{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:58:19Z","timestamp":1761649099098,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,25]]},"DOI":"10.1109\/indin51773.2022.9976141","type":"proceedings-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T20:05:02Z","timestamp":1671134702000},"page":"180-187","source":"Crossref","is-referenced-by-count":2,"title":["Distributed ledger-based authentication and authorization for Industrie 4.0 components"],"prefix":"10.1109","author":[{"given":"Alaettin","family":"Dogan","sequence":"first","affiliation":[{"name":"Helmut Schmidt University,Institute of Automation Technology,Hamburg,Germany,22043"}]},{"given":"Aron","family":"Schnakenbeck","sequence":"additional","affiliation":[{"name":"Helmut Schmidt University,Institute of Automation Technology,Hamburg,Germany,22043"}]},{"given":"Alexander","family":"Fay","sequence":"additional","affiliation":[{"name":"Helmut Schmidt University,Institute of Automation Technology,Hamburg,Germany,22043"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.bcra.2021.100027"},{"year":"2021","key":"ref38","article-title":"IEC CD 61406 &#x2013; Identification Link"},{"year":"2015","key":"ref33","article-title":"ISO\/IEC 11770-3:2015 &#x2013; Information technology &#x2013; Security techniques &#x2013; Key management &#x2013; Part 3: Mechanisms using asymmetric techniques"},{"article-title":"IOTA DID Method Specification (Version 0.2-draft)","year":"2021","author":"millenaar","key":"ref32"},{"key":"ref31","article-title":"Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions","author":"singhal","year":"2018","journal-title":"Apress"},{"key":"ref30","article-title":"Guide to attribute based access control (ABAC) definition and considerations (draft)","volume":"800","author":"hu","year":"2013","journal-title":"NIST Special Publication"},{"year":"2019","key":"ref37","article-title":"Industry Marketplace"},{"year":"2020","key":"ref36","article-title":"Distributed Ledger-based Infrastructure for Industrial Digital Twins: 5 use cases enabled by Blockchain, IOTA Tangle, and ECLASS"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"article-title":"Applied cryptography: protocols, algorithms, and source code in C","year":"1995","author":"schneier","key":"ref34"},{"year":"2020","key":"ref10","article-title":"VDI\/VDE 2193 Part 2: Language for I4.0 components - Interaction protocol for bidding procedures"},{"journal-title":"Federal Ministry for Economic Affairs and Energy","article-title":"Details of the Asset Administration Shell, Part 1 (Version 3.0RC01)","year":"2020","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1137-0_2"},{"year":"2019","key":"ref12","article-title":"DIN SPESC 91406: Automatic identification of physical objects and information on physical objects in IT systems, particularly IoT systems"},{"journal-title":"Federal Ministry for Economic Affairs and Energy","article-title":"Working Paper: Structure of the Administration Shell","year":"2016","key":"ref13"},{"key":"ref14","article-title":"IOTA: feeless and free","author":"popov","year":"2019","journal-title":"IEEE Blockchain Technical Briefs"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.30844\/I40M_20-1_S36-40"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/su12062391"},{"journal-title":"Federal Ministry for Economic Affairs and Energy","article-title":"Discussion Paper: Access control for Industrie 4.0 components for application by manufacturers, operators, and integrators","year":"2019","key":"ref17"},{"journal-title":"Federal Ministry for Economic Affairs and Energy","article-title":"2030 Vision for Industrie 4.0: Shaping Digital Ecosystems Globally","year":"2019","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_3"},{"key":"ref28","article-title":"Uniform Resource Identifier (URI): Generic Syntax (RFC 3986)","author":"berners-lee","year":"2005","journal-title":"Network Working Group"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01176-z"},{"year":"2021","key":"ref27","article-title":"Decentralized Identifiers (DIDs) v1.0. Core architecture, data model, and representations"},{"journal-title":"Federal Ministry for Economic Affairs and Energy","article-title":"Working Paper: Aspects of the Research Roadmap in Application Scenarios","year":"2016","key":"ref3"},{"key":"ref6","first-page":"161","article-title":"Cyber-physical systems","volume":"12","author":"radhakisan","year":"2011","journal-title":"The Impact of Control Technology"},{"year":"2021","key":"ref29","article-title":"Verifiable Credentials Data Model 1.0. Expressing verifiable information on the Web"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2017.2648857"},{"year":"2016","key":"ref8","article-title":"DIN SPEC 91345: Reference Architecture Model Industrie 4.0 (RAMI4. 0)"},{"key":"ref7","first-page":"54","article-title":"Industry 4.0: The future of productivity and growth in manufacturing industries","volume":"9","author":"r\u00fc\u00dfmann","year":"2015","journal-title":"The Boston Consulting Group"},{"article-title":"Industry 4.0: managing the digital transformation","year":"2017","author":"ustundag","key":"ref2"},{"year":"2020","key":"ref9","article-title":"VDI\/VDE 2193 Part 1: Language for I4.0 components - Structure of messages"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.promfg.2018.02.034","article-title":"Industry 4.0&#x2013;a glimpse","volume":"20","author":"vaidya","year":"2018","journal-title":"Procedia Manufacturing"},{"key":"ref20","article-title":"Self-sovereign and Decentralized identity as the future of identity management?","author":"kubach","year":"2020","journal-title":"Open Identity Summit OID"},{"article-title":"EIP-725: ERC-725 Smart Contract Based Account","year":"2017","author":"vogelsteller","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"year":"2018","key":"ref24","article-title":"Hyperledger Indy Revision 6b6c21b2"},{"key":"ref23","article-title":"Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust","author":"foundation","year":"2018","journal-title":"White Paper"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00187"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSE49799.2020.9272223"}],"event":{"name":"2022 IEEE 20th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2022,7,25]]},"location":"Perth, Australia","end":{"date-parts":[[2022,7,28]]}},"container-title":["2022 IEEE 20th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9975846\/9976066\/09976141.pdf?arnumber=9976141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:31:42Z","timestamp":1673897502000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9976141\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/indin51773.2022.9976141","relation":{},"subject":[],"published":{"date-parts":[[2022,7,25]]}}}