{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:44:25Z","timestamp":1774161865041,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,10]]},"DOI":"10.1145\/3514221.3526046","type":"proceedings-article","created":{"date-parts":[[2022,6,12]],"date-time":"2022-06-12T02:33:49Z","timestamp":1655001229000},"page":"2218-2231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["LedgerView: Access-Control Views on Hyperledger Fabric"],"prefix":"10.1145","author":[{"given":"Pingcheng","family":"Ruan","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Yaron","family":"Kanza","sequence":"additional","affiliation":[{"name":"AT&amp;T Chief Data Office, Bedminster, NJ, USA"}]},{"given":"Beng Chin","family":"Ooi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Divesh","family":"Srivastava","sequence":"additional","affiliation":[{"name":"AT&amp;T Chief Data Office, Bedminster, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,11]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Ledgerview. https:\/\/github.com\/sbip-sg\/BlockchainView."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/344816.344853"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/551350"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.153"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342275"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2019.8666541"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_2_8_1","volume-title":"IoT and blockchain convergence: benefits and challenges","author":"Banafa Ahmed","year":"2017","unstructured":"Ahmed Banafa. IoT and blockchain convergence: benefits and challenges. IEEE Internet of Things, 2017."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-67r2"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2913621"},{"key":"e_1_3_2_2_11_1","volume-title":"Access control for databases: Concepts and systems","author":"Bertino Elisa","year":"2011","unstructured":"Elisa Bertino, Gabriel Ghinita, and Ashish Kamra. Access control for databases: Concepts and systems. Now Publishers Inc, 2011."},{"key":"e_1_3_2_2_12_1","first-page":"1161","volume-title":"Brute-force and dictionary attack on hashed real-world passwords. In 2018 41st international convention on information and communication technology, electronics and microelectronics (mipro)","author":"L Bovs","year":"2018","unstructured":"L Bovs njak, J Srevs, and Bosnjak Brumen. Brute-force and dictionary attack on hashed real-world passwords. In 2018 41st international convention on information and communication technology, electronics and microelectronics (mipro), pages 1161--1166. IEEE, 2018."},{"key":"e_1_3_2_2_13_1","volume-title":"Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398--461","author":"Castro Miguel","year":"2002","unstructured":"Miguel Castro and Barbara Liskov. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS), 20(4):398--461, 2002."},{"key":"e_1_3_2_2_14_1","first-page":"425","volume-title":"Proceedings of the May 19--22, 1975, national computer conference and exposition","author":"Chamberlin Donald D","year":"1975","unstructured":"Donald D Chamberlin, Jim N Gray, and Irving L Traiger. Views, authorization, and locking in a relational data base system. In Proceedings of the May 19--22, 1975, national computer conference and exposition, pages 425--430, 1975."},{"issue":"3","key":"e_1_3_2_2_15_1","first-page":"137","article-title":"The advanced encryption standard","volume":"26","author":"Daemen Joan","year":"2001","unstructured":"Joan Daemen and Vincent Rijmen. Reijndael: The advanced encryption standard. Dr. Dobb's Journal: Software Tools for the Professional Programmer, 26(3):137--139, 2001.","journal-title":"Dr. Dobb's Journal: Software Tools for the Professional Programmer"},{"key":"e_1_3_2_2_16_1","volume-title":"Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable cities and society, 39:283--297","author":"Dagher Gaby G","year":"2018","unstructured":"Gaby G Dagher, Jordan Mohler, Matea Milojkovic, and Praneeth Babu Marella. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustainable cities and society, 39:283--297, 2018."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274914"},{"key":"e_1_3_2_2_19_1","first-page":"16","volume-title":"Proc. Symposium on Foundations and Applications of Blockchain","volume":"1","author":"Dasu Tamraparni","year":"2018","unstructured":"Tamraparni Dasu, Yaron Kanza, and Divesh Srivastava. Unchain your blockchain. In Proc. Symposium on Foundations and Applications of Blockchain, volume 1, pages 16--23, 2018."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91668-2_2"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/861998"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1349717"},{"key":"e_1_3_2_2_25_1","first-page":"354","volume-title":"2011 Eighth International Conference on Information Technology: New Generations","author":"Gueron Shay","year":"2011","unstructured":"Shay Gueron, Simon Johnson, and Jesse Walker. Sha-512\/256. In 2011 Eighth International Conference on Information Technology: New Generations, pages 354--358. IEEE, 2011."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-01877-0"},{"issue":"3","key":"e_1_3_2_2_27_1","first-page":"2","article-title":"The potential for blockchain to transform electronic health records","volume":"3","author":"Halamka John D","year":"2017","unstructured":"John D Halamka, Andrew Lippman, and Ariel Ekblaw. The potential for blockchain to transform electronic health records. Harvard Business Review, 3(3):2--5, 2017.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212734.3212736"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282278.3282281"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11687238_16"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274986"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"issue":"1","key":"e_1_3_2_2_33_1","first-page":"18","article-title":"Toward an ontology-driven blockchain design for supply-chain provenance. Intelligent Systems in Accounting","volume":"25","author":"Kim Henry M","year":"2018","unstructured":"Henry M Kim and Marek Laskowski. Toward an ontology-driven blockchain design for supply-chain provenance. Intelligent Systems in Accounting, Finance and Management, 25(1):18--27, 2018.","journal-title":"Finance and Management"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3436905.3436917"},{"key":"e_1_3_2_2_35_1","volume-title":"CIDR","author":"Ma Shuaicheng","year":"2021","unstructured":"Shuaicheng Ma, Tamraparni Dasu, Yaron Kanza, Divesh Srivastava, and Li Xiong. Fraud buster: Tracking irsf using blockchain while protecting business confidentiality. In CIDR, 2021."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59665-5_15"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.016"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2018.8548322"},{"key":"e_1_3_2_2_39_1","volume-title":"Manubot","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Technical report, Manubot, 2019."},{"key":"e_1_3_2_2_40_1","volume-title":"Bitcoin Forum","author":"Nolan Tier","year":"2013","unstructured":"Tier Nolan. Alt chains and atomic transfers. In Bitcoin Forum, 2013."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIICT1.2019.8741353"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3459237"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_11"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.14778\/3329772.3329775"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389693"},{"key":"e_1_3_2_2_47_1","volume-title":"Blockchain without waste: Proof-of-stake. The Review of financial studies, 34(3):1156--1190","author":"Saleh Fahad","year":"2021","unstructured":"Fahad Saleh. Blockchain without waste: Proof-of-stake. The Review of financial studies, 34(3):1156--1190, 2021."},{"key":"e_1_3_2_2_48_1","first-page":"237","volume-title":"Advances in computers","author":"Sandhu Ravi S","year":"1998","unstructured":"Ravi S Sandhu. Role-based access control. In Advances in computers, volume 46, pages 237--286. Elsevier, 1998."},{"key":"e_1_3_2_2_49_1","volume-title":"Access control: principle and practice","author":"Sandhu Ravi S","year":"1994","unstructured":"Ravi S Sandhu and Pierangela Samarati. Access control: principle and practice. IEEE communications magazine, 32(9):40--48, 1994."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"e_1_3_2_2_51_1","volume-title":"CIDR","author":"Schuhknecht Felix Martin","year":"2021","unstructured":"Felix Martin Schuhknecht, Ankur Sharma, Jens Dittrich, and Divya Agrawal. chainifydb: How to get rid of your blockchain and use your dbms instead. In CIDR, 2021."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319883"},{"key":"e_1_3_2_2_53_1","first-page":"102060I","volume-title":"Disruptive Technologies in Sensors and Sensor Systems","author":"Shetty Sachin","unstructured":"Sachin Shetty, Val Red, Charles Kamhoua, Kevin Kwiat, and Laurent Njilla. Data provenance assurance in the cloud using blockchain. In Disruptive Technologies in Sensors and Sensor Systems, volume 10206, page 102060I. International Society for Optics and Photonics, 2017."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365871.3365886"},{"key":"e_1_3_2_2_55_1","first-page":"51","volume-title":"A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. In 2018 48th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Sousa Joao","year":"2018","unstructured":"Joao Sousa, Alysson Bessani, and Marko Vukolic. A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. In 2018 48th annual IEEE\/IFIP international conference on dependable systems and networks (DSN), pages 51--58. IEEE, 2018."},{"issue":"9","key":"e_1_3_2_2_56_1","first-page":"2","article-title":"How blockchain is changing finance","volume":"1","author":"Tapscott Alex","year":"2017","unstructured":"Alex Tapscott and Don Tapscott. How blockchain is changing finance. Harvard Business Review, 1(9):2--5, 2017.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00034"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2017.8290114"},{"key":"e_1_3_2_2_59_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1--32","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1--32, 2014."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50049-4"},{"key":"e_1_3_2_2_61_1","volume-title":"Atomic commitment across blockchains. arXiv preprint arXiv:1905.02847","author":"Zakhary Victor","year":"2019","unstructured":"Victor Zakhary, Divyakant Agrawal, and Amr El Abbadi. Atomic commitment across blockchains. arXiv preprint arXiv:1905.02847, 2019."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"}],"event":{"name":"SIGMOD\/PODS '22: International Conference on Management of Data","location":"Philadelphia PA USA","acronym":"SIGMOD\/PODS '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2022 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514221.3526046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514221.3526046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:07Z","timestamp":1750183807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514221.3526046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":62,"alternative-id":["10.1145\/3514221.3526046","10.1145\/3514221"],"URL":"https:\/\/doi.org\/10.1145\/3514221.3526046","relation":{},"subject":[],"published":{"date-parts":[[2022,6,10]]},"assertion":[{"value":"2022-06-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}