ethical Regul. Issues 2(4), 4 (2022)","journal-title":"J. Legal Ethical Regul. Issues"},{"key":"919_CR28","unstructured":"Bult T.: Security analysis of blockchain technology, Business Information Technology, (2019)"},{"key":"919_CR29","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.compeleceng.2019.03.014","volume":"76","author":"N Nizamuddina","year":"2019","unstructured":"Nizamuddina, N., Salaha, K., Ajmal Azadb, M., Arshadc, J., Rehmand, M.H.: Decentralized document version control using Ethereum blockchain and IPFS. Comput. Electr. Eng. 76, 183\u2013197 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"919_CR30","doi-asserted-by":"crossref","unstructured":"Hasan H.R., Salah K., (Senior Member, IEEE), Yaqoob I., Raja Jayarman, Sasa Pesic, AND Omar M.: Trustworthy IoT Data Streaming Using Blockchain and IPFS, in IEEE Access, (2022)","DOI":"10.1109\/ACCESS.2022.3149312"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00919-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00919-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00919-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:13:32Z","timestamp":1739337212000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00919-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["919"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00919-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"16 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}},{"value":"The authors confirm that any aspect of the work covered in this manuscript that has involved human patients has been conducted with the ethical approval of all relevant bodies and that such approvals are acknowledged within the manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"9"}}