{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T15:52:31Z","timestamp":1744213951841,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/kse.2019.8919268","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T10:26:17Z","timestamp":1575627977000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Review: Data Security Models Developed by Blockchain Technology for Different Business Domains"],"prefix":"10.1109","author":[{"given":"Mohib","family":"Hirani","sequence":"first","affiliation":[]},{"given":"Malka N.","family":"Halgamuge","sequence":"additional","affiliation":[]},{"given":"Pham","family":"Duong Thu Hang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2018","author":"nakamoto","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2017.8248427"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00009"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIBMS.2018.8550004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00121"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT.2017.8284606"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327566"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327567"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00081"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9078-1.ch001"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/bs.adcom.2018.03.007","article-title":"Blockchain technology: supply chain insights from ERP","volume":"111","author":"banerjee","year":"2018","journal-title":"Advances in Computers"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-018-1840-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622341"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2018.8612034"},{"article-title":"Automated Remote Patient Monitoring: Data Sharing and Privacy Using Blockchain","year":"2018","author":"srivastava","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2854904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00183"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487379"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614960"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITME.2018.00213"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LISS.2018.8593225"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CAC.2018.8623198"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2907695"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00236"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00152"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.31"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2018.00031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8605946"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2019.8701910"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.02.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2018.8636131"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICIET.2010.5625728"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406325"},{"key":"ref47","first-page":"350","article-title":"Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices","author":"pham","year":"2010","journal-title":"The 28th PIERS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895327"},{"key":"ref42","first-page":"1","article-title":"Blockchain technology, bitcoin, and Ethereum: A brief overview","author":"vuji?i?","year":"2018","journal-title":"2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH) INFOTEH"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CIOT.2018.8627112"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903554"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2018.00056"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.01.009"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/HOTICN.2018.8605993"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRD.2018.8376323"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656694"}],"event":{"name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","start":{"date-parts":[[2019,10,24]]},"location":"Da Nang, Vietnam","end":{"date-parts":[[2019,10,26]]}},"container-title":["2019 11th International Conference on Knowledge and Systems Engineering (KSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8909968\/8919259\/08919268.pdf?arnumber=8919268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:18:08Z","timestamp":1657855088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8919268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/kse.2019.8919268","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}