{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T11:16:47Z","timestamp":1773055007069,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018901","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Harnessing the power of blockchain technology to solve IoT security &amp; privacy issues"],"prefix":"10.1145","author":[{"given":"Aafaf","family":"Ouaddah","sequence":"first","affiliation":[{"name":"Cadi Ayyad University, Marrakesh, MOROCCO"}]},{"given":"Anas Abou","family":"Elkalam","sequence":"additional","affiliation":[{"name":"Cadi Ayyad University, Marrakesh, MOROCCO"}]},{"given":"Abdellah Ait","family":"Ouahman","sequence":"additional","affiliation":[{"name":"Cadi Ayyad University, Marrakesh, MOROCCO"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Access Control in IoT: Survey & State of the Art In the Proceeding of the 5th International Conference on Multimedia Computing and Systems (ICMCS'16)","author":"Ouaddah A.","year":"2016"},{"key":"e_1_3_2_1_2_1","volume-title":"Middle East and North Africa Conference on Technology and Security to Support Learning, Sa\u00efdia in Morocco","author":"Ouaddah A. Abouelkalam","year":"2016"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICINA.2010.5636381"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"International Journal of Computer Mathematics","author":"Hern\u00e1ndez-Ramos Jos\u00e9 L","year":"2014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583465"},{"key":"e_1_3_2_1_7_1","unstructured":"D. H. (ed) \"The OAuth 2.0 Authorization Framework \" IETF RFC6749 October 2012  D. H. (ed) \"The OAuth 2.0 Authorization Framework \" IETF RFC6749 October 2012"},{"key":"e_1_3_2_1_8_1","unstructured":"Connect All IP-Based Smart Objects (CALIPSO)---FP7 EU Project.{Online}. Available: http:\/\/www.ict-calipso.eu\/ accessed Oct. 15 2014.  Connect All IP-Based Smart Objects (CALIPSO)---FP7 EU Project.{Online}. Available: http:\/\/www.ict-calipso.eu\/ accessed Oct. 15 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361406"},{"key":"e_1_3_2_1_10_1","first-page":"10","article-title":"The constrained application protocol (coap)","volume":"7252","author":"Shelby K. Hartke","year":"2014","journal-title":"IETF RFC"},{"key":"e_1_3_2_1_11_1","unstructured":"Hannes Tschofenig \"The OAuth 2.0 Bearer Token Usage over the Constrained Application Protocol (CoAP)\" IETF Internet Draft draft-tschofenig-ace-oauth-bt-01.txt 2015  Hannes Tschofenig \"The OAuth 2.0 Bearer Token Usage over the Constrained Application Protocol (CoAP)\" IETF Internet Draft draft-tschofenig-ace-oauth-bt-01.txt 2015"},{"key":"e_1_3_2_1_12_1","unstructured":"H. Tschofenig \"The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant\" IETF Internet Draft draft-tschofenig-ace-oauth-iot-00.txt 2014  H. Tschofenig \"The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant\" IETF Internet Draft draft-tschofenig-ace-oauth-iot-00.txt 2014"},{"key":"e_1_3_2_1_13_1","unstructured":"E. Wahlstroem \"OAuth 2.0 Introspection over the Constrained Application Protocol (CoAP)\" IETF Internet Draft draft-wahlstroem-ace-oauth-introspection-01.txt 2015  E. Wahlstroem \"OAuth 2.0 Introspection over the Constrained Application Protocol (CoAP)\" IETF Internet Draft draft-wahlstroem-ace-oauth-introspection-01.txt 2015"},{"key":"e_1_3_2_1_14_1","unstructured":"H. Tschofenig E. Maler E. Wahlstroe and S. Erdtman \"Authentication and Authorization for Constrained Environments Using OAuth and UMA\" IETF Internet Draft draft-maler-ace-oauth-uma-00.txt 2015  H. Tschofenig E. Maler E. Wahlstroe and S. Erdtman \"Authentication and Authorization for Constrained Environments Using OAuth and UMA\" IETF Internet Draft draft-maler-ace-oauth-uma-00.txt 2015"},{"key":"e_1_3_2_1_15_1","unstructured":"Sanjay Panikkar Sumabala Nair Paul Brody Veena Pureswaran. ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW IBM (2015).  Sanjay Panikkar Sumabala Nair Paul Brody Veena Pureswaran. ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW IBM (2015)."},{"key":"e_1_3_2_1_16_1","unstructured":"Sanjay Panikkar Sumabala Nair Paul Brody Veena Pureswaran. ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW IBM (2015).  Sanjay Panikkar Sumabala Nair Paul Brody Veena Pureswaran. ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW IBM (2015)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2867541.2867781"},{"key":"e_1_3_2_1_18_1","volume-title":"Secure Data Management in Decentralized Systems","author":"Di Vimercati S. De Capitani","year":"2007"},{"key":"e_1_3_2_1_19_1","unstructured":"Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC OJ L 257 28.8.2014 p. 73--114 (BG ES CS DA DE ET EL EN FR GA HR IT LV LT HU MT NL PL PT RO SK SL FI SV)  Regulation (EU) No 910\/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999\/93\/EC OJ L 257 28.8.2014 p. 73--114 (BG ES CS DA DE ET EL EN FR GA HR IT LV LT HU MT NL PL PT RO SK SL FI SV)"},{"key":"e_1_3_2_1_20_1","first-page":"290","article-title":"Trust modeling and management: from social trust to digital trust","author":"Yan Zheng","year":"2008","journal-title":"IGI Global"},{"key":"e_1_3_2_1_21_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability","author":"Marit K\u00f6hntopp Anonymity","year":"2000"},{"key":"e_1_3_2_1_22_1","unstructured":"White Paper---Ethereum\/WiKi 2016 {online} Available: online White Paper---Ethereum\/WiKi 2016 {online} Available: online"},{"key":"e_1_3_2_1_23_1","volume-title":"White Paper","author":"Vitalik","year":"2014"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Conf. USENIX Annu. Tech. Conf. (USENIX ATC)","year":"2016"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ouaddah A. Abou Elkalam A. & Ait Ouahman A. (2017). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and Communication Networks.  Ouaddah A. Abou Elkalam A. & Ait Ouahman A. (2017). FairAccess: a new Blockchain-based access control framework for the Internet of Things. Security and Communication Networks.","DOI":"10.1002\/sec.1748"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","location":"Cambridge United Kingdom","acronym":"ICC '17"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3018901&ftid=1947164&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":26,"alternative-id":["10.1145\/3018896.3018901","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018901","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}