{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:42:31Z","timestamp":1770273751009,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T00:00:00Z","timestamp":1625011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10586-021-03352-x","type":"journal-article","created":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T14:03:02Z","timestamp":1625061782000},"page":"3551-3571","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations"],"prefix":"10.1007","volume":"24","author":[{"given":"Aqsa","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Asif","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Atta ur Rehman","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"3352_CR1","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.future.2020.10.021","volume":"117","author":"A Rashid","year":"2021","unstructured":"Rashid, A., Masood, A., Abbas, H.: cryptographic framework for role control remedy: a secure role engineering mechanism for single authority organizations. Future Gener. Comput. Syst. 117, 245\u2013258 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"3352_CR2","volume-title":"CON 2324. A Practical Guide to the Role. Engineering","author":"S McKinney","year":"2015","unstructured":"McKinney, S.: CON 2324. A Practical Guide to the Role. Engineering. JavaOne, San Francisco (2015)"},{"issue":"6","key":"3352_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MITP.2011.105","volume":"13","author":"EJ Coyne","year":"2011","unstructured":"Coyne, E.J., Weil, T.R., Kuhn, R.: Role engineering: methods and standards. IT Prof. 13(6), 54\u201357 (2011)","journal-title":"IT Prof."},{"issue":"6","key":"3352_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman, R.: An overview of PKI trust models. IEEE Netw. 13(6), 38\u201343 (1999)","journal-title":"IEEE Netw."},{"key":"3352_CR5","unstructured":"A TC TrustCenter Whitepaper. The Costs of Managed PKI. https:\/\/docplayer.net\/3211638-The-costs-of-managed-pki.html (2008). Accessed 26 Feb 2021"},{"key":"3352_CR6","unstructured":"OpenPGP.: www.openpgp.org. Accessed 26 Feb 2021"},{"key":"3352_CR7","first-page":"1","volume":"6","author":"M Bartel","year":"2013","unstructured":"Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML signature syntax and processing version 1.1. Signature 6, 1 (2013)","journal-title":"Signature"},{"key":"3352_CR8","unstructured":"Comodo.: Comodo fraud incident 2011-03-23, https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html (2011). Accessed 26 Feb 2021"},{"key":"3352_CR9","unstructured":"Microsoft, Erroneous VeriSign-issued digital certificates pose spoofing hazard, https:\/\/technet.microsoft.com\/library\/security\/ms01-017 (2010). Accessed 26 Feb 2021"},{"key":"3352_CR10","unstructured":"Hoogstraaten T.H., Niggebrugge D., Heppener D., Groenewegen F., Wettinck J., Strooy K., Arends P., Pols P., Kouprie R., Moorrees S., van Pelt X.: Black Tulip. Tech. Rep. (2012)"},{"key":"3352_CR11","unstructured":"Thilakarathne, N. N., Dilani W.: Improved hierarchical role-based access control model for cloud computing. arXiv preprint https:\/\/arxiv.org\/abs\/2011.07764 (2020)."},{"key":"3352_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-030-16962-6_10","volume-title":"Techno-Societal 2018","author":"AS Bhise","year":"2020","unstructured":"Bhise, A.S., Latif, P.M.T.: Secure cloud storage system by integrating trust with role-based access control and cryptographic algorithm. In: Techno-Societal 2018, pp. 87\u201397. Springer, Cham (2020)"},{"key":"3352_CR13","unstructured":"Sultan, N.H., Varadharajan, V., Zhou, L. and Barbhuiya, F.A.: A role-based encryption scheme for securing outsourced cloud data in a multi-organization context.\u00a0arXiv preprint https:\/\/arxiv.org\/abs\/2004.05419 (2020)"},{"key":"3352_CR14","doi-asserted-by":"publisher","first-page":"102074","DOI":"10.1016\/j.cose.2020.102074","volume":"100","author":"N Saravanan","year":"2021","unstructured":"Saravanan, N., Umamakeswari, A.: Lattice-based access control for protecting user data in cloud environments with hybrid security. Comput. Secur. 100, 102074 (2021)","journal-title":"Comput. Secur."},{"key":"3352_CR15","doi-asserted-by":"crossref","unstructured":"Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. arXiv preprint https:\/\/arxiv.org\/abs\/1906.11078 (2019)","DOI":"10.6028\/NIST.IR.8202"},{"key":"3352_CR16","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. (2008)"},{"key":"3352_CR17","unstructured":"Ethereum.: https:\/\/ethereum.org\/en\/ (2015). Accessed 21 Feb 2021"},{"issue":"3","key":"3352_CR18","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1007\/s10586-020-03138-7","volume":"23","author":"L Tseng","year":"2020","unstructured":"Tseng, L., Xinyu, Y., Safa, O., Moayad, A., Yaser, J.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23(3), 2151\u20132165 (2020)","journal-title":"Clust. Comput."},{"key":"3352_CR19","doi-asserted-by":"publisher","first-page":"103517","DOI":"10.1016\/j.csi.2021.103517","volume":"76","author":"L Tan","year":"2021","unstructured":"Tan, L., Huan, X., Keping, Y., Moayad, A., Yaser, J.: A blockchain-empowered crowdsourcing system for 5G-enabled smart cities. Comput. Stand. Interfaces 76, 103517 (2021)","journal-title":"Comput. Stand. Interfaces"},{"key":"3352_CR20","first-page":"183","volume-title":"17th International Conference on Information Technology-New Generations (ITNG)","author":"A Rashid","year":"2020","unstructured":"Rashid, A., Masood, A., Abbas, H.: Incorporating blockchain into role engineering: a reference architecture using ISO\/IEC\/IEEE 42010 notation. In: 17th International Conference on Information Technology-New Generations (ITNG), pp. 183\u2013189. Springer, Cham (2020)"},{"key":"3352_CR21","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1007\/978-3-030-44041-1_122","volume-title":"International Conference on Advanced Information Networking and Applications","author":"MU Rahman","year":"2020","unstructured":"Rahman, M.U., Guidi, B., Baiardi, F., Ricci, L.: Context-aware and dynamic role-based access control using blockchain. In: International Conference on Advanced Information Networking and Applications, pp. 1449\u20131460. Springer, Cham (2020)"},{"key":"3352_CR22","doi-asserted-by":"crossref","unstructured":"Akkaoui R., Hei X., Guo C., Cheng W.: RBAC-HDE: on the design of a role-based access control with smart contract for healthcare data exchange. In: 2019 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) IEEE. 1\u20132 (2019)","DOI":"10.1109\/ICCE-TW46550.2019.8991965"},{"key":"3352_CR23","first-page":"439","volume-title":"International Conference on Algorithms and Architectures for Parallel Processing","author":"Z Xu","year":"2019","unstructured":"Xu, Z., Jiao, T., Yang, L., Liu, D., Wen, S., Xiang, Y.: RBAC-GL: a role-based access control gasless architecture of consortium blockchain. In: International Conference on Algorithms and Architectures for Parallel Processing, pp. 439\u2013453. Springer, Cham (2019)"},{"key":"3352_CR24","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-030-37429-7_8","volume-title":"International Conference on Human-Centered Computing","author":"Y Ding","year":"2019","unstructured":"Ding, Y., Jin, J., Zhang, J., Wu, Z., Hu, K.: SC-RBAC: a smart contract based RBAC model for DApps. In: International Conference on Human-Centered Computing, pp. 75\u201385. Springer, Cham (2019)"},{"key":"3352_CR25","first-page":"336","volume-title":"International Conference on Blockchain and Trustworthy Systems","author":"J Li","year":"2019","unstructured":"Li, J., Hu, S., Shi, Y., Zhang, C.: A blockchain-based trustable framework for IoT data storage and access. In: International Conference on Blockchain and Trustworthy Systems, pp. 336\u2013349. Springer, Singapore (2019)"},{"key":"3352_CR26","doi-asserted-by":"crossref","unstructured":"Lee Y., Lee K.M.: Blockchain-based RBAC for user authentication with anonymity. In: Proceedings of the Conference on Research in Adaptive and Convergent Systems. 289\u2013294 (2019)","DOI":"10.1145\/3338840.3355673"},{"issue":"122","key":"3352_CR27","first-page":"40","volume":"6","author":"JP Cruz","year":"2018","unstructured":"Cruz, J.P., Kaji, Y., Yanai, N.: RBAC-SC: role-based access control using a smart contract. IEEE Access. 6(122), 40\u201351 (2018)","journal-title":"IEEE Access."},{"key":"3352_CR28","first-page":"335","volume-title":"International Conference on Business Information Systems","author":"C Ihle","year":"2018","unstructured":"Ihle, C., Sanchez, O.: Smart contract-based role management on the blockchain. In: International Conference on Business Information Systems, pp. 335\u2013343. Springer, Cham (2018)"},{"key":"3352_CR29","doi-asserted-by":"crossref","unstructured":"Rouhani, S., Butterworth, L., Simmons, A.D., Humphery, D.G. and Deters, R.: MediChain TM: a secure decentralized medical data asset management system. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 1533\u20131538 (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00258"},{"issue":"11","key":"3352_CR30","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.Y.: Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern. 49(11), 2266\u20132277 (2019)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"2","key":"3352_CR31","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/fi10020020","volume":"10","author":"V Gatteschi","year":"2018","unstructured":"Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., Santamar\u00eda, V.: Blockchain and smart contracts for insurance: is the technology mature enough? Future Internet 10(2), 20 (2018)","journal-title":"Future Internet"},{"issue":"5","key":"3352_CR32","doi-asserted-by":"publisher","first-page":"1754","DOI":"10.1093\/rfs\/hhz007","volume":"32","author":"LW Cong","year":"2019","unstructured":"Cong, L.W., He, Z.: Blockchain disruption and smart contracts. Rev. Financ. Stud. 32(5), 1754\u20131797 (2019)","journal-title":"Rev. Financ. Stud."},{"key":"3352_CR33","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress) IEEE.\u00a0557\u2013564 (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"3352_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01127-0","author":"SN Khan","year":"2021","unstructured":"Khan, S.N., Faiza, L., Chirine, G.G., Elhadj, B., Anoud, B.: Blockchain smart contracts: applications, challenges, and future trends. Peer Peer Netw. Appl. (2021). https:\/\/doi.org\/10.1007\/s12083-021-01127-0","journal-title":"Peer Peer Netw. Appl."},{"key":"3352_CR35","doi-asserted-by":"crossref","unstructured":"Wohrer, M., Zdun, U.: Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE) IEEE. 2\u20138 (2018)","DOI":"10.1109\/IWBOSE.2018.8327565"},{"issue":"8","key":"3352_CR36","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s11623-017-0819-7","volume":"41","author":"C Sillaber","year":"2017","unstructured":"Sillaber, C., Waltl, B.: Life cycle of smart contracts in blockchain ecosystems. Datenschutz und Datensicherheit-DuD 41(8), 497\u2013500 (2017)","journal-title":"Datenschutz und Datensicherheit-DuD"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03352-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03352-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03352-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T18:24:15Z","timestamp":1635618255000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03352-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["3352"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03352-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,30]]},"assertion":[{"value":"19 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}