{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:03Z","timestamp":1750220163463,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3558819.3565158","type":"proceedings-article","created":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T01:37:33Z","timestamp":1666834653000},"page":"635-638","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain Stored Procedures and Optimization"],"prefix":"10.1145","author":[{"given":"Dongpo","family":"Liu","sequence":"first","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"given":"Zhiping","family":"Li","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"given":"Jian","family":"Guo","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"given":"Fanjie","family":"Nie","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.16383\/j.aas.2016.c160158"},{"issue":"11","key":"e_1_3_2_1_2_1","first-page":"11","article-title":"Overview of Blockchain Technology [J]","volume":"2","author":"Xin Shen","year":"2016","unstructured":"Shen Xin , Pei Qingqi , Liu Xuefeng . Overview of Blockchain Technology [J] . Journal of Network and Information Security , 2016 , 2 ( 11 ): 11 - 20 . Shen Xin, Pei Qingqi, Liu Xuefeng. Overview of Blockchain Technology [J]. Journal of Network and Information Security, 2016, 2(11): 11-20.","journal-title":"Journal of Network and Information Security"},{"issue":"04","key":"e_1_3_2_1_3_1","first-page":"742","article-title":"Research on data security sharing network system based on blockchain [J]","volume":"54","author":"Jiye Wang","year":"2017","unstructured":"Wang Jiye , Gao Lingchao , Dong Aiqiang , Guo Shaoyong , Chen Hui , Wei Xin . Research on data security sharing network system based on blockchain [J] . Computer Research and Development , 2017 , 54 ( 04 ): 742 - 749 . Wang Jiye, Gao Lingchao, Dong Aiqiang, Guo Shaoyong, Chen Hui, Wei Xin. Research on data security sharing network system based on blockchain [J]. Computer Research and Development, 2017, 54(04): 742-749.","journal-title":"Computer Research and Development"},{"issue":"01","key":"e_1_3_2_1_4_1","first-page":"150","article-title":"Problems and Methods [J]","volume":"29","author":"Weining Qian","year":"2018","unstructured":"Qian Weining , Shao Qifeng , Zhu Yanchao , Jin Cheqing , Zhou Aoying . Blockchain and Trusted Data Management : Problems and Methods [J] . Journal of Software , 2018 , 29 ( 01 ): 150 - 159 . DOI: 10.13328\/ j.cnki.jos.005434. Qian Weining, Shao Qifeng, Zhu Yanchao, Jin Cheqing, Zhou Aoying. Blockchain and Trusted Data Management: Problems and Methods [J]. Journal of Software, 2018, 29(01): 150-159. DOI: 10.13328\/ j.cnki.jos.005434.","journal-title":"Journal of Software"},{"issue":"04","key":"e_1_3_2_1_5_1","first-page":"525","article-title":"The Storage Capacity Scalable Model of Blockchain [J]","volume":"12","author":"Dayu Jia","year":"2018","unstructured":"Jia Dayu , Xin Junchang , Wang Zhiqiong , Guo Wei , Wang Guoren . The Storage Capacity Scalable Model of Blockchain [J] . Computer Science and Exploration , 2018 , 12 ( 04 ): 525 - 535 . Jia Dayu, Xin Junchang, Wang Zhiqiong, Guo Wei, Wang Guoren. The Storage Capacity Scalable Model of Blockchain [J]. Computer Science and Exploration, 2018, 12(04): 525-535.","journal-title":"Computer Science and Exploration"},{"issue":"24","key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Decentralized distributed storage model [J]","volume":"53","author":"Kun Hao","year":"2017","unstructured":"Hao Kun , Xin Junchang , Huang Da , Wang Guoren . Decentralized distributed storage model [J] . Computer Engineering and Applications , 2017 , 53 ( 24 ): 1 - 7 +22. Hao Kun, Xin Junchang, Huang Da, Wang Guoren. Decentralized distributed storage model [J]. Computer Engineering and Applications, 2017, 53(24): 1-7+22.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14022\/j.issn1674-6236.2020.07.016"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.26935\/d.cnki.gbjgu.2019.000175"},{"issue":"12","key":"e_1_3_2_1_9_1","first-page":"1090","article-title":"Security Research in Key Blockchain Technologies [J]","volume":"2","author":"Yan Zhu","year":"2016","unstructured":"Zhu Yan , Gan Guohua , Deng Di , Ji Feifei , Chen Aiping . Security Research in Key Blockchain Technologies [J] . Information Security Research , 2016 , 2 ( 12 ): 1090 - 1097 . Zhu Yan, Gan Guohua, Deng Di, Ji Feifei, Chen Aiping. Security Research in Key Blockchain Technologies [J]. Information Security Research, 2016, 2(12): 1090-1097.","journal-title":"Information Security Research"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.13652\/j.issn"},{"key":"e_1_3_2_1_11_1","volume-title":"Realization of data sharing platform based on blockchain + IPFS [D]","author":"Jizhang Wang","year":"2018","unstructured":"Wang Jizhang . Realization of data sharing platform based on blockchain + IPFS [D] . Zhejiang Technology and Business University , 2018 . Wang Jizhang. Realization of data sharing platform based on blockchain + IPFS [D]. Zhejiang Technology and Business University, 2018."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.19638\/j.issn1671"},{"issue":"01","key":"e_1_3_2_1_13_1","first-page":"28","article-title":"Distributed Data Management Technology in Blockchain System - Challenges and Prospects [J]","volume":"44","author":"Ge Yu","year":"2021","unstructured":"Yu Ge , Nie Tiezheng , Li Xiaohua , Zhang Yanfeng , Shen Derong , Bao Yubin . Distributed Data Management Technology in Blockchain System - Challenges and Prospects [J] . Journal of Computer Science , 2021 , 44 ( 01 ): 28 - 54 . Yu Ge, Nie Tiezheng, Li Xiaohua, Zhang Yanfeng, Shen Derong, Bao Yubin. Distributed Data Management Technology in Blockchain System - Challenges and Prospects [J]. Journal of Computer Science, 2021, 44(01): 28-54.","journal-title":"Journal of Computer Science"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001-3695.2018.07.0365"},{"issue":"02","key":"e_1_3_2_1_15_1","first-page":"179","article-title":"Realization of privacy information protection of food supply chain based on blockchain and IPFS technology [J]","volume":"37","author":"Xianli Fan","year":"2019","unstructured":"Fan Xianli , Fan Chunxiao , Wu Yuexin . Realization of privacy information protection of food supply chain based on blockchain and IPFS technology [J] . Journal of Applied Science , 2019 , 37 ( 02 ): 179 - 190 . Fan Xianli, Fan Chunxiao, Wu Yuexin. Realization of privacy information protection of food supply chain based on blockchain and IPFS technology [J]. Journal of Applied Science, 2019, 37(02): 179-190.","journal-title":"Journal of Applied Science"}],"event":{"name":"ICCSIE2022: 7th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE2022","location":"Brisbane QLD Australia"},"container-title":["Proceedings of the 7th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565158","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558819.3565158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:29Z","timestamp":1750186829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558819.3565158"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":15,"alternative-id":["10.1145\/3558819.3565158","10.1145\/3558819"],"URL":"https:\/\/doi.org\/10.1145\/3558819.3565158","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}