{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:03:35Z","timestamp":1771517015473,"version":"3.50.1"},"reference-count":118,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2022,11,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The aim of this paper is to evaluate the use of blockchain for identity management (IdM) in the context of the Internet of things (IoT) while focusing on privacy-preserving approaches and its applications to healthcare scenarios.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper describes the most relevant IdM systems focusing on privacy preserving with or without blockchain and evaluates them against ten selected features grouped into three categories: privacy, usability and IoT. Then, it is important to analyze whether blockchain should be used in all scenarios, according to the importance of each feature for different use cases.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>Based on analysis of existing systems, Sovrin is the IdM system that covers more features and is based on blockchain. For each of the evaluated use cases, Sovrin and UniquID were the chosen systems.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>This paper opens new lines of research for IdM systems in IoT, including challenges related to device identity definition, privacy preserving and new security mechanisms.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This paper contributes to the ongoing research in IdM systems for IoT. The adequacy of blockchain is not only analyzed considering the technology; instead the authors analyze its application to real environments considering the required features for each use case.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jeim-07-2018-0148","type":"journal-article","created":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T06:35:22Z","timestamp":1590993322000},"page":"1477-1505","source":"Crossref","is-referenced-by-count":29,"title":["The case for blockchain in IoT identity management"],"prefix":"10.1108","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0268-9134","authenticated-orcid":false,"given":"Patr\u00edcia R.","family":"Sousa","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o S.","family":"Resende","sequence":"additional","affiliation":[]},{"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"issue":"11","key":"key2022112308255682000_ref001","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.2017.1700871","article-title":"Advertising in the IoT era: vision and challenges","volume":"56","year":"2018","journal-title":"IEEE Communications Magazine"},{"key":"key2022112308255682000_ref002","first-page":"181","article-title":"Blockstack: a global naming and storage system secured by blockchains","year":"2016"},{"key":"key2022112308255682000_ref003","first-page":"1244","article-title":"A taxonomy of security and privacy requirements for the Internet of Things (IoT)","year":"2014"},{"key":"key2022112308255682000_ref004","volume-title":"Secure Element Authentication","year":"2016"},{"key":"key2022112308255682000_ref121","unstructured":"Anderson, S., Bohren, J., Boubez, T., Chanliau, M., Della-Libera, G., Dixon, B., Garg, P., Gudgin, M., Hallam-Baker, P., Hondo, M. and Kaler, C. (2004), \u201cWeb services trust language (ws-trust)\u201d, available at: https:\/\/bit.ly\/2A40DnQ (accessed 2 February 2019)."},{"key":"key2022112308255682000_ref005","doi-asserted-by":"crossref","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B. and Lilien, L. (2010), \u201cAn entity-centric approach for privacy and identity management in cloud computing\u201d, in 2010 29th IEEE Symposium on Reliable Distributed Systems, IEEE, Delhi, India, pp. 177-183.","DOI":"10.1109\/SRDS.2010.28"},{"issue":"6","key":"key2022112308255682000_ref006","doi-asserted-by":"crossref","first-page":"40","DOI":"10.5815\/ijisa.2018.06.05","article-title":"Blockchain with Internet of Things: benefits, challenges, and future directions","volume":"10","year":"2018","journal-title":"International Journal of Intelligent Systems and Applications"},{"issue":"15","key":"key2022112308255682000_ref007","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The Internet of Things: a survey","volume":"54","year":"2010","journal-title":"Computer Networks"},{"key":"key2022112308255682000_ref008","doi-asserted-by":"crossref","unstructured":"Aublin, P.-L., Mokhtar, S.B. and Quema, V. (2013), \u201cRbft: redundant byzantine fault tolerance\u201d, in 2013 IEEE 33rd International Conference on Distributed Computing Systems, IEEE, Philadelphia, pp. 297-306.","DOI":"10.1109\/ICDCS.2013.53"},{"key":"key2022112308255682000_ref009","doi-asserted-by":"crossref","unstructured":"Azimi, I., Anzanpour, A., Rahmani, A.M., Liljeberg, P. and Tenhunen, H. (2017), \u201cSelf-aware early warning score system for IoT-based personalized healthcare\u201d, in eHealth 360\u00b0, Springer, Budapest, pp. 49-55.","DOI":"10.1007\/978-3-319-49655-9_8"},{"key":"key2022112308255682000_ref010","first-page":"420","article-title":"Proposed security model and threat taxonomy for the Internet of Things (IoT)","year":"2010"},{"issue":"3","key":"key2022112308255682000_ref011","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.dcan.2017.10.006","article-title":"A blockchain future for Internet of Things security: a position paper","volume":"4","year":"2018","journal-title":"Digital Communications and Networks"},{"issue":"2017","key":"key2022112308255682000_ref012","article-title":"Holistic privacy-preserving identity management system for the Internet of Things","year":"2017","journal-title":"Mobile Information Systems"},{"key":"key2022112308255682000_ref013","article-title":"A privacy-preserving system for data ownership using blockchain and distributed databases","year":"2018"},{"key":"key2022112308255682000_ref016","first-page":"168","article-title":"Fourth-factor authentication: somebody you know","year":"2006"},{"key":"key2022112308255682000_ref017","article-title":"Towards robust distributed systems","volume-title":"in Proceedings of the XIX Annual ACM Symposium on Principles of Distributed Computing","year":"2000"},{"key":"key2022112308255682000_ref018","first-page":"1","article-title":"A user centric identity management for Internet of Things","year":"2014"},{"issue":"1","key":"key2022112308255682000_ref019","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s40854-016-0039-4","article-title":"Fraud detections for online businesses: a perspective from blockchain technology","volume":"2","year":"2016","journal-title":"Financial Innovation"},{"key":"key2022112308255682000_ref020","first-page":"21","article-title":"Design and implementation of the idemix anonymous credential system","year":"2002"},{"key":"key2022112308255682000_ref122","volume-title":"Digital Privacy: PRIME-Privacy and Identity Management for Europe","year":"2011"},{"key":"key2022112308255682000_ref021","first-page":"287","article-title":"A survey of identity management technology","year":"2010"},{"key":"key2022112308255682000_ref022","unstructured":"Care Unit (2017), \u201cIntensive care unit\u201d, available at: https:\/\/bit.ly\/2tHGzBE (accessed 29 June 2018)."},{"key":"key2022112308255682000_ref023","first-page":"153","year":"2000"},{"key":"key2022112308255682000_ref024","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W. (2009), \u201cFederated identity management\u201d, in Foundations of Security Analysis and Design V, Springer, Berlin, Heidelberg, pp. 96-120.","DOI":"10.1007\/978-3-642-03829-7_3"},{"key":"key2022112308255682000_ref200","unstructured":"Chester, J. (2017), \u201cHow blockchain startups will solve the identity crisis for the Internet Of Things\u201d, available at: https:\/\/bit.ly\/2A7U2sB (accessed 8 June 2018)."},{"issue":"2","key":"key2022112308255682000_ref025","doi-asserted-by":"crossref","first-page":"73","DOI":"10.13189\/csit.2013.010201","article-title":"Identity management in the Internet of Things: the role of manets for healthcare applications","volume":"1","year":"2013","journal-title":"Computer Science and Information Technology"},{"key":"key2022112308255682000_ref026","first-page":"532","article-title":"Adopting the Internet of Things technologies in health care systems","year":"2014"},{"key":"key2022112308255682000_ref123","unstructured":"Smith, C. (2018), \u201cApple watch saves the life of Florida teen with a life-threatening disease\u201d, available at: https:\/\/bit.ly\/2LdKrTy (accessed 28 June 2018)."},{"key":"key2022112308255682000_ref027","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","article-title":"Blockchains and smart contracts for the Internet of Things","volume":"4","year":"2016","journal-title":"IEEE Access"},{"key":"key2022112308255682000_ref028","first-page":"293","article-title":"An improved anonymous electronic prescription scheme","year":"2011"},{"key":"key2022112308255682000_ref029","unstructured":"Consensys (2016), \u201cBlockchain in digital identity\u201d, available at: https:\/\/bit.ly\/2xLgIhD (accessed 2 February 2018)."},{"key":"key2022112308255682000_ref030","first-page":"58","article-title":"Design and implementation of PUF-based \u2018unclonable\u2019 RFID ICS for anti-counterfeiting and security applications","year":"2008"},{"key":"key2022112308255682000_ref032","first-page":"173","article-title":"Towards an optimized blockchain for IoT","year":"2017"},{"key":"key2022112308255682000_ref033","first-page":"618","article-title":"Blockchain for IoT security and privacy: the case study of a smart home","year":"2017"},{"key":"key2022112308255682000_ref034","article-title":"Lsb: a lightweight scalable blockchain for Iot Security and Privacy","year":"2017"},{"issue":"4","key":"key2022112308255682000_ref035","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MSP.2018.3111247","article-title":"A first look at identity management schemes on the blockchain","volume":"16","year":"2018","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"key2022112308255682000_ref036","doi-asserted-by":"crossref","first-page":"326","DOI":"10.3390\/s19020326","article-title":"A decentralized privacy-preserving healthcare blockchain for IoT","volume":"19","year":"2019","journal-title":"Sensors"},{"key":"key2022112308255682000_ref037","first-page":"12","article-title":"A survey of user-centric identity management technologies","year":"2007"},{"key":"key2022112308255682000_ref038","unstructured":"Eyal, I., Gencer, A.E., Sirer, E.G. and Van Renesse, R. (2016), \u201cBitcoin-ng: a scalable blockchain protocol\u201d, in 13th USENIC Symposium on Networked Systems Design and Implementation, NSDI 16, USENIX, Santa Clara, CA, pp. 45-59."},{"key":"key2022112308255682000_ref040","first-page":"263","article-title":"Opportunities and challenges of the Internet of Things for healthcare: systems engineering perspective","year":"2014"},{"issue":"4","key":"key2022112308255682000_ref042","first-page":"2483","article-title":"Evaluating critical security issues of the IoT world: present and future challenges","volume":"5","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"key2022112308255682000_ref043","first-page":"310","article-title":"A fourier analysis based attack against physically unclonable functions","year":"2018"},{"key":"key2022112308255682000_ref044","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","year":"2017"},{"key":"key2022112308255682000_ref045","article-title":"Apache Kafka","year":"2013"},{"key":"key2022112308255682000_ref125","unstructured":"General Data Protection Regulation (2018), \u201cGDPR - Art. 5 - Principles relating to processing of personal data\u201d, available at: https:\/\/gdpr-info.eu\/art-5-gdpr\/ (accessed 24 January 2018)."},{"key":"key2022112308255682000_ref046","article-title":"Uniquid: a quest to reconcile identity access management and the Internet of Things","year":"2019"},{"key":"key2022112308255682000_ref047","article-title":"The oauth 2.0 authorization framework","year":"2012"},{"key":"key2022112308255682000_ref048","first-page":"13","article-title":"World of empowered IoT users","year":"2016"},{"key":"key2022112308255682000_ref049","first-page":"1","article-title":"Physical vulnerabilities of physically unclonable functions","year":"2014"},{"key":"key2022112308255682000_ref126","unstructured":"How to Draw for Kids (2017), \u201cHow-to-Draw-a-Man-for-Kids\u201d, available at: https:\/\/bit.ly\/35Tgz8B (accessed 29 June 2018)."},{"key":"key2022112308255682000_ref050","article-title":"The server portion of a distributed ledger purpose-built for decentralized identity","year":"2016"},{"key":"key2022112308255682000_ref052","first-page":"1","year":"2016"},{"key":"key2022112308255682000_ref053","first-page":"1","article-title":"A survey of how to use blockchain to secure Internet of Things and the stalker attack","volume":"2018","year":"2018","journal-title":"Security and Communication Networks"},{"key":"key2022112308255682000_ref127","unstructured":"Keycloak (2017), \u201cOpen source identity and access management for modern applications and services\u201d, available at: http:\/\/www.keycloak.org\/ (accessed 19 July 2017)."},{"key":"key2022112308255682000_ref129","unstructured":"Knight, J. (2017), \u201cWhat\u2019s Shibboleth?\u201d, available at: https:\/\/www.shibboleth.net\/ (accessed 9 February 2019)."},{"key":"key2022112308255682000_ref055","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: review, blockchain solutions, and open challenges","volume":"82","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"key2022112308255682000_ref056","first-page":"17","article-title":"Sovrin: digital identities in the blockchain era","year":"2017","journal-title":"Github Commit by jasonalaw October"},{"key":"key2022112308255682000_ref058","first-page":"18","article-title":"Identity in the internet-of-things (IoT): new challenges and opportunities","year":"2016"},{"issue":"3","key":"key2022112308255682000_ref059","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","article-title":"The byzantine generals problem","volume":"4","year":"1982","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"issue":"3","key":"key2022112308255682000_ref060","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MITP.2016.42","article-title":"The Internet of Things in healthcare: potential applications and challenges","volume":"18","year":"2016","journal-title":"It Professional"},{"key":"key2022112308255682000_ref061","first-page":"3","article-title":"Analysis of revocation strategies for anonymous idemix credentials","year":"2011"},{"key":"key2022112308255682000_ref062","doi-asserted-by":"crossref","unstructured":"Layouni, M. and Vangheluwe, H. (2007), \u201cAnonymous k-show credentials\u201d, in European Public Key Infrastructure Workshop, Springer, Palma de Mallorca, pp. 181-192.","DOI":"10.1007\/978-3-540-73408-6_13"},{"issue":"2-4","key":"key2022112308255682000_ref063","first-page":"1735","article-title":"Blockchain technology the identity management and authentication service disruptor: a survey","volume":"8","year":"2018","journal-title":"International Journal of Advanced Science, Engineering and Information Technology"},{"key":"key2022112308255682000_ref064","first-page":"430","article-title":"Identity management framework towards Internet of Things (IoT): roadmap and key challenges","year":"2010"},{"issue":"3","key":"key2022112308255682000_ref065","first-page":"1","article-title":"Sharing ledgers for sharing economies: an exploration of mutual distributed ledgers (aka blockchain technology)","volume":"3","year":"2015","journal-title":"Journal of Financial Perspectives"},{"key":"key2022112308255682000_ref066","unstructured":"Maler, E., Mishra, P., Lien, O.J. and Securit, R.S.A. (2006), \u201cSecurity Assertion Markup Language (SAML) V2.0 Technical Overview\u201d, available at: https:\/\/bit.ly\/2AbPaTs (accessed 27 January 2017)."},{"key":"key2022112308255682000_ref067","article-title":"Anonymous credentials: how to show credentials without compromising privacy","year":"2011"},{"key":"key2022112308255682000_ref068","first-page":"1","year":"2016"},{"issue":"7","key":"key2022112308255682000_ref069","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: vision, applications and research challenges","volume":"10","year":"2012","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"key2022112308255682000_ref071","first-page":"12","article-title":"Federated security: the shibboleth approach","volume":"27","year":"2004","journal-title":"Educause Quarterly"},{"key":"key2022112308255682000_ref072","first-page":"167","article-title":"Towards blockchain-based identity and access management for Internet of Things in enterprises","year":"2018"},{"key":"key2022112308255682000_ref130","unstructured":"Oasis (2009), \u201cWeb Services Federation Language (WS-Federation) Version 1.2\u201d, available at: https:\/\/bit.ly\/3chi42E (accessed 27 January 2017)."},{"key":"key2022112308255682000_ref073","first-page":"280","article-title":"Bitcoin mining and its energy footprint","volume-title":"25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies","year":"2014"},{"key":"key2022112308255682000_ref074","volume-title":"OpenID Libraries","year":"2017"},{"issue":"8","key":"key2022112308255682000_ref075","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.3390\/s18082575","article-title":"Blockchain and IoT integration: a systematic survey","volume":"18","year":"2018","journal-title":"Sensors"},{"key":"key2022112308255682000_ref076","article-title":"U-prove cryptographic Specification v1.1","volume-title":"Technical Report","year":"2011"},{"key":"key2022112308255682000_ref077","article-title":"Standardized identity protocols and the Internet of Things","year":"2015"},{"key":"key2022112308255682000_ref079","article-title":"Web services trust language (ws-trust)\u201d, Microsoft, IBM, Open Network, Layer 7, computer associates, Verisign, Bea, Oblix, Reactivity, RSA Security, Ping Identity, Verisign, Actional","year":"2005"},{"key":"key2022112308255682000_ref080","first-page":"119","article-title":"Sandboxing applications","volume-title":"Usenix Annual Technical Conference, Freenix Track, Boston, Massachusetts","year":"2001"},{"key":"key2022112308255682000_ref081","volume-title":"Identity Management for Europe","year":"2008"},{"key":"key2022112308255682000_ref131","unstructured":"Pressman, A. (2018), \u201cFitbit Strikes Deal With Google That Could Lead to Wearables Collaboration\u201d, available at: https:\/\/bit.ly\/2WPBCUC (accessed 26 June 2018)."},{"key":"key2022112308255682000_ref082","article-title":"DigiNotar Certificate Authority breach \u2018Operation Black Tulip\u2019","year":"2011"},{"key":"key2022112308255682000_ref084","first-page":"11","year":"2006"},{"issue":"9","key":"key2022112308255682000_ref085","first-page":"51","article-title":"Securing the Internet of Things","year":"2011","journal-title":"Computer"},{"key":"key2022112308255682000_ref086","first-page":"1","article-title":"Blockchain for IoT security and management: current prospects, challenges and future directions","year":"2018"},{"key":"key2022112308255682000_ref087","first-page":"237","article-title":"Modeling attacks on physical unclonable functions","year":"2010"},{"key":"key2022112308255682000_ref088","volume-title":"Openid Connect Core 1.0 Incorporating Errata Set 1","year":"2014"},{"key":"key2022112308255682000_ref133","unstructured":"Salvach\u00faa, J. and Alonso, \u00c1. (2016). \u201cIdentity Management \u2013 KeyRock\u201d, available at: https:\/\/github.com\/ging\/fiware-idm (accessed 8 May 2020)."},{"key":"key2022112308255682000_ref134","unstructured":"Saint-Andr\u00e9, P. (2016), \u201cHow can blockchains improve the Internet of Things?\u201d, available at: https:\/\/bit.ly\/2YJzVeD (accessed 1 June 2018)."},{"key":"key2022112308255682000_ref089","doi-asserted-by":"crossref","first-page":"4767","DOI":"10.1109\/ACCESS.2017.2788464","article-title":"Integration of anonymous credential systems in IoT constrained environments","volume":"6","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"key2022112308255682000_ref090","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/s11277-009-9697-0","article-title":"Identities in the future Internet of Things","volume":"49","year":"2009","journal-title":"Wireless Personal Communications"},{"key":"key2022112308255682000_ref094","first-page":"1","volume-title":"Blockchain & Infrastructure (Identity, Data Security)","year":"2016"},{"key":"key2022112308255682000_ref136","unstructured":"Sivakumar, P. (2017), \u201cPrivacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology\u201d, available at: https:\/\/bit.ly\/2YIYp7H (accessed 8 May 2020)."},{"key":"key2022112308255682000_ref137","unstructured":"SITA (2016), \u201cTravel identity of the future\u201d, available at: https:\/\/bit.ly\/2YQpc2d (accessed 9 October 2019)."},{"key":"key2022112308255682000_ref095","article-title":"Sociotal","year":"2015"},{"key":"key2022112308255682000_ref138","unstructured":"Sociotal (2016), \u201cSocIoTal Identity Manager\u201d, available at: https:\/\/github.com\/sociotal\/IdentityManager (accessed 2 February 2019)."},{"key":"key2022112308255682000_ref096","article-title":"Sovrin: a protocol and token for self-sovereign identity and decentralized trust. sovrin foundation","year":"2018"},{"key":"key2022112308255682000_ref139","unstructured":"Stefano, P. (2017), \u201cUniquid: a peer-to-peer trust model for IoT protocol primer\u201d, available at: https:\/\/bit.ly\/2WfFK1V (accessed 1 June 2018)."},{"issue":"7","key":"key2022112308255682000_ref097","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1016\/j.engappai.2011.06.008","article-title":"Partial identities as a foundation for trust and reputation","volume":"24","year":"2011","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"key2022112308255682000_ref098","first-page":"253","year":"2017"},{"key":"key2022112308255682000_ref140","unstructured":"The Paypers (2015), \u201cWeb fraud prevention, online authentication & digital identity market guide\u201d, available at: https:\/\/bit.ly\/2yEgMAa (accessed 18 January 2017)."},{"key":"key2022112308255682000_ref099","first-page":"1","article-title":"Identity management of devices in Internet of Things environment","year":"2016"},{"key":"key2022112308255682000_ref100","first-page":"115","article-title":"Rfid-tags for anti-counterfeiting","year":"2006"},{"key":"key2022112308255682000_ref091","article-title":"uPort Specs","year":"2017"},{"key":"key2022112308255682000_ref101","article-title":"uPort contracts for managing identity","year":"2017"},{"key":"key2022112308255682000_ref102","first-page":"374","year":"2012"},{"key":"key2022112308255682000_ref103","doi-asserted-by":"crossref","unstructured":"Vukolic, M. (2015), \u201cThe quest for scalable blockchain fabric: proof-of-work vs. bft replication\u201d, in International Workshop on Open Problems in Network Security, Springer, Zurich, pp. 112-125.","DOI":"10.1007\/978-3-319-39028-4_9"},{"key":"key2022112308255682000_ref104","doi-asserted-by":"crossref","unstructured":"Walker, M.A., Dubey, A., Laszka, A. and Schmidt, D.C. (2017), \u201cPlatibart: a platform for transactive IoT blockchain applications with repeatable testing\u201d, in Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things, ACM, Las Vegas, Nevada, pp. 17-22.","DOI":"10.1145\/3152141.3152392"},{"issue":"2014","key":"key2022112308255682000_ref107","first-page":"1","article-title":"Ethereum: a secure decentralised generalised transaction ledger","volume":"151","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"key2022112308255682000_ref108","first-page":"45","article-title":"Do you need a blockchain?","year":"2018"},{"issue":"8","key":"key2022112308255682000_ref109","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","article-title":"When mobile blockchain meets edge computing","volume":"56","year":"2018","journal-title":"IEEE Communications Magazine"},{"key":"key2022112308255682000_ref110","doi-asserted-by":"crossref","unstructured":"Yang, Y., Ding, X., Lu, H., Weng, J. and Zhou, J. (2015), \u201cSelf-blindable credential: towards anonymous entity authentication upon resource constrained devices\u201d, in Proceedings of the 16th International Conference on Information Security, Springer, Dallas, Texas, Vol. 7807, pp. 238-247.","DOI":"10.1007\/978-3-319-27659-5_17"},{"key":"key2022112308255682000_ref111","first-page":"1513","article-title":"Decentralized consensus for edge-centric Internet of Things: a review, taxonomy, and research issues","volume":"6","year":"2017","journal-title":"IEEE Access"},{"issue":"10","key":"key2022112308255682000_ref112","article-title":"Where is current research on blockchain technology?\u2014a systematic review","volume":"11","year":"2016","journal-title":"PloS One"},{"key":"key2022112308255682000_ref113","volume-title":"Diginotar Files for Bankruptcy in Wake of Devastating Hack","year":"2011"},{"key":"key2022112308255682000_ref114","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen, X. and Wang, H. (2017), \u201cAn overview of blockchain technology: architecture, consensus, and future trends\u201d, in 2017 IEEE International Congress on Big Data (Bigdata Congress), IEEE, Honolulu, HI, pp. 557-564.","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"12","key":"key2022112308255682000_ref115","doi-asserted-by":"crossref","first-page":"4215","DOI":"10.3390\/s18124215","article-title":"Identity management systems for the Internet of Things: a survey towards blockchain solutions","volume":"18","year":"2018","journal-title":"Sensors"},{"issue":"3","key":"key2022112308255682000_ref116","first-page":"429","article-title":"A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services","volume":"12","year":"2018","journal-title":"IEEE Transactions on Services Computing"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-07-2018-0148\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-07-2018-0148\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:31:41Z","timestamp":1753396301000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/35\/6\/1477-1505\/434542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":118,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2020,6,2]]},"published-print":{"date-parts":[[2022,11,24]]}},"alternative-id":["10.1108\/JEIM-07-2018-0148"],"URL":"https:\/\/doi.org\/10.1108\/jeim-07-2018-0148","relation":{},"ISSN":["1741-0398"],"issn-type":[{"value":"1741-0398","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,2]]}}}