{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T20:05:40Z","timestamp":1760731540228,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,27]],"date-time":"2022-05-27T00:00:00Z","timestamp":1653609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,27]]},"DOI":"10.1145\/3546157.3546165","type":"proceedings-article","created":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T15:46:25Z","timestamp":1661183185000},"page":"46-54","source":"Crossref","is-referenced-by-count":2,"title":["Access Control using Blockchain: A Taxonomy and Review"],"prefix":"10.1145","author":[{"given":"Shahrukh","family":"Malik","sequence":"first","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Pakistan"}]},{"given":"Munam Ali","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, COMSATS University Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2022,8,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1034","volume-title":"BlendCAC: A BLockchainEnabled Decentralized Capability-Based Access Control for IoTs","author":"Xu R.","year":"2018","unstructured":"R. Xu , Y. Chen , E. Blasch , and G. Chen , \u201c BlendCAC: A BLockchainEnabled Decentralized Capability-Based Access Control for IoTs ,\u201d in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1027\u2013 1034 , July 2018. ISSN : null. R. Xu, Y. Chen, E. Blasch, and G. Chen, \u201cBlendCAC: A BLockchainEnabled Decentralized Capability-Based Access Control for IoTs,\u201d in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1027\u20131034, July 2018. ISSN: null."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2018.07.004"},{"key":"e_1_3_2_1_3_1","first-page":"208","volume-title":"Internet Research","author":"Karyda M.","year":"2009","unstructured":"M. Karyda , S. Gritzalis , J. Hyuk Park , and S. Kokolakis , \u201c Privacy and fair information practices in ubiquitous environments: Research challenges and future directions ,\u201d Internet Research , vol. 19 , pp. 194\u2013 208 , Jan. 2009 . Publisher : Emerald Group Publishing Limited . M. Karyda, S. Gritzalis, J. Hyuk Park, and S. Kokolakis, \u201cPrivacy and fair information practices in ubiquitous environments: Research challenges and future directions,\u201d Internet Research, vol. 19, pp. 194\u2013 208, Jan. 2009. Publisher: Emerald Group Publishing Limited."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/cait-2016-0002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"e_1_3_2_1_6_1","first-page":"144","volume-title":"Security and Trust Management","author":"J\u00f8sang A.","year":"2017","unstructured":"A. J\u00f8sang , \u201c A Consistent Definition of Authorization ,\u201d in Security and Trust Management (G. Livraga and C. Mitchell, eds.), Lecture Notes in Computer Science, (Cham), pp. 134\u2013 144 , Springer International Publishing , 2017 . A. J\u00f8sang, \u201cA Consistent Definition of Authorization,\u201d in Security and Trust Management (G. Livraga and C. Mitchell, eds.), Lecture Notes in Computer Science, (Cham), pp. 134\u2013144, Springer International Publishing, 2017."},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud","author":"Qi S.","year":"2019","unstructured":"S. Qi and Y. Zheng , \u201c Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud ,\u201d IEEE Transactions on Dependable and Secure Computing , pp. 1 \u2013 1 , 2019 . Conference Name: IEEE Transactions on Dependable and Secure Computing. S. Qi and Y. Zheng, \u201cCrypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud,\u201d IEEE Transactions on Dependable and Secure Computing, pp. 1\u20131, 2019. Conference Name: IEEE Transactions on Dependable and Secure Computing.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_1_8_1","first-page":"1966","article-title":"A cloud-user behavior assessment based dynamic access control model","volume":"8","author":"Jing X.","year":"2017","unstructured":"X. Jing , Z. Liu , S. Li , B. Qiao , and G. Tan , \u201c A cloud-user behavior assessment based dynamic access control model ,\u201d International Journal of System Assurance Engineering and Management , vol. 8 , pp. 1966 \u2013 1975 , Nov. 2017 . X. Jing, Z. Liu, S. Li, B. Qiao, and G. Tan, \u201cA cloud-user behavior assessment based dynamic access control model,\u201d International Journal of System Assurance Engineering and Management, vol. 8, pp. 1966\u2013 1975, Nov. 2017.","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"e_1_3_2_1_9_1","first-page":"16","volume-title":"Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec \u201919","author":"Li H.","unstructured":"H. Li , F. Wei , and H. Hu , \u201c Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN ,\u201d in Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec \u201919 , (New York, NY, USA) , pp. 13\u2013 16 , Association for Computing Machinery, Mar. 2019. H. Li, F. Wei, and H. Hu, \u201cEnabling Dynamic Network Access Control with Anomaly-based IDS and SDN,\u201d in Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec \u201919, (New York, NY, USA), pp. 13\u201316, Association for Computing Machinery, Mar. 2019."},{"key":"e_1_3_2_1_10_1","volume-title":"Bitcoin. \u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto and A. Bitcoin , \u201c A peer-to-peer electronic cash system ,\u201d Bitcoin. \u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf , vol. 4 , 2008 . S. Nakamoto and A. Bitcoin, \u201cA peer-to-peer electronic cash system,\u201d Bitcoin. \u2013URL: https:\/\/bitcoin. org\/bitcoin. pdf, vol. 4, 2008."},{"issue":"6","key":"e_1_3_2_1_11_1","first-page":"71","article-title":"Blockchain technology: Beyond bitcoin","volume":"2","author":"Crosby M.","year":"2016","unstructured":"M. Crosby , P. Pattanayak , S. Verma , and V. Kalyanaraman , \u201c Blockchain technology: Beyond bitcoin ,\u201d Applied Innovation , vol. 2 , no. 6-10 , p. 71 , 2016 . M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman, \u201cBlockchain technology: Beyond bitcoin,\u201d Applied Innovation, vol. 2, no. 6-10, p. 71, 2016.","journal-title":"Applied Innovation"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"e_1_3_2_1_13_1","first-page":"502","volume-title":"Theory and Applications of Dependable Computer Systems","author":"Rajba P.","year":"2020","unstructured":"P. Rajba , \u201c Tackling Access Control Complexity by Combining XACML and Domain Driven Design ,\u201d in Theory and Applications of Dependable Computer Systems (W. Zamojski, J. Mazurkiewicz, J. Sugier, T. Walkowiak, and J. Kacprzyk, eds.), Advances in Intelligent Systems and Computing, (Cham), pp. 493\u2013 502 , Springer International Publishing , 2020 . P. Rajba, \u201cTackling Access Control Complexity by Combining XACML and Domain Driven Design,\u201d in Theory and Applications of Dependable Computer Systems (W. Zamojski, J. Mazurkiewicz, J. Sugier, T. Walkowiak, and J. Kacprzyk, eds.), Advances in Intelligent Systems and Computing, (Cham), pp. 493\u2013502, Springer International Publishing, 2020."},{"key":"e_1_3_2_1_14_1","first-page":"196","volume-title":"Foundations of Security Analysis and Design","author":"Samarati P.","year":"2001","unstructured":"P. Samarati and S. C. de Vimercati , \u201c Access Control: Policies, Models, and Mechanisms ,\u201d in Foundations of Security Analysis and Design (R. Focardi and R. Gorrieri, eds.), Lecture Notes in Computer Science, (Berlin, Heidelberg), pp. 137\u2013 196 , Springer , 2001 . P. Samarati and S. C. de Vimercati, \u201cAccess Control: Policies, Models, and Mechanisms,\u201d in Foundations of Security Analysis and Design (R. Focardi and R. Gorrieri, eds.), Lecture Notes in Computer Science, (Berlin, Heidelberg), pp. 137\u2013196, Springer, 2001."},{"key":"e_1_3_2_1_15_1","first-page":"261","volume-title":"2011 7th International Conference on Information Assurance and Security (IAS)","author":"Ahmad A.","year":"2011","unstructured":"A. Ahmad and B. Whitworth , \u201c Access control taxonomy for social networks ,\u201d in 2011 7th International Conference on Information Assurance and Security (IAS) , ( Melacca, Malaysia) , pp. 256\u2013 261 , IEEE, Dec. 2011 . A. Ahmad and B. Whitworth, \u201cAccess control taxonomy for social networks,\u201d in 2011 7th International Conference on Information Assurance and Security (IAS), (Melacca, Malaysia), pp. 256\u2013261, IEEE, Dec. 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3146025"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"issue":"23","key":"e_1_3_2_1_18_1","first-page":"4209","article-title":"Access control schemes in cloud: Taxonomy and performance","volume":"14","author":"Sabitha S.","year":"2019","unstructured":"S. Sabitha and M. Rajasree , \u201c Access control schemes in cloud: Taxonomy and performance ,\u201d International Journal of Applied Engineering Research , vol. 14 , no. 23 , pp. 4209 \u2013 4220 , 2019 . S. Sabitha and M. Rajasree, \u201cAccess control schemes in cloud: Taxonomy and performance,\u201d International Journal of Applied Engineering Research, vol. 14, no. 23, pp. 4209\u20134220, 2019.","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380588"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.018"},{"key":"e_1_3_2_1_22_1","first-page":"20","volume-title":"Security Technology (T.-h. Kim, H. Adeli, W.-c","author":"Suhendra V.","year":"2011","unstructured":"V. Suhendra , \u201c A Survey on Access Control Deployment ,\u201d in Security Technology (T.-h. Kim, H. Adeli, W.-c . Fang, J. G. Villalba, K. P. Arnett, and M. K. Khan, eds.), Communications in Computer and Information Science, (Berlin, Heidelberg), pp. 11\u2013 20 , Springer , 2011 . tex.ids: suhendraSurveyAccessControl2011a. V. Suhendra, \u201cA Survey on Access Control Deployment,\u201d in Security Technology (T.-h. Kim, H. Adeli, W.-c. Fang, J. G. Villalba, K. P. Arnett, and M. K. Khan, eds.), Communications in Computer and Information Science, (Berlin, Heidelberg), pp. 11\u201320, Springer, 2011. tex.ids: suhendraSurveyAccessControl2011a."},{"key":"e_1_3_2_1_23_1","first-page":"264","volume-title":"Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC \u201916","author":"Agadakos I.","unstructured":"I. Agadakos , P. Hallgren , D. Damopoulos , A. Sabelfeld , and G. Portokalidis , \u201c Location-enhanced authentication using the IoT: because you cannot be in two places at once ,\u201d in Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC \u201916 , (New York, NY, USA) , pp. 251\u2013 264 , Association for Computing Machinery, Dec. 2016. I. Agadakos, P. Hallgren, D. Damopoulos, A. Sabelfeld, and G. Portokalidis, \u201cLocation-enhanced authentication using the IoT: because you cannot be in two places at once,\u201d in Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC \u201916, (New York, NY, USA), pp. 251\u2013264, Association for Computing Machinery, Dec. 2016."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799942"},{"key":"e_1_3_2_1_25_1","first-page":"6 1095","volume-title":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","author":"Li D.","year":"2018","unstructured":"D. Li , W. Peng , W. Deng , and F. Gai , \u201c A Blockchain-Based Authentication and Security Mechanism for IoT ,\u201d in 2018 27th International Conference on Computer Communication and Networks (ICCCN) , pp. 1\u2013 6 , July 2018 . ISSN: 1095 - 2055 . D. Li, W. Peng, W. Deng, and F. Gai, \u201cA Blockchain-Based Authentication and Security Mechanism for IoT,\u201d in 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20136, July 2018. ISSN: 1095-2055."},{"key":"e_1_3_2_1_26_1","first-page":"8","volume-title":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","author":"Lau C. H.","year":"2018","unstructured":"C. H. Lau , K. Y. Alan , and F. Yan , \u201c Blockchain-Based Authentication in IoT Networks ,\u201d in 2018 IEEE Conference on Dependable and Secure Computing (DSC) , pp. 1\u2013 8 , Dec. 2018 . C. H. Lau, K. Y. Alan, and F. Yan, \u201cBlockchain-Based Authentication in IoT Networks,\u201d in 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138, Dec. 2018."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"e_1_3_2_1_28_1","first-page":"546","volume-title":"Journal of Software Engineering and Applications","author":"Bahga A.","year":"2016","unstructured":"A. Bahga and V. K. Madisetti , \u201c Blockchain Platform for Industrial Internet of Things ,\u201d Journal of Software Engineering and Applications , vol. 9 , pp. 533\u2013 546 , Oct. 2016 . Number : 10 Publisher : Scientific Research Publishing . A. Bahga and V. K. Madisetti, \u201cBlockchain Platform for Industrial Internet of Things,\u201d Journal of Software Engineering and Applications, vol. 9, pp. 533\u2013546, Oct. 2016. Number: 10 Publisher: Scientific Research Publishing."},{"key":"e_1_3_2_1_29_1","first-page":"533","volume-title":"Europe and MENA Cooperation Advances in Information and Communication Technologies (l","author":"Ouaddah A.","year":"2017","unstructured":"A. Ouaddah , A. A. Elkalam , and A. A. Ouahman , \u201c Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT ,\u201d in Europe and MENA Cooperation Advances in Information and Communication Technologies (l . Rocha, M. Serrhini, and C. Felgueiras, eds.), (Cham), pp. 523\u2013 533 , Springer International Publishing , 2017 . A. Ouaddah, A. A. Elkalam, and A. A. Ouahman, \u201cTowards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT,\u201d in Europe and MENA Cooperation Advances in Information and Communication Technologies (l. Rocha, M. Serrhini, and C. Felgueiras, eds.), (Cham), pp. 523\u2013533, Springer International Publishing, 2017."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"e_1_3_2_1_31_1","first-page":"30","volume-title":"2016 2nd International Conference on Open and Big Data (OBD)","author":"Azaria A.","year":"2016","unstructured":"A. Azaria , A. Ekblaw , T. Vieira , and A. Lippman , \u201c MedRec: Using Blockchain for Medical Data Access and Permission Management ,\u201d in 2016 2nd International Conference on Open and Big Data (OBD) , pp. 25\u2013 30 , Aug. 2016 . ISSN: null. A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, \u201cMedRec: Using Blockchain for Medical Data Access and Permission Management,\u201d in 2016 2nd International Conference on Open and Big Data (OBD), pp. 25\u201330, Aug. 2016. ISSN: null."},{"key":"e_1_3_2_1_32_1","first-page":"145","volume-title":"Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT \u201915","author":"Han W.","unstructured":"W. Han , Y. Zhang , Z. Guo , and E. Bertino , \u201c Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking ,\u201d in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT \u201915 , (New York, NY, USA) , pp. 135\u2013 145 , Association for Computing Machinery, June 2015. W. Han, Y. Zhang, Z. Guo, and E. Bertino, \u201cFine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking,\u201d in Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT \u201915, (New York, NY, USA), pp. 135\u2013145, Association for Computing Machinery, June 2015."},{"key":"e_1_3_2_1_33_1","first-page":"93","volume-title":"2017 IEEE World Congress on Services (SERVICES)","author":"Do H. G.","year":"2017","unstructured":"H. G. Do and W. K. Ng , \u201c Blockchain-Based System for Secure Data Storage with Private Keyword Search ,\u201d in 2017 IEEE World Congress on Services (SERVICES) , pp. 90\u2013 93 , June 2017 . H. G. Do and W. K. Ng, \u201cBlockchain-Based System for Secure Data Storage with Private Keyword Search,\u201d in 2017 IEEE World Congress on Services (SERVICES), pp. 90\u201393, June 2017."},{"key":"e_1_3_2_1_34_1","first-page":"1450","volume-title":"Proceedings of the 26th International Conference on World Wide Web Companion - WWW \u201917 Companion","author":"Xu L.","year":"2017","unstructured":"L. Xu , L. Chen , N. Shah , Z. Gao , Y. Lu , and W. Shi , \u201c DL-BAC: Distributed Ledger Based Access Control for Web Applications ,\u201d in Proceedings of the 26th International Conference on World Wide Web Companion - WWW \u201917 Companion , ( Perth, Australia) , pp. 1445\u2013 1450 , ACM Press, 2017 . L. Xu, L. Chen, N. Shah, Z. Gao, Y. Lu, and W. Shi, \u201cDL-BAC: Distributed Ledger Based Access Control for Web Applications,\u201d in Proceedings of the 26th International Conference on World Wide Web Companion - WWW \u201917 Companion, (Perth, Australia), pp. 1445\u20131450, ACM Press, 2017."},{"key":"e_1_3_2_1_35_1","first-page":"706","volume-title":"2018 21st Euromicro Conference on Digital System Design (DSD)","author":"Mikula T.","year":"2018","unstructured":"T. Mikula and R. H. Jacobsen , \u201c Identity and Access Management with Blockchain in Electronic Healthcare Records ,\u201d in 2018 21st Euromicro Conference on Digital System Design (DSD) , pp. 699\u2013 706 , Aug. 2018 . ISSN: null. T. Mikula and R. H. Jacobsen, \u201cIdentity and Access Management with Blockchain in Electronic Healthcare Records,\u201d in 2018 21st Euromicro Conference on Digital System Design (DSD), pp. 699\u2013706, Aug. 2018. ISSN: null."},{"volume-title":"Ethereum project yellow paper","author":"Wood G.","key":"e_1_3_2_1_36_1","unstructured":"G. Wood , \u201c Ethereum: A secure decentralised generalised transaction ledger ,\u201d Ethereum project yellow paper , vol. 151 , no. 2014, pp. 1\u201332, 2014. G. Wood, \u201cEthereum: A secure decentralised generalised transaction ledger,\u201d Ethereum project yellow paper, vol. 151, no. 2014, pp. 1\u201332, 2014."},{"key":"e_1_3_2_1_37_1","first-page":"15","volume-title":"Hyperledger fabric: a distributed operating system for permissioned blockchains","author":"Androulaki E.","year":"2018","unstructured":"E. Androulaki , A. Barger , V. Bortnikov , C. Cachin , K. Christidis , A. De Caro , D. Enyeart , C. Ferris , G. Laventman , and Y. Manevich , \u201c Hyperledger fabric: a distributed operating system for permissioned blockchains ,\u201d pp. 1\u2013 15 , 2018 . E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, and Y. Manevich, \u201cHyperledger fabric: a distributed operating system for permissioned blockchains,\u201d pp. 1\u201315, 2018."},{"key":"e_1_3_2_1_38_1","first-page":"15","volume-title":"August","volume":"1","author":"Brown R. G.","year":"2016","unstructured":"R. G. Brown , J. Carlyle , I. Grigg , and M. Hearn , \u201c Corda: an introduction,\u201d R3 CEV , August , vol. 1 , p. 15 , 2016 . R. G. Brown, J. Carlyle, I. Grigg, and M. Hearn, \u201cCorda: an introduction,\u201d R3 CEV, August, vol. 1, p. 15, 2016."},{"key":"e_1_3_2_1_39_1","first-page":"220","volume-title":"Distributed Applications and Interoperable Systems","author":"Di Francesco Maesa D.","year":"2017","unstructured":"D. Di Francesco Maesa , P. Mori , and L. Ricci , \u201c Blockchain Based Access Control ,\u201d in Distributed Applications and Interoperable Systems (L. Y. Chen and H. P. Reiser, eds.), Lecture Notes in Computer Science, (Cham), pp. 206\u2013 220 , Springer International Publishing , 2017 . D. Di Francesco Maesa, P. Mori, and L. Ricci, \u201cBlockchain Based Access Control,\u201d in Distributed Applications and Interoperable Systems (L. Y. Chen and H. P. Reiser, eds.), Lecture Notes in Computer Science, (Cham), pp. 206\u2013220, Springer International Publishing, 2017."},{"key":"e_1_3_2_1_40_1","first-page":"7","volume-title":"Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, BCC \u201917","author":"Vukolic M.","unstructured":"M. Vukolic , \u201c Rethinking Permissioned Blockchains,\u201d in\u00b4 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, BCC \u201917 , (New York, NY, USA) , pp. 3\u2013 7 , Association for Computing Machinery, Apr. 2017. M. Vukolic, \u201cRethinking Permissioned Blockchains,\u201d in\u00b4 Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, BCC \u201917, (New York, NY, USA), pp. 3\u20137, Association for Computing Machinery, Apr. 2017."},{"key":"e_1_3_2_1_41_1","first-page":"1","article-title":"Permissionless and Permissioned, Technology-Focused and Business NeedsDriven: Understanding the Hybrid Opportunity in Blockchain Through a Case Study of Insolar","author":"Kim H. M.","year":"2020","unstructured":"H. M. Kim , H. Turesson , M. Laskowski , and A. F. Bahreini , \u201c Permissionless and Permissioned, Technology-Focused and Business NeedsDriven: Understanding the Hybrid Opportunity in Blockchain Through a Case Study of Insolar ,\u201d IEEE Transactions on Engineering Management , pp. 1 \u2013 16 , 2020 . Conference Name: IEEE Transactions on Engineering Management. H. M. Kim, H. Turesson, M. Laskowski, and A. F. Bahreini, \u201cPermissionless and Permissioned, Technology-Focused and Business NeedsDriven: Understanding the Hybrid Opportunity in Blockchain Through a Case Study of Insolar,\u201d IEEE Transactions on Engineering Management, pp. 1\u201316, 2020. Conference Name: IEEE Transactions on Engineering Management.","journal-title":"IEEE Transactions on Engineering Management"},{"key":"e_1_3_2_1_42_1","first-page":"144","volume-title":"2018 IEEE International Conference on Smart Cloud (SmartCloud)","author":"Cash M.","year":"2018","unstructured":"M. Cash and M. Bassiouni , \u201c Two-Tier Permission-ed and PermissionLess Blockchain for Secure Data Sharing ,\u201d in 2018 IEEE International Conference on Smart Cloud (SmartCloud) , pp. 138\u2013 144 , Sept. 2018 . ISSN: null. M. Cash and M. Bassiouni, \u201cTwo-Tier Permission-ed and PermissionLess Blockchain for Secure Data Sharing,\u201d in 2018 IEEE International Conference on Smart Cloud (SmartCloud), pp. 138\u2013144, Sept. 2018. ISSN: null."},{"key":"e_1_3_2_1_43_1","first-page":"477","volume-title":"2019 IEEE International Conference on Modern Electrical and Energy Systems (MEES)","author":"Vince T.","year":"2019","unstructured":"T. Vince and O. Slavko , \u201c Enhanced Centralized Access Control System ,\u201d in 2019 IEEE International Conference on Modern Electrical and Energy Systems (MEES) , pp. 474\u2013 477 , Sept. 2019 . T. Vince and O. Slavko, \u201cEnhanced Centralized Access Control System,\u201d in 2019 IEEE International Conference on Modern Electrical and Energy Systems (MEES), pp. 474\u2013477, Sept. 2019."},{"key":"e_1_3_2_1_44_1","first-page":"587","volume-title":"Computational Intelligence and Intelligent Systems (K. Li","author":"Liu Y.","year":"2018","unstructured":"Y. Liu , W. Gao , and J. Liao , \u201c Centralized Access Control Scheme Based on OAuth for Social Networks ,\u201d in Computational Intelligence and Intelligent Systems (K. Li , W. Li, Z. Chen, and Y. Liu, eds.), Communications in Computer and Information Science, (Singapore), pp. 576\u2013 587 , Springer , 2018 . Y. Liu, W. Gao, and J. Liao, \u201cCentralized Access Control Scheme Based on OAuth for Social Networks,\u201d in Computational Intelligence and Intelligent Systems (K. Li, W. Li, Z. Chen, and Y. Liu, eds.), Communications in Computer and Information Science, (Singapore), pp. 576\u2013587, Springer, 2018."},{"key":"e_1_3_2_1_45_1","first-page":"408","volume-title":"Proceedings of the USENIX ... annual Technical Conference. USENIX Technical Conference","volume":"2014","author":"Xu Y.","year":"2014","unstructured":"Y. Xu , A. M. Dunn , O. S. Hofmann , M. Z. Lee , S. A. Mehdi , and E. Witchel , \u201c Application-Defined Decentralized Access Control ,\u201d Proceedings of the USENIX ... annual Technical Conference. USENIX Technical Conference , vol. 2014 , pp. 395\u2013 408 , 2014 . Y. Xu, A. M. Dunn, O. S. Hofmann, M. Z. Lee, S. A. Mehdi, and E. Witchel, \u201cApplication-Defined Decentralized Access Control,\u201d Proceedings of the USENIX ... annual Technical Conference. USENIX Technical Conference, vol. 2014, pp. 395\u2013408, 2014."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.38"},{"key":"e_1_3_2_1_47_1","first-page":"3","volume-title":"The Internet Computing","author":"Cerf V. G.","year":"2015","unstructured":"V. G. Cerf , \u201c Access Control and the Internet of Things ,\u201d The Internet Computing , vol. 19 , pp. 96\u2013c 3 , Sept. 2015 . Publisher : IEEE Computer Society . V. G. Cerf, \u201cAccess Control and the Internet of Things,\u201d The Internet Computing, vol. 19, pp. 96\u2013c3, Sept. 2015. Publisher: IEEE Computer Society."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_50_1","first-page":"544 0730","volume-title":"2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)","volume":"01","author":"Zhu Y.","year":"2018","unstructured":"Y. Zhu , Y. Qin , G. Gan , Y. Shuai , and W. C.-C. Chu , \u201c TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization ,\u201d in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) , vol. 01 , pp. 535\u2013 544 , July 2018 . ISSN: 0730 - 3157 . Y. Zhu, Y. Qin, G. Gan, Y. Shuai, and W. C.-C. Chu, \u201cTBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization,\u201d in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 01, pp. 535\u2013544, July 2018. ISSN: 0730-3157."},{"key":"e_1_3_2_1_51_1","first-page":"429","volume-title":"Protection: principles and practice","author":"Graham G. S.","year":"1971","unstructured":"G. S. Graham and P. J. Denning , \u201c Protection: principles and practice ,\u201d pp. 417\u2013 429 , 1971 . G. S. Graham and P. J. Denning, \u201cProtection: principles and practice,\u201d pp. 417\u2013429, 1971."},{"volume-title":"WAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts","author":"Andersen M. P.","key":"e_1_3_2_1_52_1","unstructured":"M. P. Andersen , J. Kolb , K. Chen , G. Fierro , D. E. Culler , and R. A. Popa , \u201c WAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts ,\u201d p. 18. M. P. Andersen, J. Kolb, K. Chen, G. Fierro, D. E. Culler, and R. A. Popa, \u201cWAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts,\u201d p. 18."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1748"},{"key":"e_1_3_2_1_54_1","first-page":"144","volume-title":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)","author":"Moghaddam F. F.","year":"2016","unstructured":"F. F. Moghaddam , P. Wieder , and R. Yahyapour , \u201c Policy Engine as a Service (PEaaS): An Approach to a Reliable Policy Management Framework in Cloud Computing Environments ,\u201d in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) , pp. 137\u2013 144 , Aug. 2016 . F. F. Moghaddam, P. Wieder, and R. Yahyapour, \u201cPolicy Engine as a Service (PEaaS): An Approach to a Reliable Policy Management Framework in Cloud Computing Environments,\u201d in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pp. 137\u2013144, Aug. 2016."},{"key":"e_1_3_2_1_55_1","first-page":"140","volume-title":"2013 2nd National Conference on Information Assurance (NCIA)","author":"Ghafoor A.","year":"2013","unstructured":"A. Ghafoor , M. Irum , and M. Qaisar , \u201c User Centric Access control policy management framework for Cloud applications ,\u201d in 2013 2nd National Conference on Information Assurance (NCIA) , pp. 135\u2013 140 , Dec. 2013 . A. Ghafoor, M. Irum, and M. Qaisar, \u201cUser Centric Access control policy management framework for Cloud applications,\u201d in 2013 2nd National Conference on Information Assurance (NCIA), pp. 135\u2013140, Dec. 2013."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2969326"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Y. Asim A. K. Malik Y. Asim and A. K. Malik \u201cA Survey on Access Control Techniques for Social Networks \u201d Jan. 1. Archive Location: a-survey-on-access-control-techniques-for-social-networks ISBN: 9781522504481 Publisher: IGI Global.  Y. Asim A. K. Malik Y. Asim and A. K. Malik \u201cA Survey on Access Control Techniques for Social Networks \u201d Jan. 1. Archive Location: a-survey-on-access-control-techniques-for-social-networks ISBN: 9781522504481 Publisher: IGI Global.","DOI":"10.4018\/978-1-5225-0448-1.ch001"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700333"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.017"},{"key":"e_1_3_2_1_60_1","volume-title":"Secure computer systems: Mathematical foundations","author":"Bell D. E.","year":"1973","unstructured":"D. E. Bell and L. J. LaPadula , \u201c Secure computer systems: Mathematical foundations ,\u201d tech. rep., MITRE CORP BEDFORD MA , 1973 . D. E. Bell and L. J. LaPadula, \u201cSecure computer systems: Mathematical foundations,\u201d tech. rep., MITRE CORP BEDFORD MA, 1973."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.010"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_63_1","volume-title":"Attributed based access control (ABAC) for web services","author":"Yuan E.","year":"2005","unstructured":"E. Yuan and J. Tong , \u201c Attributed based access control (ABAC) for web services ,\u201d IEEE , 2005 . E. Yuan and J. Tong, \u201cAttributed based access control (ABAC) for web services,\u201d IEEE, 2005."},{"key":"e_1_3_2_1_64_1","volume-title":"Guide to attribute-based access control definition and considerations","author":"Vincent C. H.","year":"2014","unstructured":"C. H. Vincent , D. Ferraiolo , R. Kuhn , A. Schnitzer , K. Sandlin , R. Miller , and K. Scarfone , \u201c Guide to attribute-based access control definition and considerations ,\u201d National Institute of Standards and Technology , 2014 . C. H. Vincent, D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, and K. Scarfone, \u201cGuide to attribute-based access control definition and considerations,\u201d National Institute of Standards and Technology, 2014."},{"key":"e_1_3_2_1_65_1","first-page":"167","volume-title":"2019 International Conference on Communications, Information System and Computer Engineering (CISCE)","author":"Ding X.","year":"2019","unstructured":"X. Ding and J. Yang , \u201c An Access Control Model and Its Application in Blockchain ,\u201d in 2019 International Conference on Communications, Information System and Computer Engineering (CISCE) , pp. 163\u2013 167 , July 2019 . ISSN: null. X. Ding and J. Yang, \u201cAn Access Control Model and Its Application in Blockchain,\u201d in 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), pp. 163\u2013167, July 2019. ISSN: null."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2019.03.015"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"e_1_3_2_1_68_1","volume-title":"IEEE Wireless Communications and Networking Conference","author":"Alphand O.","year":"2018","unstructured":"O. Alphand , M. Amoretti , T. Claeys , S. Dall \u2019asta , A. Duda , G. Ferrari , F. Rousseau , B. Tourancheau , L. Veltri , and F. Zanichelli , \u201c IoTChain: A Blockchain Security Architecture for the Internet of Things ,\u201d in IEEE Wireless Communications and Networking Conference , ( Barcelona, Spain ), Apr. 2018 . O. Alphand, M. Amoretti, T. Claeys, S. Dall \u2019asta, A. Duda, G. Ferrari, F. Rousseau, B. Tourancheau, L. Veltri, and F. Zanichelli, \u201cIoTChain: A Blockchain Security Architecture for the Internet of Things,\u201d in IEEE Wireless Communications and Networking Conference, (Barcelona, Spain), Apr. 2018."},{"issue":"7","key":"e_1_3_2_1_69_1","first-page":"7","article-title":"Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things","volume":"8","author":"Outchakoucht A.","year":"2017","unstructured":"A. Outchakoucht , H. Es-Samaali , and J. P. Leroy , \u201c Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things ,\u201d International Journal of Advanced Computer Science and Applications (ijacsa) , vol. 8 , no. 7 , 2017 . Number: 7 Publisher: The Science and Information (SAI) Organization Limited. A. Outchakoucht, H. Es-Samaali, and J. P. Leroy, \u201cDynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things,\u201d International Journal of Advanced Computer Science and Applications (ijacsa), vol. 8, no. 7, 2017. Number: 7 Publisher: The Science and Information (SAI) Organization Limited.","journal-title":"International Journal of Advanced Computer Science and Applications (ijacsa)"},{"key":"e_1_3_2_1_70_1","first-page":"8 2161","volume-title":"2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA)","author":"Almadhoun R.","year":"2018","unstructured":"R. Almadhoun , M. Kadadha , M. Alhemeiri , M. Alshehhi , and K. Salah , \u201c A User Authentication Scheme of IoT Devices using BlockchainEnabled Fog Nodes ,\u201d in 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA) , pp. 1\u2013 8 , Oct. 2018 . ISSN: 2161 - 5330 . R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah, \u201cA User Authentication Scheme of IoT Devices using BlockchainEnabled Fog Nodes,\u201d in 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20138, Oct. 2018. ISSN: 2161-5330."},{"key":"e_1_3_2_1_71_1","first-page":"131","volume-title":"Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","author":"Kalam A. A. E.","year":"2003","unstructured":"A. A. E. Kalam , R. E. Baida , P. Balbiani , S. Benferhat , F. Cuppens , Y. Deswarte , A. Miege , C. Saurel , and G. Trouessin , \u201c Organization based access control ,\u201d in Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks , pp. 120\u2013 131 , June 2003 . A. A. E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin, \u201cOrganization based access control,\u201d in Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120\u2013 131, June 2003."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.08.001"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"e_1_3_2_1_75_1","first-page":"5992 2576","volume-title":"2018 IEEE Conference on Decision and Control (CDC)","author":"Fullmer D.","year":"2018","unstructured":"D. Fullmer and A. S. Morse , \u201c Analysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains ,\u201d in 2018 IEEE Conference on Decision and Control (CDC) , pp. 5988\u2013 5992 , Dec. 2018 . ISSN: 2576 - 2370 . D. Fullmer and A. S. Morse, \u201cAnalysis of Difficulty Control in Bitcoin and Proof-of-Work Blockchains,\u201d in 2018 IEEE Conference on Decision and Control (CDC), pp. 5988\u20135992, Dec. 2018. ISSN: 2576-2370."},{"key":"e_1_3_2_1_76_1","first-page":"1","volume-title":"August","volume":"19","author":"King S.","year":"2012","unstructured":"S. King and S. Nadal , \u201c Ppcoin: Peer-to-peer crypto-currency with proof-of-stake,\u201d self-published paper , August , vol. 19 , p. 1 , 2012 . S. King and S. Nadal, \u201cPpcoin: Peer-to-peer crypto-currency with proof-of-stake,\u201d self-published paper, August, vol. 19, p. 1, 2012."},{"volume-title":"Draft v. 0.6, fall","author":"Kwon J.","key":"e_1_3_2_1_77_1","unstructured":"J. Kwon , \u201c Tendermint: Consensus without mining ,\u201d Draft v. 0.6, fall , vol. 1 , no. 11, 2014. J. Kwon, \u201cTendermint: Consensus without mining,\u201d Draft v. 0.6, fall, vol. 1, no. 11, 2014."},{"key":"e_1_3_2_1_78_1","first-page":"186","volume-title":"Practical Byzantine fault tolerance","author":"Castro M.","year":"1999","unstructured":"M. Castro and B. Liskov , \u201c Practical Byzantine fault tolerance ,\u201d vol. 99, pp. 173\u2013 186 , 1999 . Issue : 1999. M. Castro and B. Liskov, \u201cPractical Byzantine fault tolerance,\u201d vol. 99, pp. 173\u2013186, 1999. Issue: 1999."},{"key":"e_1_3_2_1_79_1","first-page":"125","volume-title":"The quest for scalable blockchain fabric: Proof-of-work\u00b4 vs. BFT replication","author":"Vukolic M.","year":"2015","unstructured":"M. Vukolic , \u201c The quest for scalable blockchain fabric: Proof-of-work\u00b4 vs. BFT replication ,\u201d pp. 112\u2013 125 , Springer , 2015 . M. Vukolic, \u201cThe quest for scalable blockchain fabric: Proof-of-work\u00b4 vs. BFT replication,\u201d pp. 112\u2013125, Springer, 2015."},{"volume-title":"The Stellar Consensus Protocol - A federated model for` Internet-level consensus","author":"Mazieres D.","key":"e_1_3_2_1_80_1","unstructured":"D. Mazieres , \u201c The Stellar Consensus Protocol - A federated model for` Internet-level consensus ,\u201d p. 85. D. Mazieres, \u201cThe Stellar Consensus Protocol - A federated model for` Internet-level consensus,\u201d p. 85."},{"key":"e_1_3_2_1_81_1","first-page":"40","article-title":"Distributed Ledger Technologies\/Blockchain: Challenges, opportunities and the prospects for standards","volume":"40","author":"Deshpande A.","year":"2017","unstructured":"A. Deshpande , K. Stewart , L. Lepetit , and S. Gunashekar , \u201c Distributed Ledger Technologies\/Blockchain: Challenges, opportunities and the prospects for standards ,\u201d Overview report The British Standards Institution (BSI) , vol. 40 , p. 40 , 2017 . A. Deshpande, K. Stewart, L. Lepetit, and S. Gunashekar, \u201cDistributed Ledger Technologies\/Blockchain: Challenges, opportunities and the prospects for standards,\u201d Overview report The British Standards Institution (BSI), vol. 40, p. 40, 2017.","journal-title":"Overview report The British Standards Institution (BSI)"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_83_1","first-page":"17","volume-title":"Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, PODC \u201988","author":"Oki B. M.","unstructured":"B. M. Oki and B. H. Liskov , \u201c Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems ,\u201d in Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, PODC \u201988 , (New York, NY, USA) , pp. 8\u2013 17 , Association for Computing Machinery, Jan. 1988. B. M. Oki and B. H. Liskov, \u201cViewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems,\u201d in Proceedings of the seventh annual ACM Symposium on Principles of distributed computing, PODC \u201988, (New York, NY, USA), pp. 8\u201317, Association for Computing Machinery, Jan. 1988."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_85_1","first-page":"162","volume-title":"Proceedings of the third annual ACM symposium on Principles of distributed computing, PODC \u201984","author":"Bracha G.","unstructured":"G. Bracha , \u201c An asynchronous [(n - 1)\/3]-resilient consensus protocol ,\u201d in Proceedings of the third annual ACM symposium on Principles of distributed computing, PODC \u201984 , (New York, NY, USA) , pp. 154\u2013 162 , Association for Computing Machinery, Aug. 1984. G. Bracha, \u201cAn asynchronous [(n - 1)\/3]-resilient consensus protocol,\u201d in Proceedings of the third annual ACM symposium on Principles of distributed computing, PODC \u201984, (New York, NY, USA), pp. 154\u2013162, Association for Computing Machinery, Aug. 1984."},{"key":"e_1_3_2_1_86_1","first-page":"192","volume-title":"Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, PODC \u201994","author":"Ben-Or M.","unstructured":"M. Ben-Or , B. Kelmer , and T. Rabin , \u201c Asynchronous secure computations with optimal resilience (extended abstract) ,\u201d in Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, PODC \u201994 , (New York, NY, USA) , pp. 183\u2013 192 , Association for Computing Machinery, Aug. 1994. M. Ben-Or, B. Kelmer, and T. Rabin, \u201cAsynchronous secure computations with optimal resilience (extended abstract),\u201d in Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing, PODC \u201994, (New York, NY, USA), pp. 183\u2013192, Association for Computing Machinery, Aug. 1994."},{"key":"e_1_3_2_1_87_1","first-page":"42","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916","author":"Miller A.","unstructured":"A. Miller , Y. Xia , K. Croman , E. Shi , and D. Song , \u201c The Honey Badger of BFT Protocols ,\u201d in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916 , (New York, NY, USA) , pp. 31\u2013 42 , Association for Computing Machinery, Oct. 2016. A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song, \u201cThe Honey Badger of BFT Protocols,\u201d in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201916, (New York, NY, USA), pp. 31\u201342, Association for Computing Machinery, Oct. 2016."},{"key":"e_1_3_2_1_88_1","first-page":"297","volume-title":"International Symposium on Stabilization, Safety, and Security of Distributed Systems","author":"Chen L.","year":"2017","unstructured":"L. Chen , L. Xu , N. Shah , Z. Gao , Y. Lu , and W. Shi , \u201c On security analysis of proof-of-elapsed-time (poet) ,\u201d in International Symposium on Stabilization, Safety, and Security of Distributed Systems , pp. 282\u2013 297 , Springer , 2017 . L. Chen, L. Xu, N. Shah, Z. Gao, Y. Lu, and W. Shi, \u201cOn security analysis of proof-of-elapsed-time (poet),\u201d in International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 282\u2013 297, Springer, 2017."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"crossref","first-page":"628","DOI":"10.1007\/978-3-030-60029-7","volume-title":"International Conference on Web Information Systems and Applications","author":"Wang D.","year":"2020","unstructured":"D. Wang , C. Jin , H. Li , and M. Perkowski , \u201c Proof of Activity Consensus Algorithm Based on Credit Reward Mechanism ,\u201d in International Conference on Web Information Systems and Applications , pp. 618\u2013 628 , Springer , 2020 . D. Wang, C. Jin, H. Li, and M. Perkowski, \u201cProof of Activity Consensus Algorithm Based on Credit Reward Mechanism,\u201d in International Conference on Web Information Systems and Applications, pp. 618\u2013628, Springer, 2020."},{"key":"e_1_3_2_1_90_1","first-page":"473","volume-title":"Proof of vote: A highperformance consensus protocol based on vote mechanism & consortium blockchain","author":"Li K.","year":"2017","unstructured":"K. Li , H. Li , H. Hou , K. Li , and Y. Chen , \u201c Proof of vote: A highperformance consensus protocol based on vote mechanism & consortium blockchain ,\u201d in 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 466\u2013 473 , IEEE , 2017. K. Li, H. Li, H. Hou, K. Li, and Y. Chen, \u201cProof of vote: A highperformance consensus protocol based on vote mechanism & consortium blockchain,\u201d in 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 466\u2013473, IEEE, 2017."},{"issue":"1","key":"e_1_3_2_1_91_1","first-page":"12","article-title":"Blockchain Consensuses Algorithms Based on Proof of Work: A Comparative Analysis","volume":"2","author":"Mohamed A. A.","year":"2020","unstructured":"A. A. Mohamed and A. O. Ibrahim , \u201c Blockchain Consensuses Algorithms Based on Proof of Work: A Comparative Analysis ,\u201d International Journal of Computing and Communication Networks , vol. 2 , no. 1 , pp. 12 \u2013 20 , 2020 . ISBN: 2664-9519. A. A. Mohamed and A. O. Ibrahim, \u201cBlockchain Consensuses Algorithms Based on Proof of Work: A Comparative Analysis,\u201d International Journal of Computing and Communication Networks, vol. 2, no. 1, pp. 12\u201320, 2020. ISBN: 2664-9519.","journal-title":"International Journal of Computing and Communication Networks"},{"key":"e_1_3_2_1_92_1","first-page":"540","volume-title":"Financial Cryptography and Data Security","author":"Karantias K.","year":"2020","unstructured":"K. Karantias , A. Kiayias , and D. Zindros , \u201c Proof-of-Burn ,\u201d in Financial Cryptography and Data Security (J. Bonneau and N. Heninger, eds.), Lecture Notes in Computer Science, (Cham), pp. 523\u2013 540 , Springer International Publishing , 2020 . K. Karantias, A. Kiayias, and D. Zindros, \u201cProof-of-Burn,\u201d in Financial Cryptography and Data Security (J. Bonneau and N. Heninger, eds.), Lecture Notes in Computer Science, (Cham), pp. 523\u2013540, Springer International Publishing, 2020."},{"key":"e_1_3_2_1_93_1","first-page":"51","volume-title":"Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain","author":"Ehmke C.","year":"2018","unstructured":"C. Ehmke , F. Wessling , and C. M. Friedrich , \u201c Proof-of-property: a lightweight and scalable blockchain protocol ,\u201d in Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain , pp. 48\u2013 51 , 2018 . C. Ehmke, F. Wessling, and C. M. Friedrich, \u201cProof-of-property: a lightweight and scalable blockchain protocol,\u201d in Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, pp. 48\u201351, 2018."},{"key":"e_1_3_2_1_94_1","first-page":"127","volume-title":"2019 International Conference\u201d Quality Management, Transport and Information Security, Information Technologies\u201d (IT&QM&IS)","author":"Andrey A.","year":"2019","unstructured":"A. Andrey and C. Petr , \u201c Review of Existing Consensus Algorithms Blockchain ,\u201d in 2019 International Conference\u201d Quality Management, Transport and Information Security, Information Technologies\u201d (IT&QM&IS) , pp. 124\u2013 127 , IEEE, 2019 . A. Andrey and C. Petr, \u201cReview of Existing Consensus Algorithms Blockchain,\u201d in 2019 International Conference\u201d Quality Management, Transport and Information Security, Information Technologies\u201d (IT&QM&IS), pp. 124\u2013127, IEEE, 2019."},{"key":"e_1_3_2_1_95_1","first-page":"507 2376","volume-title":"2019 15th International Wireless Communications Mobile Computing Conference (IWCMC)","author":"Riabi I.","year":"2019","unstructured":"I. Riabi , H. K. B. Ayed , and L. A. Saidane , \u201c A survey on Blockchain based access control for Internet of Things ,\u201d in 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC) , pp. 502\u2013 507 , June 2019 . ISSN: 2376 - 6506 . I. Riabi, H. K. B. Ayed, and L. A. Saidane, \u201cA survey on Blockchain based access control for Internet of Things,\u201d in 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC), pp. 502\u2013507, June 2019. ISSN: 2376-6506."}],"event":{"name":"ICISDM 2022: 2022 the 6th International Conference on Information System and Data Mining","acronym":"ICISDM 2022","location":"Silicon Valley CA USA"},"container-title":["2022 the 6th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546157.3546165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546157.3546165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:23Z","timestamp":1750186823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546157.3546165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,27]]},"references-count":95,"alternative-id":["10.1145\/3546157.3546165","10.1145\/3546157"],"URL":"https:\/\/doi.org\/10.1145\/3546157.3546165","relation":{},"subject":[],"published":{"date-parts":[[2022,5,27]]}}}