{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:02Z","timestamp":1772120042457,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012165","name":"Key Technologies Research and Development Program","doi-asserted-by":"publisher","award":["2023YFB2904004, 2023YFB2904000"],"award-info":[{"award-number":["2023YFB2904004, 2023YFB2904000"]}],"id":[{"id":"10.13039\/501100012165","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Key Development Planning Project","award":["BE2023004-2"],"award-info":[{"award-number":["BE2023004-2"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["20KJA520001"],"award-info":[{"award-number":["20KJA520001"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu Hongxin Information Technology Co, Ltd Project","award":["JSSGS2301022EGN00"],"award-info":[{"award-number":["JSSGS2301022EGN00"]}]},{"name":"Future Network Scientific Research Fund Project","award":["No. FNSRFP-2021-YB-15"],"award-info":[{"award-number":["No. FNSRFP-2021-YB-15"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-024-01853-1","type":"journal-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T06:19:10Z","timestamp":1759385950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Master-slave multi-chain with risk assessment based access control model for zero trust network"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9026-0133","authenticated-orcid":false,"given":"Sisi","family":"Shao","sequence":"first","affiliation":[]},{"given":"Tiansheng","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"HongYu","family":"Du","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Shangdong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7856-112X","authenticated-orcid":false,"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"1853_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103433","volume":"73","author":"L Daubner","year":"2023","unstructured":"Daubner L, Macak M, Matulevi\u010dius R, Buhnova B, Maksovi\u0107 S, Pitner T (2023) Addressing insider attacks via forensic-ready risk management. Journal of Information Security and Applications. 73:103433","journal-title":"Journal of Information Security and Applications."},{"issue":"1","key":"1853_CR2","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/e24010111","volume":"24","author":"D Lu","year":"2022","unstructured":"Lu D, Li Z, Yu J, Han Z (2022) A verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. Entropy 24(1):111","journal-title":"Entropy"},{"issue":"12","key":"1853_CR3","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.3390\/e25121595","volume":"25","author":"H Kang","year":"2023","unstructured":"Kang H, Liu G, Wang Q, Meng L, Liu J (2023) Theory and application of zero trust security: A brief survey. Entropy 25(12):1595","journal-title":"Entropy"},{"key":"1853_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.comcom.2023.04.022","volume":"206","author":"A Gupta","year":"2023","unstructured":"Gupta A, Gupta R, Jadav D, Tanwar S, Kumar N, Shabaz M (2023) Proxy smart contracts for zero trust architecture implementation in decentralised oracle networks based applications. Comput Commun 206:10\u201321. https:\/\/doi.org\/10.1016\/j.comcom.2023.04.022","journal-title":"Comput Commun"},{"key":"1853_CR5","doi-asserted-by":"crossref","unstructured":"Tang F, Ma C, Cheng K (2023) Privacy-preserving authentication scheme based on zero trust architecture. Digital Communications and Networks","DOI":"10.1016\/j.dcan.2023.01.021"},{"key":"1853_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2022.12.026","volume":"200","author":"M Indushree","year":"2023","unstructured":"Indushree M, Raj M, Mishra VK, Shashidhara R, Das AK, Bhat V (2023) Mobile-chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks. Comput Commun 200:1\u201316. https:\/\/doi.org\/10.1016\/j.comcom.2022.12.026","journal-title":"Comput Commun"},{"key":"1853_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109068","volume":"212","author":"P Garc\u00eda-Teodoro","year":"2022","unstructured":"Garc\u00eda-Teodoro P, Camacho J, Maci\u00e1-Fern\u00e1ndez G, G\u00f3mez-Hern\u00e1ndez J, L\u00f3pez-Mar\u00edn V (2022) A novel zero-trust network access control scheme based on the security profile of devices and users. Comput Netw 212:109068","journal-title":"Comput Netw"},{"key":"1853_CR8","doi-asserted-by":"publisher","first-page":"57143","DOI":"10.1109\/ACCESS.2022.3174679","volume":"10","author":"NF Syed","year":"2022","unstructured":"Syed NF, Shah SW, Shaghaghi A, Anwar A, Baig Z, Doss R (2022) Zero trust architecture (zta): A comprehensive survey. IEEE Access. 10:57143\u201357179","journal-title":"IEEE Access."},{"key":"1853_CR9","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.comcom.2022.06.014","volume":"192","author":"H Afzaal","year":"2022","unstructured":"Afzaal H, Imran M, Janjua MU (2022) Formal verification of persistence and liveness in the trust-based blockchain crowdsourcing consensus protocol. Comput Commun 192:384\u2013401. https:\/\/doi.org\/10.1016\/j.comcom.2022.06.014","journal-title":"Comput Commun"},{"key":"1853_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2022.11.007","volume":"198","author":"M Khalid","year":"2023","unstructured":"Khalid M, Hameed S, Qadir A, Shah SA, Draheim D (2023) Towards sdn-based smart contract solution for iot access control. Comput Commun 198:1\u201331. https:\/\/doi.org\/10.1016\/j.comcom.2022.11.007","journal-title":"Comput Commun"},{"issue":"8","key":"1853_CR11","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.3390\/e23081054","volume":"23","author":"A Iftekhar","year":"2021","unstructured":"Iftekhar A, Cui X, Tao Q, Zheng C (2021) Hyperledger fabric access control system for internet of things layer in blockchain-based applications. Entropy 23(8):1054","journal-title":"Entropy"},{"issue":"3","key":"1853_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3511899","volume":"23","author":"K Gai","year":"2023","unstructured":"Gai K, She Y, Zhu L, Choo K-KR, Wan Z (2023) A blockchain-based access control scheme for zero trust cross-organizational data sharing. ACM Trans Internet Technol 23(3):1\u201325","journal-title":"ACM Trans Internet Technol"},{"key":"1853_CR13","doi-asserted-by":"crossref","unstructured":"DeCusatis C, Liengtiraphan P, Sager A, Pinelli M (2016) Implementing zero trust cloud networks with transport access control and first packet authentication. In: 2016 IEEE International Conference on Smart Cloud (SmartCloud), pp. 5\u201310. IEEE","DOI":"10.1109\/SmartCloud.2016.22"},{"key":"1853_CR14","doi-asserted-by":"crossref","unstructured":"Yao Q, Wang Q, Zhang X, Fei J (2020) Dynamic access control and authorization system based on zero-trust architecture. In: Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, pp. 123\u2013127","DOI":"10.1145\/3437802.3437824"},{"key":"1853_CR15","doi-asserted-by":"crossref","unstructured":"Silva GR, Macedo DF, Santos AL (2021) Zero trust access control with context-aware and behavior-based continuous authentication for smart homes. In: Anais do XXI Simp\u00f3sio Brasileiro em Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais, pp. 43\u201356. SBC","DOI":"10.5753\/sbseg.2021.17305"},{"issue":"9","key":"1853_CR16","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.3390\/e25091334","volume":"25","author":"L Wang","year":"2023","unstructured":"Wang L, Peng C, Tan W (2023) Secure ring signature scheme for privacy-preserving blockchain. Entropy 25(9):1334","journal-title":"Entropy"},{"key":"1853_CR17","doi-asserted-by":"crossref","unstructured":"Fu Y, Shao J, Huang Q, Zhou Q, Feng H, Jia X, Wang R, Feng W (2023) Non-transferable blockchain-based identity authentication. Peer-to-Peer Networking and Applications 1\u201311","DOI":"10.21203\/rs.3.rs-2482221\/v1"},{"issue":"5","key":"1853_CR18","doi-asserted-by":"publisher","first-page":"811","DOI":"10.3390\/e25050811","volume":"25","author":"A Liu","year":"2023","unstructured":"Liu A, Chen X-B, Xu S, Wang Z, Li Z, Xu L, Zhang Y, Chen Y (2023) A secure scheme based on a hybrid of classical-quantum communications protocols for managing classical blockchains. Entropy 25(5):811","journal-title":"Entropy"},{"issue":"1","key":"1853_CR19","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TII.2022.3159164","volume":"19","author":"B Deebak","year":"2022","unstructured":"Deebak B, Memon FH, Dev K, Khowaja SA, Wang W, Qureshi NMF (2022) Tab-sapp: A trust-aware blockchain-based seamless authentication for massive iot-enabled industrial applications. IEEE Trans Industr Inf 19(1):243\u2013250","journal-title":"IEEE Trans Industr Inf"},{"key":"1853_CR20","doi-asserted-by":"crossref","first-page":"2985","DOI":"10.1007\/s12083-023-01553-2","volume":"16","author":"Predicting functional roles of ethereum blockchain addresses","year":"2023","unstructured":"Predicting functional roles of ethereum blockchain addresses (2023) Tania, S., Muhammad, I., Muhammad, J. Umar, Abdul, A. Rehman, Awab, A., Ali, A., Saeed. H. Ul. Peer-to-Peer Networking and Applications. 16:2985\u20133002","journal-title":"H. Ul. Peer-to-Peer Networking and Applications."},{"key":"1853_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-023-01469-x","volume":"16","author":"J Wang","year":"2023","unstructured":"Wang J, Li S, Wanting J, Li D, Song B (2023) A composite blockchain associated event traceability method for financial activities. Peer-to-Peer Networking and Applications. 16:1\u201320","journal-title":"Peer-to-Peer Networking and Applications."},{"key":"1853_CR22","doi-asserted-by":"crossref","unstructured":"Xu H, Zhang X, Cui Q, Tao X (2023) A dynamic blockchain-based mutual authenticating identity management system for next-generation network. IEEE Communications Magazine","DOI":"10.1109\/MCOM.004.2200818"},{"key":"1853_CR23","doi-asserted-by":"crossref","unstructured":"Li X, Zhao H, Deng W (2023) Bfod: Blockchain-based privacy protection and security sharing scheme of flight operation data. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2023.3296460"},{"key":"1853_CR24","doi-asserted-by":"crossref","unstructured":"Popa M, Stoklossa SM, Mazumdar S (2023) Chaindiscipline-towards a blockchain-iot-based self-sovereign identity management framework. IEEE Transactions on Services Computing","DOI":"10.1109\/TSC.2023.3279871"},{"key":"1853_CR25","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.future.2022.12.037","volume":"142","author":"J Li","year":"2023","unstructured":"Li J, Han D, Wu Z, Wang J, Li K-C, Castiglione A (2023) A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control. Futur Gener Comput Syst 142:195\u2013211","journal-title":"Futur Gener Comput Syst"},{"issue":"14","key":"1853_CR26","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.3390\/electronics11142225","volume":"11","author":"S Namane","year":"2022","unstructured":"Namane S, Ben Dhaou I (2022) Blockchain-based access control techniques for iot applications. Electronics 11(14):2225","journal-title":"Electronics"},{"key":"1853_CR27","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.comcom.2023.11.017","volume":"214","author":"C Daud\u00e9n-Esmel","year":"2024","unstructured":"Daud\u00e9n-Esmel C, Castell\u00e1-Roca J, Viejo A (2024) Blockchain-based access control system for efficient and gdpr-compliant personal data management. Comput Commun 214:67\u201387. https:\/\/doi.org\/10.1016\/j.comcom.2023.11.017","journal-title":"Comput Commun"},{"issue":"4","key":"1853_CR28","doi-asserted-by":"publisher","first-page":"4196","DOI":"10.3934\/mbe.2022194","volume":"19","author":"D Li","year":"2022","unstructured":"Li D, Zhang E, Lei M, Song C (2022) Zero trust in edge computing environment: a blockchain based practical scheme. Math Biosci Eng 19(4):4196\u20134216","journal-title":"Math Biosci Eng"},{"issue":"1","key":"1853_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-020-01275-y","volume":"20","author":"M Sultana","year":"2020","unstructured":"Sultana M, Hossain A, Laila F, Taher KA, Islam MN (2020) Towards developing a secure medical image sharing system based on zero trust principles and blockchain technology. BMC Med Inform Decis Mak 20(1):1\u201310","journal-title":"BMC Med Inform Decis Mak"},{"issue":"8","key":"1853_CR30","doi-asserted-by":"publisher","first-page":"198","DOI":"10.23919\/JCC.2022.08.015","volume":"19","author":"L Meng","year":"2022","unstructured":"Meng L, Huang D, An J, Zhou X, Lin F (2022) A continuous authentication protocol without trust authority for zero trust architecture. China Communications. 19(8):198\u2013213","journal-title":"China Communications."},{"key":"1853_CR31","doi-asserted-by":"crossref","unstructured":"Yang K, Li D, Zhou L, Cheng K (2022) Research on adaptive dynamic access control model based on blockchain and token. In: Journal of Physics: Conference Series, vol. 2166, p. 012042. IOP Publishing","DOI":"10.1088\/1742-6596\/2166\/1\/012042"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01853-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01853-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01853-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:47Z","timestamp":1765622267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01853-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1853"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01853-1","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3869167\/v1","asserted-by":"object"}]},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"16 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript does not include human or animal research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The manuscript has been submitted solely to this journal and is not published, in press, or submitted elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent of publication"}},{"value":"The authors declare there is no conflicts of interest regarding the publication of this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"291"}}