{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:17:58Z","timestamp":1766578678626,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"DOI":"10.1145\/3445970.3451157","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:53:22Z","timestamp":1618041202000},"page":"37-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["SDGchain: When Service Dependency Graph Meets Blockchain to Enhance Privacy"],"prefix":"10.1145","author":[{"given":"Rofaida","family":"Khemaissia","sequence":"first","affiliation":[{"name":"Larbi Tebessi University, Tebessa, Algeria"}]},{"given":"Makhlouf","family":"Derdour","sequence":"additional","affiliation":[{"name":"Larbi Ben M'Hidi University, Oum El Bouaghi, Algeria"}]},{"given":"Ala","family":"Djeddai","sequence":"additional","affiliation":[{"name":"Larbi Tebessi University, Tebessa, Algeria"}]},{"given":"Mohamed Amine","family":"Ferrag","sequence":"additional","affiliation":[{"name":"8 Mai 1945 University, Guelma, Algeria"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948287"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2980298"},{"first-page":"468","volume-title":"IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing","author":"Liang S.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"S. Nakamoto Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin.  S. Nakamoto Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2017.8170858"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"volume-title":"IEEE In 2018 21st Euromicro conference on digital system design (DSD) (pp. 699--706)","author":"Mikula T.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Liang X. Zhao J. Shetty S. Liu J. and Li D 2017. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. IEEE 28th annual international symposium on personal indoor and mobile radio communications (PIMRC) (pp. 1--5).  Liang X. Zhao J. Shetty S. Liu J. and Li D 2017. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. IEEE 28th annual international symposium on personal indoor and mobile radio communications (PIMRC) (pp. 1--5).","DOI":"10.1109\/PIMRC.2017.8292361"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72395-2_49"},{"issue":"2","key":"e_1_3_2_1_11_1","first-page":"83","article-title":". A Privacy-Preserving Approach for Composite Web Service Selection","volume":"10","author":"Belabed A.","year":"2017","journal-title":"TRANSACTIONS ON DATA PRIVACY"},{"volume-title":"Lambrinoudakis C., Gabillon A. (eds) Risks and Security of Internet and Systems. CRiSIS","year":"2015","author":"Doynikova E.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"European Union \"General data protection regulation (GDPR) \" Official Journal of the European Union vol. L119 pp. 1--88 2016.  European Union \"General data protection regulation (GDPR) \" Official Journal of the European Union vol. L119 pp. 1--88 2016."},{"key":"e_1_3_2_1_14_1","unstructured":"European Union \"General data protection regulation (GDPR) \" Official Journal of the European Union vol. L119 pp. 1--88 2016.  European Union \"General data protection regulation (GDPR) \" Official Journal of the European Union vol. L119 pp. 1--88 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11610113_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2904303"},{"volume-title":"IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (pp. 1--7).","author":"Hirtan L.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920922"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Shameli-Sendi Alireza Dagenais Michel and Wang Lingyu 2017. Realtime Intrusion Risk Assessment Model based on Attack and Service Dependency Graphs. Computer Communications. 116. 10.1016\/j.comcom.2017.12.003.  Shameli-Sendi Alireza Dagenais Michel and Wang Lingyu 2017. Realtime Intrusion Risk Assessment Model based on Attack and Service Dependency Graphs. Computer Communications. 116. 10.1016\/j.comcom.2017.12.003.","DOI":"10.1016\/j.comcom.2017.12.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9484-8"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451157","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445970.3451157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:25Z","timestamp":1750197805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":20,"alternative-id":["10.1145\/3445970.3451157","10.1145\/3445970"],"URL":"https:\/\/doi.org\/10.1145\/3445970.3451157","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}