{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:18:34Z","timestamp":1775837914741,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006162","name":"FACEPE","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006162","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11227-022-04361-2","type":"journal-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T14:02:47Z","timestamp":1646661767000},"page":"12505-12527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Performance and availability evaluation of the blockchain platform hyperledger fabric"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5611-4793","authenticated-orcid":false,"given":"Carlos","family":"Melo","sequence":"first","affiliation":[]},{"given":"Felipe","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Jamilson","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Ronierison","family":"Maciel","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,7]]},"reference":[{"key":"4361_CR1","volume-title":"Blockchain for DUMMIES","author":"M Gupta","year":"2017","unstructured":"Gupta M (2017) Blockchain for DUMMIES. Wiley, New York"},{"key":"4361_CR2","doi-asserted-by":"crossref","unstructured":"Zyskind G, Nathan O, Pentland A (2015) Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops. pp 180\u2013184","DOI":"10.1109\/SPW.2015.27"},{"key":"4361_CR3","doi-asserted-by":"publisher","first-page":"102078","DOI":"10.1016\/j.cose.2020.102078","volume":"100","author":"M Dabbagh","year":"2021","unstructured":"Dabbagh M, Choo K-KR, Beheshti A, Tahir M, Safa NS (2021) A survey of empirical performance evaluation of permissioned blockchain platforms: challenges and opportunities. Comput Secur 100:102078","journal-title":"Comput Secur"},{"key":"4361_CR4","doi-asserted-by":"crossref","unstructured":"Maciel P, Dantas J, Melo C, Pereira P, Oliveira F, Araujo J, Matos R (2021) A survey on reliability and availability modeling of edge, fog, and cloud computing. J Reliab Intell Environ 1\u201319","DOI":"10.1007\/s40860-021-00154-1"},{"key":"4361_CR5","doi-asserted-by":"crossref","unstructured":"Pongnumkul S (2017) Performance analysis of private blockchain platforms in varying workloads. In: 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, pp 1\u20136","DOI":"10.1109\/ICCCN.2017.8038517"},{"key":"4361_CR6","doi-asserted-by":"crossref","unstructured":"Thakkar P, Nathan S, Viswanathan B (2018) Performance benchmarking and optimizing hyperledger fabric blockchain platform. In: 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, pp 264\u2013276","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"4361_CR7","doi-asserted-by":"crossref","unstructured":"Sukhwani H, Mart\u00ednez JM, Chang X, Trivedi KS, Rindos A (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). In: 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). IEEE, pp 253\u2013255","DOI":"10.1109\/SRDS.2017.36"},{"key":"4361_CR8","doi-asserted-by":"crossref","unstructured":"Sukhwani H, Wang N, Trivedi KS, Rindos A (2018) Performance modeling of hyperledger fabric (permissioned blockchain network). In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). IEEE, pp 1\u20138","DOI":"10.1109\/NCA.2018.8548070"},{"key":"4361_CR9","doi-asserted-by":"crossref","unstructured":"Melo C, Dantas J, Oliveira D, F\u00e9 I, Matos R, Dantas R, Maciel R, Maciel P (2018) Dependability evaluation of a blockchain-as-a-service environment. In: 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp 00909\u201300914","DOI":"10.1109\/ISCC.2018.8538752"},{"key":"4361_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-020-03617-z","volume":"77","author":"C Melo","year":"2021","unstructured":"Melo C, Dantas J, Pereira P, Maciel P (2021) Distributed application provisioning over ethereum-based private and permissioned blockchain: availability modeling, capacity, and costs planning. J Supercomput 77:1\u201327","journal-title":"J Supercomput"},{"key":"4361_CR11","unstructured":"Hyperledger (2018) An introduction to hyperledger, Tech. Rep"},{"key":"4361_CR12","unstructured":"Hyperledger (2018) Introduction to hyperledger business blockchain design philosophy and consensus. Tech. Rep"},{"key":"4361_CR13","volume-title":"The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling","author":"R Jain","year":"1991","unstructured":"Jain R (1991) The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling. Wiley Computer Publishing, Wiley, New York"},{"key":"4361_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511612398","volume-title":"Measuring computer performance: a practitioner\u2019s guide","author":"DJ Lilja","year":"2000","unstructured":"Lilja DJ (2000) Measuring computer performance: a practitioner\u2019s guide. Cambridge University Press, New York"},{"key":"4361_CR15","unstructured":"Hyperledger (2018) Hyperledger blockchain performance metrics white paper. Tech. Rep"},{"issue":"7","key":"4361_CR16","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/2.869367","volume":"33","author":"JL Henning","year":"2000","unstructured":"Henning JL (2000) Spec cpu2000: measuring CPU performance in the new millennium. Computer 33(7):28\u201335","journal-title":"Computer"},{"key":"4361_CR17","doi-asserted-by":"crossref","unstructured":"Cotroneo D, Matias R Jr, Natella R (2021) Fundamentals of software aging. Handbook of software aging and rejuvenation: fundamentals, methods, applications, and future directions 21","DOI":"10.1142\/9789811214578_0002"},{"key":"4361_CR18","doi-asserted-by":"crossref","unstructured":"Avritzer A, Grottke M, Menasch\u00e9 DS (2020) Software aging monitoring and rejuvenation for the assessment of high availability systems. In: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, pp 327","DOI":"10.1109\/ISSREW51248.2020.00095"},{"key":"4361_CR19","doi-asserted-by":"crossref","unstructured":"Cotroneo D, De Simone L, Natella R, Pietrantuono R, Russo S (2019) A configurable software aging detection and rejuvenation agent for android. In: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, pp 239\u2013245","DOI":"10.1109\/ISSREW.2019.00078"},{"issue":"2","key":"4361_CR20","first-page":"15","volume":"3","author":"M Torquato","year":"2018","unstructured":"Torquato M, Araujo J, Umesh I, Maciel P (2018) Sware: a methodology for software aging and rejuvenation experiments. J Inf Syst Eng Manag 3(2):15","journal-title":"J Inf Syst Eng Manag"},{"key":"4361_CR21","doi-asserted-by":"crossref","unstructured":"Maciel P, Trivedi K, Matias R, Kim D (2011) Dependability modeling. In: Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions","DOI":"10.4018\/978-1-60960-794-4.ch003"},{"key":"4361_CR22","unstructured":"Trivedi KS, Hunter S, Garg S, Fricks R (1996) Reliability analysis techniques explored through a communication network example"},{"issue":"3","key":"4361_CR23","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/24.326452","volume":"43","author":"M Malhotra","year":"1994","unstructured":"Malhotra M, Trivedi K (1994) Power-hierarchy of dependability-model types. IEEE Trans Reliab 43(3):493\u2013502","journal-title":"IEEE Trans Reliab"},{"key":"4361_CR24","doi-asserted-by":"crossref","unstructured":"Garg S, PA, TM, Trivedi KS (1995) Analysis of software rejuvenation using Markov regenerative stochastic petri net. In: Proceedings of Sixth International Symposium on Software Reliability Engineering, (ISSRE\u201995). Paderborn, pp 180\u2013187","DOI":"10.1109\/ISSRE.1995.497656"},{"issue":"1","key":"4361_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2539122","volume":"10","author":"J Araujo","year":"2014","unstructured":"Araujo J, Matos R, Alves V, Maciel P, Souza FVD, Trivedi KS (2014) Software aging in the eucalyptus cloud computing infrastructure: characterization and rejuvenation. ACM J Emerg Technol Comput Syst (JETC) 10(1):1\u201322","journal-title":"ACM J Emerg Technol Comput Syst (JETC)"},{"key":"4361_CR26","doi-asserted-by":"crossref","unstructured":"Araujo J, Melo C, Oliveira F, Pereira P, Matos R (2021) A software maintenance methodology: An approach applied to software aging. In: 2021 IEEE International Systems Conference (SysCon). IEEE, pp 1\u20138","DOI":"10.1109\/SysCon48628.2021.9447082"},{"key":"4361_CR27","doi-asserted-by":"crossref","unstructured":"Maciel P, Matos R, Silva B, Figueiredo J, Oliveira D, F\u00e9 I, Maciel R, Dantas J (2017) Mercury: Performance and dependability evaluation of systems with exponential, expolynomial, and general distributions. In: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). pp 50\u201357","DOI":"10.1109\/PRDC.2017.16"},{"issue":"9","key":"4361_CR28","doi-asserted-by":"publisher","first-page":"9905","DOI":"10.1007\/s11227-021-03672-0","volume":"77","author":"P Pereira","year":"2021","unstructured":"Pereira P, Araujo J, Melo C, Santos V, Maciel P (2021) Analytical models for availability evaluation of edge and fog computing nodes. J Supercomput 77(9):9905\u20139933","journal-title":"J Supercomput"},{"key":"4361_CR29","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TSC.2017.2788442","volume":"14","author":"S Sebastio","year":"2018","unstructured":"Sebastio S, Ghosh R, Mukherjee T (2018) An availability analysis approach for deployment configurations of containers. IEEE Trans Serv Comput 14:16\u201329","journal-title":"IEEE Trans Serv Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04361-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04361-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04361-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:14:01Z","timestamp":1654820041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04361-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,7]]},"references-count":29,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4361"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04361-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,7]]},"assertion":[{"value":"7 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}