{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:12:46Z","timestamp":1762272766223},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,3]]},"DOI":"10.1109\/icbc51069.2021.9461143","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T20:16:55Z","timestamp":1624565815000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain for Embedded System Accountability"],"prefix":"10.1109","author":[{"given":"Michael","family":"Chiu","sequence":"first","affiliation":[{"name":"University of Toronto,Department of Computer Science,Toronto,M5S 2E4"}]},{"given":"Abraham","family":"Goldsmith","sequence":"additional","affiliation":[{"name":"University of Toronto,Department of Computer Science,Toronto,M5S 2E4"}]},{"given":"Uros","family":"Kalabic","sequence":"additional","affiliation":[{"name":"University of Toronto,Department of Computer Science,Toronto,M5S 2E4"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.32"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-14"},{"key":"ref13","first-page":"53","article-title":"Cryptographic support for secure logs on untrusted machines","author":"schneier","year":"1998","journal-title":"Proc Usenix Secur Symp"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3362744.3363346"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101602"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"year":"2019","key":"ref17","article-title":"Beyond theory: Getting practical with blockchain; Boston Fed learns by doing with blockchain technology"},{"key":"ref18","article-title":"The role of accountability in dependable distributed systems","author":"yumerefendi","year":"2005","journal-title":"Proc Workshop Hot Topics Syst Dependability"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-9170-5"},{"journal-title":"DoD Standard 5200 28-STD","article-title":"Trusted Computer System Evaluation Criteria","year":"1985","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22726-4_45"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004206"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773926"},{"key":"ref8","first-page":"453","article-title":"Practical hardening of crash-tolerant systems","author":"correia","year":"2012","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref7","article-title":"The case for Byzantine fault detection","author":"haeberlen","year":"2006","journal-title":"Proc Workshop Hot Topics Syst Dependability"},{"key":"ref2","first-page":"173","article-title":"Practical Byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.66"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294279"},{"key":"ref20","article-title":"Building an encrypted and searchable audit log","author":"waters","year":"2004","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/152610.152612"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2402.322398"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294280"}],"event":{"name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2021,5,3]]},"location":"Sydney, Australia","end":{"date-parts":[[2021,5,6]]}},"container-title":["2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9460986\/9461049\/09461143.pdf?arnumber=9461143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:01:31Z","timestamp":1659484891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9461143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icbc51069.2021.9461143","relation":{},"subject":[],"published":{"date-parts":[[2021,5,3]]}}}