{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:58:09Z","timestamp":1775563089448,"version":"3.50.1"},"reference-count":15,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T00:00:00Z","timestamp":1772841600000},"content-version":"vor","delay-in-days":65,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.03.124","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:39:40Z","timestamp":1774355980000},"page":"1390-1397","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Automating and hardening blockchain nodes in a decentralized healthcare platform for enhanced security and efficiency"],"prefix":"10.1016","volume":"278","author":[{"given":"Ricardo Pombinha","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Rodrigo","family":"Camarada","sequence":"additional","affiliation":[]},{"given":"Marisa","family":"Maximiano","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"Vitor","family":"T\u00e1vora","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Correia Bezerra","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.03.124_bib1","unstructured":"\u201cBlockchainPT\u2013Decentralize Portugal with Blockchain Agenda.\u201d Available: https:\/\/blockchain.void.pt\/. [Accessed: Jun. 25, 2025]"},{"key":"10.1016\/j.procs.2026.03.124_bib2","doi-asserted-by":"crossref","unstructured":"P. Masek, M. Stusek, J. Krejci, K. Zeman, J. Pokorny, and M. Kudlacek, \u201cUnleashing Full Potential of Ansible Framework: University Labs Administration,\u201d in 2018 22nd Conference of Open Innovations Association (FRUCT), May 2018, pp. 144\u2013150. doi: 10.23919\/FRUCT.2018.8468270. Available: https:\/\/ieeexplore.ieee.org\/document\/8468270. [Accessed: Jul. 02, 2025]","DOI":"10.23919\/FRUCT.2018.8468270"},{"key":"10.1016\/j.procs.2026.03.124_bib3","unstructured":"OpenSCAP, \u201cOpenSCAP Project.\u201d Available: https:\/\/www.open-scap.org\/. [Accessed: Jul. 02, 2025]"},{"key":"10.1016\/j.procs.2026.03.124_bib4","unstructured":"RedHat, \u201cAnsible Collaborative.\u201d Available: https:\/\/www.redhat.com\/en\/ansible-collaborative. [Accessed: Jul. 02, 2025]"},{"key":"10.1016\/j.procs.2026.03.124_bib5","unstructured":"Center for Internet Security, \u201cCIS Benchmarks,\u201d CIS. Available: https:\/\/www.cisecurity.org\/cis-benchmarks\/. [Accessed: Jul. 02, 2025]"},{"issue":"4","key":"10.1016\/j.procs.2026.03.124_bib6","doi-asserted-by":"crossref","first-page":"e0266462","DOI":"10.1371\/journal.pone.0266462","article-title":"\u201cBlockchain technology in healthcare: A systematic review,\u201d","volume":"17","author":"Saeed","year":"2022","journal-title":"PLOS ONE"},{"key":"10.1016\/j.procs.2026.03.124_bib7","doi-asserted-by":"crossref","unstructured":"Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, \u201cAn Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,\u201d in 2017 IEEE International Congress on Big Data (BigData Congress), Jun. 2017, pp. 557\u2013564. doi: 10.1109\/BigDataCongress.2017.85. Available: https:\/\/ieeexplore.ieee.org\/document\/8029379. [Accessed: Jul. 02, 2025]","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"10.1016\/j.procs.2026.03.124_bib8","unstructured":"Brett Daniel, \u201cSystem Hardening: An Easy-to-Understand Overview,\u201d 2021. Available: https:\/\/www.trentonsystems.com\/en-us\/resource-hub\/blog\/system-hardening-overview. [Accessed: Jul. 02, 2025]"},{"key":"10.1016\/j.procs.2026.03.124_bib9","doi-asserted-by":"crossref","unstructured":"E. Billoir, R. Laborde, A. S. Wazan, Y. R\u00fctschl\u00e9, and A. Benzekri, \u201cImplementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives,\u201d in 2023 7th Cyber Security in Networking Conference (CSNet), Oct. 2023, pp. 130\u2013136. doi: 10.1109\/CSNet59123.2023.10339753. Available: https:\/\/ieeexplore.ieee.org\/document\/10339753. [Accessed: Jul. 02, 2025]","DOI":"10.1109\/CSNet59123.2023.10339753"},{"key":"10.1016\/j.procs.2026.03.124_bib10","doi-asserted-by":"crossref","unstructured":"T. Rose and X. Zhou, \u201cSystem Hardening for Infrastructure as a Service (IaaS),\u201d in 2020 IEEE Systems Security Symposium (SSS), Jul. 2020, pp. 1\u20137. doi: 10.1109\/SSS47320.2020.9174202. Available: https:\/\/ieeexplore.ieee.org\/abstract\/document\/9174202. [Accessed: Jul. 02, 2025]","DOI":"10.1109\/SSS47320.2020.9174202"},{"key":"10.1016\/j.procs.2026.03.124_bib11","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.infsof.2018.12.004","article-title":"\u201cA systematic mapping study of infrastructure as code research,\u201d","volume":"108","author":"Rahman","year":"2019","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.procs.2026.03.124_bib12","doi-asserted-by":"crossref","unstructured":"E. Whiting and S. Andrews, \u201cDrift and Erosion in Software Architecture: Summary and Prevention Strategies,\u201d in Proceedings of the 2020 the 4th International Conference on Information System and Data Mining, in ICISDM \u201820. New York, NY, USA: Association for Computing Machinery, Jul. 2020, pp. 132\u2013138. doi: 10.1145\/3404663.3404665. Available: https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404665. [Accessed: Jul. 02, 2025]","DOI":"10.1145\/3404663.3404665"},{"key":"10.1016\/j.procs.2026.03.124_bib13","unstructured":"Y. Yang, S. Ye, and X. Li, \u201cA Multi-Layered Security Analysis of Blockchain Systems: From Attack Vectors to Defense and System Hardening,\u201d arXiv.org, 2025. https:\/\/arxiv.org\/abs\/2504.09181 [Accessed Sep. 23, 2025]."},{"key":"10.1016\/j.procs.2026.03.124_bib14","doi-asserted-by":"crossref","unstructured":"J. A. Webb, M. W. Henderson, and M. L. Webb, \u201cAn Open Source Approach to Automating Surveillance and Compliance of Automatic Test Systems,\u201d in 2019 IEEE AUTOTESTCON, National Harbor, MD, USA: IEEE, Aug. 2019, pp. 1\u20138. doi: 10.1109\/AUTOTESTCON43700.2019.8961077. Available: https:\/\/ieeexplore.ieee.org\/document\/8961077\/. [Accessed: Jul. 02, 2025]","DOI":"10.1109\/AUTOTESTCON43700.2019.8961077"},{"key":"10.1016\/j.procs.2026.03.124_bib15","unstructured":"Mohammed Daffalla Elradi, \u201cAnsible: A Reliable Tool for Automation,\u201d Electr. Comput. Eng. Stud., 2023, doi: 10.58396\/eces020104. Available: https:\/\/www.sandermanpub.com\/journals_5\/article_detail\/56. [Accessed: Jul. 02, 2025]"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007192?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926007192?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T11:12:23Z","timestamp":1775560343000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926007192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":15,"alternative-id":["S1877050926007192"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.124","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Automating and hardening blockchain nodes in a decentralized healthcare platform for enhanced security and efficiency","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.03.124","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}