{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:52:24Z","timestamp":1758271944694,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,10]],"date-time":"2019-11-10T00:00:00Z","timestamp":1573344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,10]]},"DOI":"10.1145\/3362744.3363346","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T12:20:52Z","timestamp":1572524452000},"page":"8-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["EngraveChain"],"prefix":"10.1145","author":[{"given":"Louis","family":"Shekhtman","sequence":"first","affiliation":[{"name":"Nokia Bell Labs, Kfar Saba, Israel"}]},{"given":"Erez","family":"Waisbard","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Kfar Saba, Israel"}]}],"member":"320","published-online":{"date-parts":[[2019,11,10]]},"reference":[{"volume-title":"Achieving Service Accountability Through Blockchain and Digital Identity. In International Conference on Advanced Information Systems Engineering. Springer, 16--23","author":"Angiulli F.","key":"e_1_3_2_1_1_1","unstructured":"F. Angiulli , F. Fassetti , A. Furfaro , A. Piccolo , and D. Sacc\u00e0 . 2018 . Achieving Service Accountability Through Blockchain and Digital Identity. In International Conference on Advanced Information Systems Engineering. Springer, 16--23 . F. Angiulli, F. Fassetti, A. Furfaro, A. Piccolo, and D. Sacc\u00e0. 2018. Achieving Service Accountability Through Blockchain and Digital Identity. In International Conference on Advanced Information Systems Engineering. Springer, 16--23."},{"volume-title":"European Dependable Computing Conference (EDCC). IEEE, 151--154","author":"Aniello L.","key":"e_1_3_2_1_2_1","unstructured":"L. Aniello , R. Baldoni , E. Gaetani , F. Lombardi , A. Margheri , and V. Sassone . 2017. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database . In European Dependable Computing Conference (EDCC). IEEE, 151--154 . L. Aniello, R. Baldoni, E. Gaetani, F. Lombardi, A. Margheri, and V. Sassone. 2017. A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. In European Dependable Computing Conference (EDCC). IEEE, 151--154."},{"volume-title":"Annual International Cryptology Conference. Springer, 26--45","author":"Bellare M.","key":"e_1_3_2_1_3_1","unstructured":"M. Bellare , A. Desai , D. Pointcheval , and P. Rogaway . 1998. Relations among notions of security for public-key encryption schemes . In Annual International Cryptology Conference. Springer, 26--45 . M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. 1998. Relations among notions of security for public-key encryption schemes. In Annual International Cryptology Conference. Springer, 26--45."},{"key":"e_1_3_2_1_4_1","volume-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers.","author":"Cachin C.","year":"2016","unstructured":"C. Cachin . 2016 . Architecture of the Hyperledger blockchain fabric . In Workshop on Distributed Cryptocurrencies and Consensus Ledgers. C. Cachin. 2016. Architecture of the Hyperledger blockchain fabric. In Workshop on Distributed Cryptocurrencies and Consensus Ledgers."},{"key":"e_1_3_2_1_5_1","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro M.","year":"1999","unstructured":"M. Castro , B. Liskov , and 1999 . Practical Byzantine fault tolerance . In OSDI , Vol. 99. 173 -- 186 . M. Castro, B. Liskov, and et al. 1999. Practical Byzantine fault tolerance. In OSDI, Vol. 99. 173--186.","journal-title":"OSDI"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"J. Cucurull and J. Puiggali. 2016. Distributed immutabilization of secure logs. In Security and Trust Management. Springer 122--137.  J. Cucurull and J. Puiggali. 2016. Distributed immutabilization of secure logs. In Security and Trust Management. Springer 122--137.","DOI":"10.1007\/978-3-319-46598-2_9"},{"volume-title":"The design of Rijndael: AES-the advanced encryption standard","author":"Rijmen J. Daemenand V.","key":"e_1_3_2_1_7_1","unstructured":"J. Daemenand V. Rijmen . 2013. The design of Rijndael: AES-the advanced encryption standard . Springer Science & Business Media . J. Daemenand V. Rijmen. 2013. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media."},{"volume-title":"Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, 93--98","author":"D'Angelo G.","key":"e_1_3_2_1_8_1","unstructured":"G. D'Angelo , S. Ferretti , and M. Marzolla . 2018. A Blockchain-based Flight Data Recorder for Cloud Accountability . In Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, 93--98 . G. D'Angelo, S. Ferretti, and M. Marzolla. 2018. A Blockchain-based Flight Data Recorder for Cloud Accountability. In Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, 93--98."},{"key":"e_1_3_2_1_9_1","unstructured":"General Data Protection Regulation. 2018. https:\/\/www.gdpr-info.eu\/.  General Data Protection Regulation. 2018. https:\/\/www.gdpr-info.eu\/."},{"volume-title":"Histogram Matrix: Log File Visualization for Anomaly Detection. In 2008 Third International Conference on Availability, Reliability and Security. 610--617","author":"Frei A.","key":"e_1_3_2_1_10_1","unstructured":"A. Frei and M. Rennhard . 2008 . Histogram Matrix: Log File Visualization for Anomaly Detection. In 2008 Third International Conference on Availability, Reliability and Security. 610--617 . A. Frei and M. Rennhard. 2008. Histogram Matrix: Log File Visualization for Anomaly Detection. In 2008 Third International Conference on Availability, Reliability and Security. 610--617."},{"key":"e_1_3_2_1_11_1","unstructured":"B. Gipp J. Kosti and C. Breitinger. 2016. Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain.. In MCIS. 51.  B. Gipp J. Kosti and C. Breitinger. 2016. Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain.. In MCIS. 51."},{"key":"e_1_3_2_1_12_1","volume-title":"Experience Report: Log-Based Behavioral Differencing. In 2017 IEEE 28th International Symposium on Software Reliability Engineering(ISSRE). 282--293","author":"Goldstein M.","year":"2017","unstructured":"M. Goldstein , D. Raz , and I. Segall . 2017 . Experience Report: Log-Based Behavioral Differencing. In 2017 IEEE 28th International Symposium on Software Reliability Engineering(ISSRE). 282--293 . M. Goldstein, D. Raz, andI. Segall. 2017. Experience Report: Log-Based Behavioral Differencing. In 2017 IEEE 28th International Symposium on Software Reliability Engineering(ISSRE). 282--293."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2006 Australasian Workshops on Grid computing and e-research. 203--211","author":"Holt J.E.","year":"2006","unstructured":"J.E. Holt . 2006 . Logcrypt: forward security and public verification for secure audit logs . In Proceedings of the 2006 Australasian Workshops on Grid computing and e-research. 203--211 . J.E. Holt. 2006. Logcrypt: forward security and public verification for secure audit logs. In Proceedings of the 2006 Australasian Workshops on Grid computing and e-research. 203--211."},{"key":"e_1_3_2_1_14_1","unstructured":"Hyperledger 2018. https:\/\/hyperledger-fabric-ca.readthedocs.io\/.  Hyperledger 2018. https:\/\/hyperledger-fabric-ca.readthedocs.io\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Health Insurance Portability and Accountability Act. 2017. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html.  Health Insurance Portability and Accountability Act. 2017. https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html."},{"key":"e_1_3_2_1_16_1","volume-title":"CALYPSO: Auditable Sharing of Private Data over Blockchains.","author":"Kokoris-Kogias E.","year":"2018","unstructured":"E. Kokoris-Kogias , E.C. Alp , S.D. Siby , N. Gailly , L. Gasser , P. Jovanovic , E. Syta , and B. Ford . 2018 . CALYPSO: Auditable Sharing of Private Data over Blockchains. E. Kokoris-Kogias, E.C. Alp, S.D. Siby, N. Gailly, L. Gasser, P. Jovanovic, E. Syta, and B. Ford. 2018. CALYPSO: Auditable Sharing of Private Data over Blockchains."},{"volume-title":"International Conference on Dependable Systems and Networks, (DSN). IEEE, 425","author":"Liang Y.","key":"e_1_3_2_1_17_1","unstructured":"Y. Liang , Y. Zhang , A. Sivasubramaniam , M. Jette , and R. Sahoo . 2006. Bluegene\/l failure analysis and prediction models . In International Conference on Dependable Systems and Networks, (DSN). IEEE, 425 . Y. Liang, Y. Zhang, A. Sivasubramaniam, M.Jette, and R. Sahoo. 2006. Bluegene\/l failure analysis and prediction models. In International Conference on Dependable Systems and Networks, (DSN). IEEE, 425."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"S. M\u00f6ller C. Perlov W. Jackson C. Taussig and S.R. Forrest. 2003. A polymer\/semiconductor write-once read-many-times memory. Nature 426 6963 (2003) 166.  S. M\u00f6ller C. Perlov W. Jackson C. Taussig and S.R. Forrest. 2003. A polymer\/semiconductor write-once read-many-times memory. Nature 426 6963 (2003) 166.","DOI":"10.1038\/nature02070"},{"key":"e_1_3_2_1_19_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"key":"e_1_3_2_1_20_1","volume-title":"BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. In International Conference on Security & Privacy. Springer, 77--88","author":"Rane Sagar","year":"2019","unstructured":"Sagar Rane and Arati Dixit . 2019 . BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. In International Conference on Security & Privacy. Springer, 77--88 . Sagar Rane and Arati Dixit. 2019. BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. In International Conference on Security & Privacy. Springer, 77--88."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Symposium","volume":"98","author":"Schneier B.","unstructured":"B. Schneier and J. Kelsey . 1998. Cryptographic Support for Secure Logs on Untrusted Machines .. In USENIX Symposium , Vol. 98 . 53--62. B. Schneier and J. Kelsey. 1998. Cryptographic Support for Secure Logs on Untrusted Machines.. In USENIX Symposium, Vol. 98. 53--62."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/317087.317089"},{"key":"e_1_3_2_1_24_1","unstructured":"PCI Security Standards Council. 2019. https:\/\/www.pcisecuritystandards.org\/.  PCI Security Standards Council. 2019. https:\/\/www.pcisecuritystandards.org\/."},{"key":"e_1_3_2_1_25_1","first-page":"366","article-title":"A Framework and Demo for Preventing Anti-Computer Forensics","volume":"12","author":"Simmons C","year":"2011","unstructured":"C Simmons , D Jones , and L Simmons . 2011 . A Framework and Demo for Preventing Anti-Computer Forensics . Issues in Information Systems 12 , 1 (2011), 366 -- 372 . C Simmons, D Jones, and L Simmons. 2011. A Framework and Demo for Preventing Anti-Computer Forensics. Issues in Information Systems 12, 1 (2011), 366--372.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Service Systems and Service Management (ICSSSM). IEEE, 1--6.","author":"Tian F.","year":"2016","unstructured":"F. Tian . 2016 . An agri-food supply chain traceability system for China based on RFID & blockchain technology . In International Conference on Service Systems and Service Management (ICSSSM). IEEE, 1--6. F. Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In International Conference on Service Systems and Service Management (ICSSSM). IEEE, 1--6."},{"volume-title":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 154--163","author":"Tsai W-T.","key":"e_1_3_2_1_27_1","unstructured":"W-T. Tsai , E. Deng , X. Ding , and J. Li . 2018. Application of Blockchain to Trade Clearing . In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 154--163 . W-T. Tsai, E. Deng, X. Ding, and J. Li. 2018. Application of Blockchain to Trade Clearing. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 154--163."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_1_29_1","unstructured":"Shawn Wilkinson Tome Boshevski Josh Brandoff and Vitalik Buterin. 2014. Storj a peer-to-peer cloud storage network. (2014).  Shawn Wilkinson Tome Boshevski Josh Brandoff and Vitalik Buterin. 2014. Storj a peer-to-peer cloud storage network. (2014)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484342"}],"event":{"name":"SenSys '19: The 17th ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"New York NY USA","acronym":"SenSys '19"},"container-title":["Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362744.3363346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3362744.3363346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:54Z","timestamp":1750203894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362744.3363346"}},"subtitle":["Tamper-proof distributed log system"],"short-title":[],"issued":{"date-parts":[[2019,11,10]]},"references-count":30,"alternative-id":["10.1145\/3362744.3363346","10.1145\/3362744"],"URL":"https:\/\/doi.org\/10.1145\/3362744.3363346","relation":{},"subject":[],"published":{"date-parts":[[2019,11,10]]},"assertion":[{"value":"2019-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}