{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:57Z","timestamp":1750221117377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,10]]},"DOI":"10.1145\/3301403.3301405","type":"proceedings-article","created":{"date-parts":[[2019,2,5]],"date-time":"2019-02-05T20:44:12Z","timestamp":1549399452000},"page":"6-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Pervasive Smart Contracts for Blockchains in IoT Systems"],"prefix":"10.1145","author":[{"given":"Amir","family":"Taherkordi","sequence":"first","affiliation":[{"name":"University of Oslo, Oslo, Norway and Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology (NTNU), Trondheim, Norway"}]}],"member":"320","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3131543"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2016.910036"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2566339"},{"volume-title":"IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE Computer","author":"Dorri A.","key":"e_1_3_2_1_4_1","unstructured":"A. Dorri , S. S. Kanhere , R. Jurdak , and P. Gauravaram . 2017. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home . In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE Computer , Kona, HI, USA, 618--623. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram. 2017. Blockchain for IoT Security and Privacy: The Case Study of a Smart Home. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE Computer, Kona, HI, USA, 618--623."},{"key":"e_1_3_2_1_5_1","volume-title":"LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy. CoRR abs\/1712.02969","author":"Dorri Ali","year":"2017","unstructured":"Ali Dorri , Salil S. Kanhere , Raja Jurdak , and Praveen Gauravaram . 2017 . LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy. CoRR abs\/1712.02969 (2017), 1--17. http:\/\/arxiv.org\/abs\/1712.02969 Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy. CoRR abs\/1712.02969 (2017), 1--17. http:\/\/arxiv.org\/abs\/1712.02969"},{"key":"e_1_3_2_1_6_1","unstructured":"Ethereum Project. Accessed: 2018. http:\/\/www.ethereum.org.  Ethereum Project. Accessed: 2018. http:\/\/www.ethereum.org."},{"key":"e_1_3_2_1_7_1","unstructured":"Ethereum Virtual Machine. Accessed: 2018. http:\/\/ethdocs.org\/en\/latest\/ introduction.  Ethereum Virtual Machine. Accessed: 2018. http:\/\/ethdocs.org\/en\/latest\/ introduction."},{"key":"e_1_3_2_1_8_1","unstructured":"Hyperledger Fabric. Accessed: 2018. http:\/\/www.hyperledger.org\/projects\/fabric.  Hyperledger Fabric. Accessed: 2018. http:\/\/www.hyperledger.org\/projects\/fabric."},{"key":"e_1_3_2_1_9_1","unstructured":"IOTA. Accessed: 2018. https:\/\/www.iota.org.  IOTA. Accessed: 2018. https:\/\/www.iota.org."},{"volume-title":"Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In IEEE Symposium on Security and Privacy (SP). IEEE Computer, CA, USA, 839--858","author":"Kosba A.","key":"e_1_3_2_1_10_1","unstructured":"A. Kosba , A. Miller , E. Shi , Z. Wen , and C. Papamanthou . 2016 . Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In IEEE Symposium on Security and Privacy (SP). IEEE Computer, CA, USA, 839--858 . A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou. 2016. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In IEEE Symposium on Security and Privacy (SP). IEEE Computer, CA, USA, 839--858."},{"key":"e_1_3_2_1_12_1","volume-title":"Seyed Yahya Nikouei, and Yu Chen","author":"Nagothu Deeraj","year":"2018","unstructured":"Deeraj Nagothu , Ronghua Xu , Seyed Yahya Nikouei, and Yu Chen . 2018 . A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. CoRR abs\/1807.07487 (2018), 4 pages. http:\/\/arxiv.org\/abs\/1807.07487 Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, and Yu Chen. 2018. A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. CoRR abs\/1807.07487 (2018), 4 pages. http:\/\/arxiv.org\/abs\/1807.07487"},{"key":"e_1_3_2_1_13_1","volume-title":"Bitcoin: A Peer-to-peer Electronic Cash System, \u00e2\u0102\u0130 http:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-peer Electronic Cash System, \u00e2\u0102\u0130 http:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-peer Electronic Cash System, \u00e2\u0102\u0130 http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_14_1","unstructured":"NEO. Accessed: 2018. http:\/\/neo.org.  NEO. Accessed: 2018. http:\/\/neo.org."},{"volume-title":"Building Microservices","author":"Newman Sam","key":"e_1_3_2_1_15_1","unstructured":"Sam Newman . 2015. Building Microservices . O'Reilly Media , CA , USA. Sam Newman. 2015. Building Microservices. O'Reilly Media, CA, USA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"e_1_3_2_1_17_1","unstructured":"Oraclize. Accessed: 2018. https:\/\/docs.oraclize.it.  Oraclize. Accessed: 2018. https:\/\/docs.oraclize.it."},{"key":"e_1_3_2_1_18_1","volume-title":"Ismail AlQerm, Yuanni Liu, and Ying Zhao.","author":"Pan J.","year":"2018","unstructured":"J. Pan , Jianyu Wang , Austin Hester , Ismail AlQerm, Yuanni Liu, and Ying Zhao. 2018 . EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts. CoRR abs\/1806.06185 (2018), 14 pages. J. Pan, Jianyu Wang, Austin Hester, Ismail AlQerm, Yuanni Liu, and Ying Zhao. 2018. EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts. CoRR abs\/1806.06185 (2018), 14 pages."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_21_1","unstructured":"Solidity Programming Language. Accessed: 2018. http:\/\/solidity.readthedocs.io.  Solidity Programming Language. Accessed: 2018. http:\/\/solidity.readthedocs.io."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7868163"},{"key":"e_1_3_2_1_23_1","unstructured":"Nick Szabo. 1994 (Accessed: 2018). http:\/\/szabo.best.vwh.net\/smart.contracts. html.  Nick Szabo. 1994 (Accessed: 2018). http:\/\/szabo.best.vwh.net\/smart.contracts. html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.116"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_1_26_1","volume-title":"Smart Contract-Based Access Control for the Internet of Things. CoRR abs\/1802.04410","author":"Zhang Yuanyu","year":"2018","unstructured":"Yuanyu Zhang , Shoji Kasahara , Yulong Shen , Xiaohong Jiang , and Jianxiong Wan . 2018. Smart Contract-Based Access Control for the Internet of Things. CoRR abs\/1802.04410 ( 2018 ), 1--11. http:\/\/arxiv.org\/abs\/1802.04410 Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, and Jianxiong Wan. 2018. Smart Contract-Based Access Control for the Internet of Things. CoRR abs\/1802.04410 (2018), 1--11. http:\/\/arxiv.org\/abs\/1802.04410"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600363CM"}],"event":{"name":"ICBTA 2018: 2018 International Conference on Blockchain Technology and Application","sponsor":["Xi'an Jiaotong-Liverpool University Xi'an Jiaotong-Liverpool University"],"location":"Xi'an China","acronym":"ICBTA 2018"},"container-title":["Proceedings of the 2018 International Conference on Blockchain Technology and Application"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301403.3301405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301403.3301405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:05Z","timestamp":1750208525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301403.3301405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":26,"alternative-id":["10.1145\/3301403.3301405","10.1145\/3301403"],"URL":"https:\/\/doi.org\/10.1145\/3301403.3301405","relation":{},"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"2018-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}