{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:08:24Z","timestamp":1774973304173,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19232-6","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T05:01:46Z","timestamp":1714366906000},"page":"8127-8148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Blockchain-enabled IoT access control model for sharing electronic healthcare data"],"prefix":"10.1007","volume":"84","author":[{"given":"Benkhaddra","family":"Ilyas","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Setitra Mohamed","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,29]]},"reference":[{"key":"19232_CR1","doi-asserted-by":"crossref","first-page":"36868","DOI":"10.1109\/ACCESS.2021.3059863","volume":"9","author":"S Sun","year":"2021","unstructured":"Sun S, Du R, Chen S, Li W (2021) Blockchain-based IoT access control system: towards security, lightweight, and cross-domain. IEEE Access 9:36868\u201336878","journal-title":"IEEE Access"},{"issue":"5","key":"19232_CR2","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Wei Yu, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security, and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142","journal-title":"IEEE Internet Things J"},{"key":"19232_CR3","doi-asserted-by":"crossref","first-page":"18207","DOI":"10.1109\/ACCESS.2020.2968492","volume":"8","author":"H Liu","year":"2020","unstructured":"Liu H, Han D, Li D (2020) Fabric-IoT: a blockchain-based access control system in IoT. IEEE Access 8:18207\u201318218","journal-title":"IEEE Access"},{"key":"19232_CR4","doi-asserted-by":"crossref","first-page":"205034","DOI":"10.1109\/ACCESS.2020.3036916","volume":"8","author":"L Caruccio","year":"2020","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034\u2013205050","journal-title":"IEEE Access"},{"key":"19232_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","volume":"613","author":"L Caruccio","year":"2022","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G, Zannone N (2022) A decision-support framework for data anonymization with application to machine learning processes. Inf Sci 613:1\u201332","journal-title":"Inf Sci"},{"key":"19232_CR6","doi-asserted-by":"crossref","unstructured":"Rouhani S, Deters R (2019) Blockchain-based access control systems: state of the art and challenges. In: IEEE\/WIC\/ACM International Conference on Web Intelligence. pp 423\u2013428","DOI":"10.1145\/3350546.3352561"},{"issue":"5","key":"19232_CR7","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1007\/s11280-021-00874-7","volume":"24","author":"S Rouhani","year":"2021","unstructured":"Rouhani S, Belchior R, Cruz RS, Deters R (2021) Distributed attribute-based access control system using permissioned blockchain. World Wide Web 24(5):1617\u20131644","journal-title":"World Wide Web"},{"key":"19232_CR8","doi-asserted-by":"crossref","first-page":"8479","DOI":"10.1109\/ACCESS.2021.3049549","volume":"9","author":"L Guo","year":"2021","unstructured":"Guo L, Yang X, Yau W-C (2021) TABE-DAC: efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain. IEEE Access 9:8479\u20138490","journal-title":"IEEE Access"},{"key":"19232_CR9","doi-asserted-by":"crossref","first-page":"134422","DOI":"10.1109\/ACCESS.2019.2941905","volume":"7","author":"W Zheng","year":"2019","unstructured":"Zheng W, Zheng Z, Chen X, Dai K, Li P, Chen R (2019) Nutbaas: a blockchain-as-a-service platform. Ieee Access 7:134422\u2013134433","journal-title":"Ieee Access"},{"key":"19232_CR10","doi-asserted-by":"crossref","first-page":"3592","DOI":"10.1109\/ACCESS.2020.3047413","volume":"9","author":"YE Oktian","year":"2021","unstructured":"Oktian YE, Lee S-G (2021) BorderChain: blockchain-based access control framework for the internet of things endpoint. IEEE Access 9:3592\u20133615","journal-title":"IEEE Access"},{"issue":"6","key":"19232_CR11","first-page":"2102","volume":"68","author":"Z Li","year":"2021","unstructured":"Li Z, Hao J, Liu J, Wang H, Xian M (2021) An IoT-applicable access control model under double-layer blockchain. IEEE Trans Circuits Syst II Express Briefs 68(6):2102\u20132106","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"19232_CR12","unstructured":"Nakamoto S, Bitcoin A (2008) A peer-to-peer electronic cash system. Bitcoin.\u2013URL: https:\/\/bitcoin.org\/bitcoin.Pdf 4"},{"key":"19232_CR13","doi-asserted-by":"crossref","first-page":"156027","DOI":"10.1109\/ACCESS.2020.3018783","volume":"8","author":"J Shi","year":"2020","unstructured":"Shi J, Li R, Hou W (2020) A mechanism to resolve the unauthorized access vulnerability caused by permission delegation in blockchain-based access control. IEEE Access 8:156027\u2013156042","journal-title":"IEEE Access"},{"issue":"8","key":"19232_CR14","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.3390\/e23081054","volume":"23","author":"A Iftekhar","year":"2021","unstructured":"Iftekhar A, Cui X, Tao Q, Zheng C (2021) Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy 23(8):1054","journal-title":"Entropy"},{"issue":"2","key":"19232_CR15","doi-asserted-by":"crossref","first-page":"1542","DOI":"10.1109\/JIOT.2021.3088115","volume":"9","author":"D Chattaraj","year":"2022","unstructured":"Chattaraj D, Bera B, Das AK, Rodrigues JJPC, Park Y (2022) Designing fine-grained access control for software-defined networks using private blockchain. IEEE Internet Things J 9(2):1542\u20131559","journal-title":"IEEE Internet Things J"},{"key":"19232_CR16","doi-asserted-by":"crossref","first-page":"85190","DOI":"10.1109\/ACCESS.2020.2992203","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Pei L, Liao D, Chen S, Zhang M, Xu D (2020) FADB: a fine-grained access control scheme for VANET data based on blockchain. IEEE Access 8:85190\u201385203","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19232-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19232-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19232-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T04:21:44Z","timestamp":1743394904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19232-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":16,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19232"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19232-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,29]]},"assertion":[{"value":"27 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}