{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:25:30Z","timestamp":1758273930007,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T00:00:00Z","timestamp":1589328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,13]]},"DOI":"10.1145\/3399871.3399902","type":"proceedings-article","created":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T01:42:18Z","timestamp":1593826938000},"page":"100-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["BC-SSES"],"prefix":"10.1145","author":[{"given":"Hao","family":"Zhang","sequence":"first","affiliation":[{"name":"National Engineering Research Center for E-Learning, National Engineering Laboratory for Educational Big Data, Central China Normal University, Wuhan, China"}]},{"given":"Yu","family":"Xia","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for E-Learning, National Engineering Laboratory for Educational Big Data, Central China Normal University, Wuhan, China"}]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for E-Learning, National Engineering Laboratory for Educational Big Data, Central China Normal University, Wuhan, China"}]},{"given":"Jia","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for E-Learning, National Engineering Laboratory for Educational Big Data, Central China Normal University, Wuhan, China"}]},{"given":"HaiJin","family":"Wang","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for E-Learning, National Engineering Laboratory for Educational Big Data, Central China Normal University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4842-3081-7","volume-title":"The hyperledger project[M]\/\/Blockchain enabled applications","author":"Dhillon","year":"2017","unstructured":"Dhillon V, Metcalf D, Hooper M. The hyperledger project[M]\/\/Blockchain enabled applications . Apress , Berkeley, CA , 2017 : 139--149. Dhillon V, Metcalf D, Hooper M. The hyperledger project[M]\/\/Blockchain enabled applications. Apress, Berkeley, CA, 2017: 139--149."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/s12243-018-00699-y"},{"key":"e_1_3_2_1_3_1","volume-title":"NDSS","author":"Derler D.","year":"2019","unstructured":"D. Derler , K. Samelin , D. Slamanig , and C. Striecks . Finegrained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based . In NDSS , 2019 . D. Derler, K. Samelin, D. Slamanig, and C. Striecks. Finegrained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based. In NDSS, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/ACCESS.2019.2905846"},{"key":"e_1_3_2_1_5_1","first-page":"180","volume-title":"Decentralizing privacy: Using blockchain to protect personal data,\" in Proc. of 2015 IEEE Security and Privacy Workshops","author":"Zyskind G.","year":"2015","unstructured":"G. Zyskind , O. Nathan , and A. Pentland , \" Decentralizing privacy: Using blockchain to protect personal data,\" in Proc. of 2015 IEEE Security and Privacy Workshops , 2015 , pp. 180 -- 184 . G. Zyskind, O. Nathan, and A. Pentland, \"Decentralizing privacy: Using blockchain to protect personal data,\" in Proc. of 2015 IEEE Security and Privacy Workshops, 2015, pp. 180--184."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ACCESS.2018.2851611"},{"key":"e_1_3_2_1_7_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger[J]. Ethereum project yellow paper","author":"Wood","year":"2014","unstructured":"Wood G. Ethereum: A secure decentralised generalised transaction ledger[J]. Ethereum project yellow paper , 2014 , 151(2014): 1--32. Wood G. Ethereum: A secure decentralised generalised transaction ledger[J]. Ethereum project yellow paper, 2014, 151(2014): 1--32."},{"key":"e_1_3_2_1_8_1","volume-title":"Versioned, P2P File System","author":"Benet Juan","year":"2014","unstructured":"Juan Benet : IPFS - Content Addressed , Versioned, P2P File System , 2014 , Computer Science Juan Benet: IPFS - Content Addressed, Versioned, P2P File System, 2014, Computer Science"},{"key":"e_1_3_2_1_9_1","volume-title":"Physical access control management system based on permissioned blockchain[C]\/\/2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications","author":"Rouhani","year":"2018","unstructured":"Rouhani S, Pourheidari V, Deters R. Physical access control management system based on permissioned blockchain[C]\/\/2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE , 2018 : 1078--1083. Rouhani S, Pourheidari V, Deters R. Physical access control management system based on permissioned blockchain[C]\/\/2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018: 1078--1083."},{"key":"e_1_3_2_1_10_1","volume-title":"Available online: https:\/\/www.hyperledger.org\/projects\/composer (accessed on","author":"Composer Hyperledger","year":"2019","unstructured":"Hyperledger Composer . Available online: https:\/\/www.hyperledger.org\/projects\/composer (accessed on 10 February 2019 ). Hyperledger Composer. Available online: https:\/\/www.hyperledger.org\/projects\/composer (accessed on 10 February 2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1002\/sec.1748"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/JIOT.2018.2847705"}],"event":{"sponsor":["Nanyang Technological University"],"acronym":"ASSE '20","name":"ASSE '20: 2020 Asia Service Sciences and Software Engineering Conference","location":"Nagoya Japan"},"container-title":["Proceedings of the 2020 Asia Service Sciences and Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399871.3399902","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399871.3399902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:49Z","timestamp":1750195909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399871.3399902"}},"subtitle":["Secure Storage Extension and Sharing Method for Blockchain"],"short-title":[],"issued":{"date-parts":[[2020,5,13]]},"references-count":12,"alternative-id":["10.1145\/3399871.3399902","10.1145\/3399871"],"URL":"https:\/\/doi.org\/10.1145\/3399871.3399902","relation":{},"subject":[],"published":{"date-parts":[[2020,5,13]]},"assertion":[{"value":"2020-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}