{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:27:16Z","timestamp":1767108436961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T00:00:00Z","timestamp":1580774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,4]]},"DOI":"10.1145\/3373017.3373027","type":"proceedings-article","created":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T12:25:32Z","timestamp":1580387132000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["BACC: Blockchain-Based Access Control For Cloud Data"],"prefix":"10.1145","author":[{"given":"Nasrin","family":"Sohrabi","sequence":"first","affiliation":[{"name":"RMIT University, Australia"}]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"RMIT University, Australia"}]},{"given":"Zahir","family":"Tari","sequence":"additional","affiliation":[{"name":"RMIT University, Australia"}]},{"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"RMIT University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,2,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Solidity document. https:\/\/solidity.readthedocs.io\/en\/v0.5.3\/index.html  [n.d.]. Solidity document. https:\/\/solidity.readthedocs.io\/en\/v0.5.3\/index.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Sok: Consensus in the Age of Blockchains. arXiv preprint arXiv:1711.03936(2017). arxiv:1711.03936http:\/\/arxiv.org\/abs\/1711.03936","author":"Bano Shehar","year":"2017","unstructured":"Shehar Bano , Alberto Sonnino , Mustafa Al-Bassam , Sarah Azouvi , Patrick McCorry , Sarah Meiklejohn , and George Danezis . 2017 . Sok: Consensus in the Age of Blockchains. arXiv preprint arXiv:1711.03936(2017). arxiv:1711.03936http:\/\/arxiv.org\/abs\/1711.03936 Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, and George Danezis. 2017. Sok: Consensus in the Age of Blockchains. arXiv preprint arXiv:1711.03936(2017). arxiv:1711.03936http:\/\/arxiv.org\/abs\/1711.03936"},{"key":"e_1_3_2_1_3_1","unstructured":"Imran Bashir. 2018. Mastering Blockchain. Pakt Publishing.  Imran Bashir. 2018. Mastering Blockchain. Pakt Publishing."},{"key":"e_1_3_2_1_4_1","volume-title":"Blockchains and Smart Contracts for the Internet of Things","author":"Christidis Konstantinos","year":"2016","unstructured":"Konstantinos Christidis and Michael Devetsikiotis . 2016. Blockchains and Smart Contracts for the Internet of Things . IEEE Access ( 2016 ). https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339 10.1109\/ACCESS.2016.2566339 Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and Smart Contracts for the Internet of Things. IEEE Access (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2566339"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.188"},{"key":"e_1_3_2_1_6_1","volume-title":"Bitcoin-NG: A Scalable Blockchain Protocol Ittay. USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201916)","author":"Gencer Efe","year":"2016","unstructured":"Ittay; Eyal, Adem; Efe Gencer , Emin; Gun Sirer , and Robbert Van Renesse . 2016 . Bitcoin-NG: A Scalable Blockchain Protocol Ittay. USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201916) (2016). Ittay; Eyal, Adem; Efe Gencer, Emin; Gun Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol Ittay. USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201916) (2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"Goodrich and Roberto Tamassia","author":"T.","year":"2011","unstructured":"Michael\u00a0 T. Goodrich and Roberto Tamassia . 2011 . Introduction to computere security. pearson. Michael\u00a0T. Goodrich and Roberto Tamassia. 2011. Introduction to computere security. pearson."},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference, Inscrypt. Springer","author":"Guo Jail","year":"2018","unstructured":"Jail Guo , Wnzhuo Yang , Kwok-Yan Lam , and Xun Yi . 2018 . Using Blockchain to Control Access to Cloud Data . In International Conference, Inscrypt. Springer , Fuzho, China, 274\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-14234-6 10.1007\/978-3-030-14234-6 Jail Guo, Wnzhuo Yang, Kwok-Yan Lam, and Xun Yi. 2018. Using Blockchain to Control Access to Cloud Data. In International Conference, Inscrypt. Springer, Fuzho, China, 274\u2013288. https:\/\/doi.org\/10.1007\/978-3-030-14234-6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"e_1_3_2_1_11_1","unstructured":"Andreas M.Antonopoulos. 2017. Mastering Bitcoin. O\u2019Reilly.  Andreas M.Antonopoulos. 2017. Mastering Bitcoin. O\u2019Reilly."},{"key":"e_1_3_2_1_12_1","unstructured":"Wood\u00a0Gavin M.Antonopoulos Andreas. 2018. Mastering Ethereum. O\u2019Reilly. https:\/\/github.com\/ethereumbook\/ethereumbook  Wood\u00a0Gavin M.Antonopoulos Andreas. 2018. Mastering Ethereum. O\u2019Reilly. https:\/\/github.com\/ethereumbook\/ethereumbook"},{"volume-title":"Solidity Programming Essentials","author":"Modi Ritesh","key":"e_1_3_2_1_13_1","unstructured":"Ritesh Modi . 2018. Solidity Programming Essentials . Packt Publishing . Ritesh Modi. 2018. Solidity Programming Essentials. Packt Publishing."},{"key":"e_1_3_2_1_14_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Self-Published Paper(2008).","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. Self-Published Paper(2008). Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Self-Published Paper(2008)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Aafaf Ouaddah Anas\u00a0Abou Elkalam and Abdellah\u00a0Ait Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. (2017) 523\u2013533.  Aafaf Ouaddah Anas\u00a0Abou Elkalam and Abdellah\u00a0Ait Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. (2017) 523\u2013533.","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"e_1_3_2_1_17_1","unstructured":"Ethereum-IDE Remix. [n.d.]. Remix documentation. https:\/\/remix.readthedocs.io\/en\/latest\/index.html  Ethereum-IDE Remix. [n.d.]. Remix documentation. https:\/\/remix.readthedocs.io\/en\/latest\/index.html"},{"key":"e_1_3_2_1_18_1","volume-title":"RolemBased Access Control Models m. 29, 2","author":"Sandhu S","year":"1996","unstructured":"Ravi\u00a0 S Sandhu , Hal\u00a0 L Feinstein , Charles\u00a0 E Youman , and Edward\u00a0 J Coyne . 1996. RolemBased Access Control Models m. 29, 2 ( 1996 ), 38\u201347. Ravi\u00a0S Sandhu, Hal\u00a0L Feinstein, Charles\u00a0E Youman, and Edward\u00a0J Coyne. 1996. RolemBased Access Control Models m. 29, 2 (1996), 38\u201347."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ravi\u00a0S Sandhu and Pierangela Samarati. 1994. Access control constrains what a user can do directly as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to breach of security.IEEE Communications MagazineSeptember (1994) 40\u201348.  Ravi\u00a0S Sandhu and Pierangela Samarati. 1994. Access control constrains what a user can do directly as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to breach of security.IEEE Communications MagazineSeptember (1994) 40\u201348.","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Adi Shamir. 1979. How to share a secret. ACM 22 (11)(1979) 159\u2013168.  Adi Shamir. 1979. How to share a secret. ACM 22 (11)(1979) 159\u2013168.","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27189-2_2"},{"key":"e_1_3_2_1_23_1","unstructured":"Melanie Swan. 2015. Blockchain Blueprint for a new economy. O\u2019Reilly.  Melanie Swan. 2015. Blockchain Blueprint for a new economy. O\u2019Reilly."},{"key":"e_1_3_2_1_24_1","volume-title":"An access control model for cloud computing. Journal of Information Security and Applications 19","author":"Younis A.","year":"2014","unstructured":"Younis\u00a0 A. Younis , Kashif Kifayat , and Madjid Merabti . 2014. An access control model for cloud computing. Journal of Information Security and Applications 19 ( 2014 ). https:\/\/doi.org\/10.1016\/j.jisa.2014.04.003 10.1016\/j.jisa.2014.04.003 Younis\u00a0A. Younis, Kashif Kifayat, and Madjid Merabti. 2014. An access control model for cloud computing. Journal of Information Security and Applications 19 (2014). https:\/\/doi.org\/10.1016\/j.jisa.2014.04.003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Eric Yuan and Jin Tong. 2005. Attributed based access control (ABAC) for web services. (2005).  Eric Yuan and Jin Tong. 2005. Attributed based access control (ABAC) for web services. (2005).","DOI":"10.1109\/ICWS.2005.25"},{"key":"e_1_3_2_1_26_1","volume-title":"Smart Contract-Based Access Control for the Internet of Things","author":"Zhang Yuanyu","year":"2018","unstructured":"Yuanyu Zhang , Shoji Kasahara , Yulong Shen , Xiaohong Jiang , and Jianxiong Wan . 2018. Smart Contract-Based Access Control for the Internet of Things . IEEE Internet of Things Journal( 2018 ). https:\/\/doi.org\/10.1109\/JIOT.2018.2847705 10.1109\/JIOT.2018.2847705 Yuanyu Zhang, Shoji Kasahara, Yulong Shen, Xiaohong Jiang, and Jianxiong Wan. 2018. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet of Things Journal(2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2847705"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"#cr-split#-e_1_3_2_1_28_1.1","doi-asserted-by":"crossref","unstructured":"Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems(2012). https:\/\/doi.org\/10.1016\/j.future.2010.12.006 10.1016\/j.future.2010.12.006","DOI":"10.1016\/j.future.2010.12.006"},{"key":"#cr-split#-e_1_3_2_1_28_1.2","doi-asserted-by":"crossref","unstructured":"Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems(2012). https:\/\/doi.org\/10.1016\/j.future.2010.12.006","DOI":"10.1016\/j.future.2010.12.006"}],"event":{"name":"ACSW '20: Australasian Computer Science Week 2020","acronym":"ACSW '20","location":"Melbourne VIC Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373017.3373027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373017.3373027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:25Z","timestamp":1750200085000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373017.3373027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,4]]},"references-count":28,"alternative-id":["10.1145\/3373017.3373027","10.1145\/3373017"],"URL":"https:\/\/doi.org\/10.1145\/3373017.3373027","relation":{},"subject":[],"published":{"date-parts":[[2020,2,4]]},"assertion":[{"value":"2020-02-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}