{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T16:45:38Z","timestamp":1758991538737,"version":"3.37.3"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"PRIN (Progetti di Rilevante Interesse Nazionale) PNNR (Piano Nazionale di Ripresa e Resilienza) 2022 Project ACOI\u2013Assessing Conflict of Interest"},{"name":"European Union\u2013Next Generation EU"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3418749","type":"journal-article","created":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T20:08:16Z","timestamp":1719259696000},"page":"88383-88409","source":"Crossref","is-referenced-by-count":3,"title":["Combining Git and Blockchain for Trusted Information Sharing"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2463-3772","authenticated-orcid":false,"given":"Luca","family":"Grilli","sequence":"first","affiliation":[{"name":"Department of Engineering, University of Perugia, Perugia, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7418-0396","authenticated-orcid":false,"given":"Paolo","family":"Speziali","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Perugia, Perugia, Italy"}]}],"member":"263","reference":[{"volume-title":"Commission Staff Working Document Impact Assessment Report Accompanying the Document Proposal for a Regulation of the European Parliament and of the Council on European Data Governance (Data Governance Act)","year":"2020","key":"ref1"},{"volume-title":"Proposal for a Regulation of the European Parliament and of the Council on European Data Governance (Data Governance Act)","year":"2020","key":"ref2"},{"volume-title":"Data Sharing is a Bus. Necessity to Accelerate Digital Business","year":"2021","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-47r1"},{"volume-title":"Knowledge Base","year":"2024","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2886932"},{"volume-title":"Deloitte\u2019s 2021 Global Blockchain Survey: A New Age of Digital Assets","year":"2021","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2021.09.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3052019"},{"volume-title":"Blockchain for digital government","year":"2019","author":"Allessie","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-55746-1","volume-title":"Blockchain and the Public Sector\u2014Theories, Reforms, and Case Studies","author":"Reddick","year":"2021"},{"volume-title":"Communication From the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: A European Strategy for Data","year":"2020","key":"ref12"},{"volume-title":"Solid Technical Reports","year":"2024","key":"ref13"},{"volume-title":"Git Software Freedom Conservancy","year":"2022","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-0076-6","volume-title":"Pro Git","author":"Chacon","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.180-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_24"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-014-9968-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2013.34"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-63958-0_35"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0010337806610669"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/sp.1980.10006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"Nakamoto","key":"ref27"},{"volume-title":"Mastering Bitcoin: Programming the Open Blockchain","year":"2017","author":"Antonopoulos","key":"ref28"},{"volume-title":"Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction","year":"2016","author":"Narayanan","key":"ref29"},{"volume-title":"Mastering Ethereum: Building Smart Contracts and DApps","year":"2018","author":"Antonopoulos","key":"ref30"},{"volume-title":"Ethereum Whitepaper","year":"2024","key":"ref31"},{"volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger","year":"2024","author":"Wood","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2018.101"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/brains52497.2021.9569804"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3007251"},{"volume-title":"Solidity Programming Language","year":"2024","key":"ref36"},{"volume-title":"GitHub\u2014Vyperlang\/Vyper: Pythonic Smart Contract Language for the EVM","year":"2024","key":"ref37"},{"volume-title":"Script","year":"2024","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08775-8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.36"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345652"},{"key":"ref45","article-title":"Blockchain-empowered trustworthy data sharing: Fundamentals, applications, and challenges","author":"Nguyen","year":"2023","journal-title":"arXiv:2303.06546"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/cloudcom2018.2018.00060"},{"key":"ref47","article-title":"IPFS\u2013content addressed, versioned, P2P file system","author":"Benet","year":"2014","journal-title":"arXiv:1407.3561"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94478-4_14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5243-4_79"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v16i15.31713"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/app9061207"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109004"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.04.036"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.014"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.3390\/app13053066"},{"volume-title":"GitHub\u2014Cardstack\/Githereum: Gitchain Implementation in Ethereum","year":"2024","author":"Melia","key":"ref56"},{"volume-title":"GitHub\u2014Cardstack\/Gitchain","year":"2024","author":"Speller","key":"ref57"},{"volume-title":"Introducing Gitchain\u2014Cardstack\u2019s Protocol for Syncing Application States","year":"2024","author":"Tse","key":"ref58"},{"volume-title":"Ethereum","year":"2024","key":"ref59"},{"volume-title":"GitHub\u2014Web3\/Web3.JS: Ethereum JavaScript API","year":"2024","key":"ref60"},{"volume-title":"Web3.JS\u2014Ethereum JavaScript API","year":"2024","key":"ref61"},{"volume-title":"GitHub\u2014Steveukx\/GIT-JS: A Light Weight Interface for Running Git Commands in Any Node.JS Application","year":"2024","author":"King","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4122"},{"volume-title":"Ganache\u2014Truffle Suite","year":"2022","key":"ref64"},{"key":"ref65","first-page":"379","article-title":"On omitting commits and committing omissions: Preventing Git metadata tampering that (re) introduces software vulnerabilities","volume-title":"Proc. 25th Secur. Symp.","author":"Torres-Arias"},{"volume-title":"Unverified Commits: Are You Unknowingly Trusting Attackers\u2019 Code?","year":"2024","author":"Gershon","key":"ref66"},{"volume-title":"Git Tools\u2014Rewriting Hist","year":"2022","key":"ref67"},{"volume-title":"Change Date a Git Commit","year":"2018","author":"Francesco","key":"ref68"},{"volume-title":"How Can I Undo Pushed Commits Using Git?","year":"2014","key":"ref69"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10570424.pdf?arnumber=10570424","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T05:17:06Z","timestamp":1719638226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10570424\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3418749","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}