{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:28:03Z","timestamp":1755793683279,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/icbc64466.2025.11114608","type":"proceedings-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:34:30Z","timestamp":1755196470000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Supply-Chain-Aligned Software Auditing and Usage Justification via Distributed Ledgers"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Stengele","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Institute of Information Security and Dependability (KASTEL),Karlsruhe,Germany"}]},{"given":"Jan","family":"Droll","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Institute of Information Security and Dependability (KASTEL),Karlsruhe,Germany"}]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology (KIT),Institute of Information Security and Dependability (KASTEL),Karlsruhe,Germany"}]}],"member":"263","reference":[{"key":"ref1","article-title":"2023 Software Supply Chain Attack Report","volume-title":"Cybersecurity Ventures, Tech. Rep.","year":"2023"},{"key":"ref2","volume-title":"European Commission. (2022) Cyber resilience act"},{"key":"ref3","volume-title":"Exec. order 14028","year":"2021"},{"key":"ref4","article-title":"SBOM Sharing Roles and Considerations","volume-title":"Cybersecurity & Infrastructure Security Agency, Tech. Rep.","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3643662.3643957"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2009-0364"},{"key":"ref7","article-title":"IPFS - content addressed, versioned, P2P file system","author":"Benet","year":"2014"},{"key":"ref8","volume-title":"Cyclonedx"},{"key":"ref9","volume-title":"Authoritative guide to SBOM","year":"2024"},{"key":"ref10","volume-title":"Authoritative guide to attestations","year":"2024"},{"key":"ref11","volume-title":"Mempool archive"},{"key":"ref12","first-page":"53","article-title":"Exploring Ethereum\u2019s Data Stores: A Cost and Performance Comparison","volume-title":"2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","author":"Kostamis"},{"key":"ref13","volume-title":"Ethereum API"},{"key":"ref14","article-title":"Ethereum API","volume-title":"Introducing faster Ethereum logs and events","year":"2019"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3560835.3564549"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3605770.3625213"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179304"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-09959-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200051"}],"event":{"name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Pisa, Italy","start":{"date-parts":[[2025,6,2]]},"end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11114381\/11114414\/11114608.pdf?arnumber=11114608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T05:14:32Z","timestamp":1755234872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114608\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icbc64466.2025.11114608","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}