{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:37Z","timestamp":1750220257746,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506537","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"139-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-based Certificateless Identity Management Mechanism in Cloud-native Environments"],"prefix":"10.1145","author":[{"given":"Xuetao","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jingjian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiaotong","family":"Niu","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jianfeng","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Computer Science (National Pilot Software Engineering School), Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CNCF \"CNCF Cloud Native Definition v1.0\" Mar 2021 [Online; accessed 21. Oct. 2021]. [Online]. Available: https:\/\/github.com\/cncf\/toc\/blob\/main\/DEFINITION.md  CNCF \"CNCF Cloud Native Definition v1.0\" Mar 2021 [Online; accessed 21. Oct. 2021]. [Online]. Available: https:\/\/github.com\/cncf\/toc\/blob\/main\/DEFINITION.md"},{"key":"e_1_3_2_1_2_1","volume-title":"Mastering Service Mesh: Enhance, secure, and observe cloud-native applications with Istio, Linkerd, and Consul[M]","author":"Khatri A","year":"2020","unstructured":"Khatri A , Khatri V. Mastering Service Mesh: Enhance, secure, and observe cloud-native applications with Istio, Linkerd, and Consul[M] . Packt Publishing Ltd , 2020 . Khatri A, Khatri V. Mastering Service Mesh: Enhance, secure, and observe cloud-native applications with Istio, Linkerd, and Consul[M]. Packt Publishing Ltd, 2020."},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Securing a Cloud-Native C2 Architecture Using SSO and JWT[C]\/\/2021 IEEE Aerospace Conference (50100)","volume":"2021","author":"Melton R","unstructured":"Melton R . Securing a Cloud-Native C2 Architecture Using SSO and JWT[C]\/\/2021 IEEE Aerospace Conference (50100) . IEEE , 2021 : 1 -- 8 . Melton R. Securing a Cloud-Native C2 Architecture Using SSO and JWT[C]\/\/2021 IEEE Aerospace Conference (50100). IEEE, 2021: 1--8.","journal-title":"IEEE"},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"69","article-title":"Security issues and future challenges of cloud service authentication[J]","volume":"14","author":"Lim S Y","year":"2017","unstructured":"Lim S Y , Kiah M L M , Ang T F . Security issues and future challenges of cloud service authentication[J] . Acta Polytechnica Hungarica , 2017 , 14 ( 2 ): 69 -- 89 . Lim S Y, Kiah M L M, Ang T F. Security issues and future challenges of cloud service authentication[J]. Acta Polytechnica Hungarica, 2017, 14(2): 69--89.","journal-title":"Acta Polytechnica Hungarica"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102209"},{"key":"e_1_3_2_1_6_1","unstructured":"KURT BAUMGARTNER. Jan 2013 [Online; accessed 22 Oct. 2021]. [Online]. Available: https:\/\/securelist.com\/turktrust-ca-problems-21\/34893\/  KURT BAUMGARTNER. Jan 2013 [Online; accessed 22 Oct. 2021]. [Online]. Available: https:\/\/securelist.com\/turktrust-ca-problems-21\/34893\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Microsoft. Mar 2015 [Online; accessed 22 Oct. 2021]. [Online]. Available: https:\/\/docs.microsoft.com\/zh-cn\/security-updates\/securityadvisories\/2015\/3050995  Microsoft. Mar 2015 [Online; accessed 22 Oct. 2021]. [Online]. Available: https:\/\/docs.microsoft.com\/zh-cn\/security-updates\/securityadvisories\/2015\/3050995"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Khieu B Moh M. CBPKI: cloud blockchain-based public key infrastructure[C]\/\/Proceedings of the 2019 ACM Southeast Conference. 2019: 58--63.  Khieu B Moh M. CBPKI: cloud blockchain-based public key infrastructure[C]\/\/Proceedings of the 2019 ACM Southeast Conference. 2019: 58--63.","DOI":"10.1145\/3299815.3314433"},{"volume-title":"A decentralized dynamic PKI based on blockchain[C]\/\/Proceedings of the 36th Annual ACM Symposium on Applied Computing. 2021: 1646--1655","author":"Toorani M","key":"e_1_3_2_1_9_1","unstructured":"Toorani M , Gehrmann C. A decentralized dynamic PKI based on blockchain[C]\/\/Proceedings of the 36th Annual ACM Symposium on Applied Computing. 2021: 1646--1655 . Toorani M, Gehrmann C. A decentralized dynamic PKI based on blockchain[C]\/\/Proceedings of the 36th Annual ACM Symposium on Applied Computing. 2021: 1646--1655."},{"key":"e_1_3_2_1_10_1","volume-title":"Securing Cloud Native Applications Using Blockchain[C]\/\/2021 12th International Conference on Information and Communication Systems (ICICS)","author":"Mendki P.","year":"2021","unstructured":"Mendki P. Securing Cloud Native Applications Using Blockchain[C]\/\/2021 12th International Conference on Information and Communication Systems (ICICS) . IEEE , 2021 : 419--423. Mendki P. Securing Cloud Native Applications Using Blockchain[C]\/\/2021 12th International Conference on Information and Communication Systems (ICICS). IEEE, 2021: 419--423."},{"key":"e_1_3_2_1_11_1","volume-title":"Certificateless public key cryptography[C]\/\/International conference on the theory and application of cryptology and information security","author":"Al-Riyami S S","year":"2003","unstructured":"Al-Riyami S S , Paterson K G . Certificateless public key cryptography[C]\/\/International conference on the theory and application of cryptology and information security . Springer , Berlin, Heidelberg , 2003 : 452--473. Al-Riyami S S, Paterson K G. Certificateless public key cryptography[C]\/\/International conference on the theory and application of cryptology and information security. Springer, Berlin, Heidelberg, 2003: 452--473."},{"key":"e_1_3_2_1_12_1","volume-title":"Computer Communications","author":"Hussain S","year":"2021","unstructured":"Hussain S , Ullah S S , Ali I , Certificateless signature schemes in Industrial Internet of Things: A comparative survey[J] . Computer Communications , 2021 . Hussain S, Ullah S S, Ali I, et al. Certificateless signature schemes in Industrial Internet of Things: A comparative survey[J]. Computer Communications, 2021."},{"issue":"4","key":"e_1_3_2_1_13_1","first-page":"645","volume":"22","author":"Zhou F","year":"2020","unstructured":"Zhou F , Li Y , Lin C.A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security [J] . International Journal of Network Security , 2020 , 22 ( 4 ): 645 -- 654 . Zhou F, Li Y, Lin C.A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security [J]. International Journal of Network Security, 2020, 22(4): 645--654.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_14_1","volume-title":"Revocable Certificateless Encryption with Ciphertext Evolution[C]\/\/Australasian Conference on Information Security and Privacy","author":"Sun Y","year":"2018","unstructured":"Sun Y , Zhang F , Fu A. Revocable Certificateless Encryption with Ciphertext Evolution[C]\/\/Australasian Conference on Information Security and Privacy . Springer , Cham , 2018 : 741--749. Sun Y, Zhang F, Fu A. Revocable Certificateless Encryption with Ciphertext Evolution[C]\/\/Australasian Conference on Information Security and Privacy. Springer, Cham, 2018: 741--749."},{"issue":"4","key":"e_1_3_2_1_15_1","first-page":"645","volume":"22","author":"Zhou F","year":"2020","unstructured":"Zhou F , Li Y , Lin C.A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security [J] . International Journal of Network Security , 2020 , 22 ( 4 ): 645 -- 654 . Zhou F, Li Y, Lin C.A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security [J]. International Journal of Network Security, 2020, 22(4): 645--654.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_16_1","volume-title":"Certificateless Authenticated Key Agreement for Decentralized WBANs[C]\/\/International Conference on Frontiers in Cyber Security","author":"Gervais M","year":"2019","unstructured":"Gervais M , Sun L , Wang K , Certificateless Authenticated Key Agreement for Decentralized WBANs[C]\/\/International Conference on Frontiers in Cyber Security . Springer , Singapore , 2019 : 268--290. Gervais M, Sun L, Wang K, et al. Certificateless Authenticated Key Agreement for Decentralized WBANs[C]\/\/International Conference on Frontiers in Cyber Security. Springer, Singapore, 2019: 268--290."},{"key":"e_1_3_2_1_17_1","volume-title":"Security-Mediated Certificateless Undeniable Signature Scheme[C]\/\/Third International Congress on Information and Communication Technology","author":"Yuen T H","year":"2019","unstructured":"Yuen T H , Heng S H . Security-Mediated Certificateless Undeniable Signature Scheme[C]\/\/Third International Congress on Information and Communication Technology . Springer , Singapore , 2019 : 25--32. Yuen T H, Heng S H. Security-Mediated Certificateless Undeniable Signature Scheme[C]\/\/Third International Congress on Information and Communication Technology. Springer, Singapore, 2019: 25--32."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020841"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2021.3056540"},{"key":"e_1_3_2_1_20_1","article-title":"Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices [J]","author":"Wang W","year":"2021","unstructured":"Wang W , Xu H , Alazab M , Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices [J] . IEEE Transactions on Industrial Informatics , 2021 . Wang W, Xu H, Alazab M, et al. Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices [J]. IEEE Transactions on Industrial Informatics, 2021.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106721"},{"key":"e_1_3_2_1_22_1","unstructured":"PrimeKey Solutions AB \"EJBCA\" Mar 2021 [Online; accessed 15 Oct. 2021]. [Online]. Available: https:\/\/www.ejbca.org\/  PrimeKey Solutions AB \"EJBCA\" Mar 2021 [Online; accessed 15 Oct. 2021]. [Online]. Available: https:\/\/www.ejbca.org\/"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:48Z","timestamp":1750188648000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":22,"alternative-id":["10.1145\/3491396.3506537","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506537","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}