{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T11:23:56Z","timestamp":1773055436466,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T00:00:00Z","timestamp":1528329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,7]]},"DOI":"10.1145\/3205977.3205993","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"77-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["A blockchain-based Trust System for the Internet of Things"],"prefix":"10.1145","author":[{"given":"Roberto","family":"Di Pietro","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Xavier","family":"Salleras","sequence":"additional","affiliation":[{"name":"Universitat Pompeu Fabra, Barcelona, Spain"}]},{"given":"Matteo","family":"Signorini","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Paris, France"}]},{"given":"Erez","family":"Waisbard","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Freedman","author":"Ali Muneeb","year":"2016","unstructured":"Muneeb Ali , Jude Nelson , Ryan Shea , and Michael J . Freedman . 2016 . Bootstrapping Trust in Distributed Systems with Blockchains. Technical Report. Blockstack . Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Bootstrapping Trust in Distributed Systems with Blockchains. Technical Report. Blockstack."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2307\/4132332"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1030.0199"},{"key":"e_1_3_2_1_4_1","volume-title":"CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT 2017 IEEE International Conference on Communications (ICC)","author":"Daza V.","year":"2017","unstructured":"V. Daza , R. Di Pietro , I. Klimek , and M. Signorini . 2017 . CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT 2017 IEEE International Conference on Communications (ICC) . IEEE , Paris, France , 1--6. V. Daza, R. Di Pietro, I. Klimek, and M. Signorini. 2017. CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT 2017 IEEE International Conference on Communications (ICC). IEEE, Paris, France, 1--6."},{"key":"e_1_3_2_1_5_1","volume-title":"Information propagation in the Bitcoin network","author":"Decker Christian","year":"2013","unstructured":"Christian Decker and Roger Wattenhofer . 2013. Information propagation in the Bitcoin network . In IEEE P2P 2013 Proceedings. Institute of Electrical and Electronics Engineers (IEEE) , Trento, Italy, 1--10. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In IEEE P2P 2013 Proceedings. Institute of Electrical and Electronics Engineers (IEEE), Trento, Italy, 1--10."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Roberto di Pietro Xavier Salleras Matteo Signorini and Erez Waisbard. 2018. A blockchain-based Trust System for the Internet of Things - Extended. deftempurl%https:\/\/cri-lab.net\/wp-content\/uploads\/2018\/04\/IslandsOfTrust-Clean.pdf tempurl  Roberto di Pietro Xavier Salleras Matteo Signorini and Erez Waisbard. 2018. A blockchain-based Trust System for the Internet of Things - Extended. deftempurl%https:\/\/cri-lab.net\/wp-content\/uploads\/2018\/04\/IslandsOfTrust-Clean.pdf tempurl","DOI":"10.1145\/3205977.3205993"},{"key":"e_1_3_2_1_7_1","volume-title":"Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01)","author":"Douceur John R.","unstructured":"John R. Douceur . 2002. The Sybil Attack . In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01) . Springer-Verlag , London, UK , UK, 251--260. John R. Douceur. 2002. The Sybil Attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS '01). Springer-Verlag, London, UK, UK, 251--260."},{"key":"e_1_3_2_1_8_1","unstructured":"Open Connectivity Foundation. 2017. Online: https:\/\/openconnectivity.org\/.  Open Connectivity Foundation. 2017. Online: https:\/\/openconnectivity.org\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.58"},{"key":"e_1_3_2_1_10_1","volume-title":"In Proceedings of the 15th Bled Conference on Electronic Commerce. Electronic Commerce Center","author":"Josang Audun","year":"2002","unstructured":"Audun Josang and Roslan Ismail . 2002 . The beta reputation system . In In Proceedings of the 15th Bled Conference on Electronic Commerce. Electronic Commerce Center , Bled, Slovenia. Audun Josang and Roslan Ismail. 2002. The beta reputation system. In In Proceedings of the 15th Bled Conference on Electronic Commerce. Electronic Commerce Center, Bled, Slovenia."},{"key":"e_1_3_2_1_11_1","volume-title":"Introduction to Bitcoins: A Pseudo-anonymous Electronic Currency System Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '11)","author":"Martins Sergio","unstructured":"Sergio Martins and Yang Yang . 2011. Introduction to Bitcoins: A Pseudo-anonymous Electronic Currency System Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '11) . IBM Corp., Riverton, NJ, USA , 349--350. Sergio Martins and Yang Yang. 2011. Introduction to Bitcoins: A Pseudo-anonymous Electronic Currency System Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research (CASCON '11). IBM Corp., Riverton, NJ, USA, 349--350."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415110405"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_14_1","volume-title":"Rep on the Roll: A Peer to Peer Reputation System Based on a Rolling Blockchain","author":"Richard Dennis","year":"2016","unstructured":"Dennis Richard and Owenson Gareth . 2016. Rep on the Roll: A Peer to Peer Reputation System Based on a Rolling Blockchain . International Journal of Digital Society (IJDS) Vol . 7 (3. 2016 ), 1123--1134. Dennis Richard and Owenson Gareth. 2016. Rep on the Roll: A Peer to Peer Reputation System Based on a Rolling Blockchain. International Journal of Digital Society (IJDS) Vol. 7 (3. 2016), 1123--1134."},{"key":"e_1_3_2_1_15_1","volume-title":"ICT Systems Security and Privacy Protection","author":"Schaub Alexander","unstructured":"Alexander Schaub , R\u00e9mi Bazin , Omar Hasan , and Lionel Brunie . 2016. A Trustless Privacy-Preserving Reputation System . In ICT Systems Security and Privacy Protection . Springer Nature , Cham , 398--411. Alexander Schaub, R\u00e9mi Bazin, Omar Hasan, and Lionel Brunie. 2016. A Trustless Privacy-Preserving Reputation System. In ICT Systems Security and Privacy Protection. Springer Nature, Cham, 398--411."},{"key":"e_1_3_2_1_16_1","volume-title":"Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15)","author":"Soska Kyle","year":"2015","unstructured":"Kyle Soska and Nicolas Christin . 2015 . Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15) . USENIX Association, Berkeley, CA, USA, 33--48. Kyle Soska and Nicolas Christin. 2015. Measuring the Longitudinal Evolution of the Online Anonymous Marketplace Ecosystem Proceedings of the 24th USENIX Conference on Security Symposium (SEC'15). USENIX Association, Berkeley, CA, USA, 33--48."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"}],"event":{"name":"SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies","location":"Indianapolis Indiana USA","acronym":"SACMAT '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3205993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:02Z","timestamp":1750282862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,7]]},"references-count":18,"alternative-id":["10.1145\/3205977.3205993","10.1145\/3205977"],"URL":"https:\/\/doi.org\/10.1145\/3205977.3205993","relation":{},"subject":[],"published":{"date-parts":[[2018,6,7]]},"assertion":[{"value":"2018-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}