{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T18:06:47Z","timestamp":1762193207595,"version":"build-2065373602"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T00:00:00Z","timestamp":1758240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05320-1","type":"journal-article","created":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T17:02:18Z","timestamp":1758301338000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly-free federated access control policy enforcement framework for ethereum"],"prefix":"10.1007","volume":"28","author":[{"given":"Swagatika","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]},{"given":"Samrat","family":"Mondal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,19]]},"reference":[{"key":"5320_CR1","doi-asserted-by":"publisher","unstructured":"Next-generation big data federation access control: A reference model 2020. Future Generation Computer Systems 108, 726\u2013741 (2020). https:\/\/doi.org\/10.1016\/j.future.2020.02.052","DOI":"10.1016\/j.future.2020.02.052"},{"issue":"2020","key":"5320_CR2","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.jpdc.2020.05.012","volume":"144","author":"C Alcaraz","year":"2020","unstructured":"Alcaraz, C., Rubio, J.E., Lopez, Javier: Blockchain-assisted access for federated smart grid domains: coupling and features. J. Parallel Distrib. Comput. 144(2020), 124\u2013135 (2020). https:\/\/doi.org\/10.1016\/j.jpdc.2020.05.012","journal-title":"J. Parallel Distrib. Comput."},{"issue":"2021","key":"5320_CR3","doi-asserted-by":"publisher","first-page":"102593","DOI":"10.1109\/ACCESS.2021.3094365","volume":"9","author":"I Aliyu","year":"2021","unstructured":"Aliyu, I., Feliciano, M.C., Van Engelenburg, S., Kim, D.O., Lim, C.G.: A blockchain-based federated forest for SDN-enabled in-vehicle network intrusion detection system. IEEE Access 9(2021), 102593\u2013102608 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3094365","journal-title":"IEEE Access"},{"key":"5320_CR4","doi-asserted-by":"publisher","unstructured":"Ashraf, E., Areed, Nihal, F.F., Salem, H., Abdelhay, E.H., Farouk, A.: (2022) FIDChain: Federated Intrusion Detection System for Blockchain-Enabled IoT Healthcare Applications. Healthcare 10(6), 2227\u20139032 . https:\/\/doi.org\/10.3390\/healthcare10061110","DOI":"10.3390\/healthcare10061110"},{"issue":"3","key":"5320_CR5","first-page":"189","volume":"17","author":"M Ayache","year":"2016","unstructured":"Ayache, M., Erradi, M., Khoumsi, A., Freisleben, B.: Analysis and verification of XACML policies in a medical cloud environment. Scalable Comput. 17(3), 189\u2013206 (2016)","journal-title":"Scalable Comput."},{"key":"5320_CR6","unstructured":"Bah, Abdramane, Andr\u00e9, Pascal, Attiogb\u00e9, Christian, Konat\u00e9, Jacqueline: Federated access control in service oriented architecture. Ph.\u00a0D. Dissertation. LS2N, Universit\u00e9 de Nantes (2019)"},{"issue":"2","key":"5320_CR7","first-page":"487","volume":"5","author":"P Barkha","year":"2017","unstructured":"Barkha, P., Sahani, G.: Analysis of various RBAC and ABAC based access control models with their extension. Int. J. Eng. Develop. Res 5(2), 487\u2013492 (2017)","journal-title":"Int. J. Eng. Develop. Res"},{"issue":"5","key":"5320_CR8","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TSE.2006.49","volume":"32","author":"R Bhatti","year":"2006","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: X-FEDERATE: a policy engineering framework for federated access management. IEEE Trans. Softw. Eng. 32(5), 330\u2013346 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5320_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2024.3495230","volume":"2024","author":"D Bringhenti","year":"2024","unstructured":"Bringhenti, D., Bussa, S., Sisto, R., Valenza, F.: Atomizing Firewall Policies for Anomaly Analysis and Resolution. IEEE Trans. Dependable Secure Comput. 2024, 1\u201318 (2024). https:\/\/doi.org\/10.1109\/TDSC.2024.3495230","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5320_CR10","doi-asserted-by":"publisher","unstructured":"Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., Yusupov, J.: Introducing programmability and automation in the synthesis of virtual firewall rules. In 2020 6th IEEE Conference on Network Softwarization (NetSoft). 473\u2013478. https:\/\/doi.org\/10.1109\/NetSoft48620.2020.9165434 (2020)","DOI":"10.1109\/NetSoft48620.2020.9165434"},{"key":"5320_CR11","doi-asserted-by":"publisher","unstructured":"Bringhenti, D., Marchetto, G., Sisto, R., Valenza, F., Yusupov, J.: Introducing programmability and automation in the synthesis of virtual firewall rules. In 2020 6th IEEE Conference on Network Softwarization (NetSoft). IEEE, 473\u2013478. https:\/\/doi.org\/10.1109\/NetSoft48620.2020.9165434 (2020)","DOI":"10.1109\/NetSoft48620.2020.9165434"},{"key":"5320_CR12","doi-asserted-by":"publisher","unstructured":"Bringhenti, D., Sisto, R., Valenza, F.: A demonstration of VEREFOO: an automated framework for virtual firewall configuration. In 2023 IEEE 9th International Conference on Network Softwarization (NetSoft). 293\u2013295. (2023) https:\/\/doi.org\/10.1109\/NetSoft57336.2023.10175442","DOI":"10.1109\/NetSoft57336.2023.10175442"},{"issue":"109183","key":"5320_CR13","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1016\/j.comnet.2022.109183","volume":"215","author":"Daniele Bringhenti","year":"2022","unstructured":"Bringhenti, Daniele, Valenza, Fulvio: Optimizing distributed firewall reconfiguration transients. Computer Networks 215(109183), 1389\u20131286 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2022.109183","journal-title":"Computer Networks"},{"key":"5320_CR14","doi-asserted-by":"publisher","unstructured":"Bryans, J.: Reasoning about XACML Policies Using CSP. In Proceedings of the 2005 Workshop on Secure Web Services. ACM, New York, NY, USA, 28-35. 1595932348 (2005) https:\/\/doi.org\/10.1145\/1103022.1103028","DOI":"10.1145\/1103022.1103028"},{"key":"5320_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3817-9_9","author":"S Chakraborty","year":"2019","unstructured":"Chakraborty, S., Sandhu, R.S., Krishnan, R.N.: On the feasibility of RBAC to ABAC policy mining: a formal analysis. Secure Knowl Manag (2019). https:\/\/doi.org\/10.1007\/978-981-15-3817-9_9","journal-title":"Secure Knowl Manag"},{"key":"5320_CR16","doi-asserted-by":"publisher","unstructured":"Demchenko, Y., Ngo, C., de Laat, C., Lee, C.: Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns. In 2014 IEEE International Conference on Cloud Engineering. Boston, MA, USA, 439\u2013445. (2014) https:\/\/doi.org\/10.1007\/978-981-15-3817-9_9","DOI":"10.1007\/978-981-15-3817-9_9"},{"key":"5320_CR17","doi-asserted-by":"publisher","unstructured":"Ding, Y., Feng, L., Qin, Y., Huang, C., Pan, D., Long, G., Yusong, T.: Blockchain-based Access Control Mechanism of Federated Data Sharing System. In 2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). 277\u2013284. https:\/\/doi.org\/10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00060 (2020)","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00060"},{"key":"5320_CR18","doi-asserted-by":"publisher","unstructured":"Hadj, M.A.E., Ayache, M., Benkaouz, Y., Khoumsi, A., Erradi, M.: Clustering-based Approach for Anomaly Detection in XACML Policies. In SECRYPT. 548\u2013553,(2017). https:\/\/doi.org\/10.5220\/0006471205480553","DOI":"10.5220\/0006471205480553"},{"key":"5320_CR19","doi-asserted-by":"publisher","unstructured":"Fan, C., Lin, C., Khazaei, H., Musilek, P.: Performance Analysis of Hyperledger Besu in Private Blockchain. In 2022 IEEE International Conference on DAPPS. IEEE, 64\u201373. https:\/\/doi.org\/10.1109\/DAPPS55202.2022.00016 (2022)","DOI":"10.1109\/DAPPS55202.2022.00016"},{"key":"5320_CR20","doi-asserted-by":"publisher","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L., Tschantz, M.: Verification and change-impact analysis of access-control policies. Proceedings 27th International Conference on SE, 196\u2013205. https:\/\/doi.org\/10.1145\/1062455.1062502 (2005)","DOI":"10.1145\/1062455.1062502"},{"issue":"6","key":"5320_CR21","doi-asserted-by":"publisher","first-page":"2224","DOI":"10.3390\/app14062224","volume":"14","author":"T G\u00f3rski","year":"2024","unstructured":"G\u00f3rski, T.: Smart contract design pattern for processing logically coherent transaction types. Appl. Sci. 14(6), 2224 (2024). https:\/\/doi.org\/10.3390\/app14062224","journal-title":"Appl. Sci."},{"issue":"4","key":"5320_CR22","doi-asserted-by":"publisher","first-page":"2060","DOI":"10.1109\/TSC.2020.3031061","volume":"15","author":"Y Guo","year":"2022","unstructured":"Guo, Y., Xie, H., Miao, Y., Wang, C., Jia, X.: FedCrowd: a federated and privacy-preserving crowdsourcing platform on blockchain. IEEE Trans. Services Comput. 15(4), 2060\u20132073 (2022). https:\/\/doi.org\/10.1109\/TSC.2020.3031061","journal-title":"IEEE Trans. Services Comput."},{"key":"5320_CR23","doi-asserted-by":"publisher","unstructured":"Hongxin, H., Ahn, G.-J., Kulkarni, K.: Anomaly discovery and resolution in Web access control policies. Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT 165\u2013174,(2011). https:\/\/doi.org\/10.1145\/1998441.1998472","DOI":"10.1145\/1998441.1998472"},{"key":"5320_CR24","doi-asserted-by":"publisher","unstructured":"Hu, H., Ahn, G.-J., Kulkarni, K.: Anomaly discovery and resolution in web access control policies. In Proceedings of the 16th ACM symposium on Access control models and technologies. 165\u2013174. https:\/\/doi.org\/10.1145\/1998441.1998472 (2011)","DOI":"10.1145\/1998441.1998472"},{"key":"5320_CR25","doi-asserted-by":"publisher","unstructured":"Hwang, J., Xie, T., Hu, V., Altunay, M.: ACPT: A tool for modeling and verifying access control policies. In 2010 IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE, 40\u201343 (2010). https:\/\/doi.org\/10.1109\/POLICY.2010.22","DOI":"10.1109\/POLICY.2010.22"},{"issue":"5","key":"5320_CR26","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.3390\/electronics12051217","volume":"12","author":"K Kim","year":"2023","unstructured":"Kim, K., Ryu, J., Lee, H., Lee, Y., Won, D.: Distributed and federated authentication schemes based on updatable smart contracts. Electronics 12(5), 1217 (2023). https:\/\/doi.org\/10.3390\/electronics12051217","journal-title":"Electronics"},{"key":"5320_CR27","doi-asserted-by":"publisher","unstructured":"Konat\u00e9, J., Attiogb\u00e9, C., Andre, P., BAH, Abdramane: Service Promotion in a Federation of Security Domains. Revue Africaine de la Recherche en Informatique et Math\u00e9matiques Appliqu\u00e9es 34 (2021). https:\/\/doi.org\/10.46298\/arima.6757","DOI":"10.46298\/arima.6757"},{"key":"5320_CR28","doi-asserted-by":"publisher","unstructured":"Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism. 60\u201374 (2012). https:\/\/doi.org\/10.1007\/978-3-642-28166-2_7","DOI":"10.1007\/978-3-642-28166-2_7"},{"issue":"2016","key":"5320_CR29","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compeleceng.2015.09.021","volume":"52","author":"A Mourad","year":"2016","unstructured":"Mourad, A., Tout, H., Talhi, C., Otrok, H., Yahyaoui, H.: From model-driven specification to design-level set-based analysis of XACML policies. Comput. Electr. Eng. 52(2016), 65\u201379 (2016). https:\/\/doi.org\/10.1016\/j.compeleceng.2015.09.021","journal-title":"Comput. Electr. Eng."},{"key":"5320_CR30","unstructured":"Nakamoto, S.: [n.\u00a0d.]. Bitcoin: A Peer-to-Peer Electronic Cash System. In Cryptography Mailing list at https:\/\/metzdowd.com"},{"key":"5320_CR31","doi-asserted-by":"publisher","unstructured":"Nguyen, D.C., Pathirana, P.N., Ding, M., Seneviratne, A.: Blockchain and edge computing for decentralized EMRs sharing in federated healthcare. In Proceedings of 2020 IEEE GLOBECOM Conference. IEEE, 1\u20136. (2020) https:\/\/doi.org\/10.1109\/GLOBECOM42002.2020.9347951","DOI":"10.1109\/GLOBECOM42002.2020.9347951"},{"key":"5320_CR32","unstructured":"NIST. [n.\u00a0d.]. SPT : SECURITY POLICY TOOL. Available: https:\/\/securitypolicytool.com\/"},{"key":"5320_CR33","doi-asserted-by":"publisher","unstructured":"Sabbioni, A., Mazzocca, C., Bujari, A., Montanari, R., Corradi, A.: A Decentralized Architecture for Dynamic and Federated Access Control Facilitating Smart Tourism Services. In Proceedings of the GoodIT 2022 (Limassol, Cyprus) (GoodIT \u201922). ACM, New York, NY, USA, 403-408. 9781450392846 (2022) https:\/\/doi.org\/10.3390\/admsci14020022","DOI":"10.3390\/admsci14020022"},{"issue":"2017","key":"5320_CR34","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10207-016-0317-1","volume":"16","author":"RA Shaikh","year":"2017","unstructured":"Shaikh, R.A., Adi, K., Logrippo, L.: A data classification method for inconsistency and incompleteness detection in access control policy sets. Int. J. Inform. Secur. 16(2017), 91\u2013113 (2017). https:\/\/doi.org\/10.1007\/s10207-016-0317-1","journal-title":"Int. J. Inform. Secur."},{"key":"5320_CR35","unstructured":"Parr, T.: [n.\u00a0d.]. The definitive ANTLR 4 reference. https:\/\/www.antlr.org\/"},{"key":"5320_CR36","doi-asserted-by":"crossref","unstructured":"Vimercati, S., Pierangela: Access control in federated systems. In Proceedings of the 1996 workshop on New security paradigms. 87\u201399 (1996)","DOI":"10.1145\/304851.304871"},{"key":"5320_CR37","doi-asserted-by":"publisher","unstructured":"Yan, X., Miao, Y., Li, X., Choo, K.-K.R., Meng, X., Deng, R.H.: (2023) Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT. IEEE Internet of Things Journal 10, 15 (2023), 13281\u201313291. https:\/\/doi.org\/10.1109\/JIOT.2023.3262546","DOI":"10.1109\/JIOT.2023.3262546"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05320-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05320-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05320-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T17:54:47Z","timestamp":1762192487000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05320-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,19]]},"references-count":37,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5320"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05320-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,9,19]]},"assertion":[{"value":"25 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"818"}}