{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:47:11Z","timestamp":1747201631476,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,9]]},"DOI":"10.1109\/icca51439.2020.9264499","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:36:44Z","timestamp":1606772204000},"page":"671-676","source":"Crossref","is-referenced-by-count":7,"title":["A Review on Blockchain-based Access Control Models in IoT Applications"],"prefix":"10.1109","author":[{"given":"Yunpeng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ali","family":"Memariani","sequence":"additional","affiliation":[]},{"given":"Nirupam","family":"Bidikar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.016"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/app9102058"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00074"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080757"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205993"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766478"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904042"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7817614"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2019.8861857"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/computers7030039"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.108"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00083"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2018.00032"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648778"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00253"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917555"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00237"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00236"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2929205"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656694"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0619"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8793047"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00081"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917976"},{"key":"ref5","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59665-5_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2019.8792979"},{"year":"0","key":"ref2","article-title":"Understanding trie databases in ethereum"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.comnet.2018.03.012","article-title":"Internet of things security: A top-down survey","volume":"141","author":"kouicem","year":"2018","journal-title":"Computer Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISCE.2019.00044"},{"key":"ref22","article-title":"Private blockchain-based secure access control for smart home systems","volume":"12","author":"xue","year":"2018","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812844"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968492"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539659"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref26","first-page":"1204","article-title":"Blockchain based delegatable access control scheme for a collaborative e-health environment","author":"pussewalage","year":"2018","journal-title":"2018 IEEE Int Conf Internet Things"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94370-1_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.010"}],"event":{"name":"2020 IEEE 16th International Conference on Control & Automation (ICCA)","start":{"date-parts":[[2020,10,9]]},"location":"Singapore","end":{"date-parts":[[2020,10,11]]}},"container-title":["2020 IEEE 16th International Conference on Control &amp; Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9264304\/9264308\/09264499.pdf?arnumber=9264499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:16:03Z","timestamp":1656375363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9264499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,9]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/icca51439.2020.9264499","relation":{},"subject":[],"published":{"date-parts":[[2020,10,9]]}}}