{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:55:32Z","timestamp":1772823332329,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,23]],"date-time":"2023-07-23T00:00:00Z","timestamp":1690070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["2114989"],"award-info":[{"award-number":["2114989"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,23]]},"DOI":"10.1145\/3569951.3597566","type":"proceedings-article","created":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T15:34:03Z","timestamp":1694360043000},"page":"302-305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Comparative Analysis Between SciTokens, Verifiable Credentials, and Smart Contracts: Novel Approaches for Authentication and Secure Access to Scientific Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6316-5334","authenticated-orcid":false,"given":"Md Jobair","family":"Hossain Faruk","sequence":"first","affiliation":[{"name":"College of Computing and Software Engineering, Kennesaw State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8908-6927","authenticated-orcid":false,"given":"Bilash","family":"Saha","sequence":"additional","affiliation":[{"name":"Kennesaw State University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0139-0640","authenticated-orcid":false,"given":"Jim","family":"Basney","sequence":"additional","affiliation":[{"name":"National Center for Supercomputing Applications, University of Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Smart Contract Designs on Blockchain Applications. In 2020 IEEE Symposium on Computers and Communications (ISCC). 1\u20134. https:\/\/doi.org\/10","author":"Abuhashim Alkhansaa","year":"2020","unstructured":"Alkhansaa Abuhashim and Chiu C. Tan . 2020 . Smart Contract Designs on Blockchain Applications. In 2020 IEEE Symposium on Computers and Communications (ISCC). 1\u20134. https:\/\/doi.org\/10 .1109\/ISCC50000. 2020 .9219622 10.1109\/ISCC50000.2020.9219622 Alkhansaa Abuhashim and Chiu C. Tan. 2020. Smart Contract Designs on Blockchain Applications. In 2020 IEEE Symposium on Computers and Communications (ISCC). 1\u20134. https:\/\/doi.org\/10.1109\/ISCC50000.2020.9219622"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC48123.2019.9022766"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","unstructured":"Information Association and Jaydip Sen. 2015. Security and Privacy Issues in Cloud Computing. 1585-1630. https: \/\/doi.org\/10.4018\/978-1-4666-6539-2.ch074 10.4018\/978-1-4666-6539-2.ch074"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Information Association and Jaydip Sen. 2015. Security and Privacy Issues in Cloud Computing. 1585-1630. https: \/\/doi.org\/10.4018\/978-1-4666-6539-2.ch074","DOI":"10.4018\/978-1-4666-6539-2.ch074"},{"key":"e_1_3_2_1_4_1","unstructured":"EBSI\n  : European Blockchain. [n. d.]. EBSI Verifiable Credentials Playbook. EBSI: European Blockchain ([n. d.]). https: \/\/ec.europa.eu\/digital-building-blocks\/wikis\/display\/EBSIDOC\/EBSI+Verifiable+Credentials+Playbook  EBSI: European Blockchain. [n. d.]. EBSI Verifiable Credentials Playbook. EBSI: European Blockchain ([n. d.]). https: \/\/ec.europa.eu\/digital-building-blocks\/wikis\/display\/EBSIDOC\/EBSI+Verifiable+Credentials+Playbook"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95669-5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.001.1900020"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE Globecom Workshops. https:\/\/doi.org\/10","author":"Chen Meijuan","year":"2020","unstructured":"Meijuan Chen , Chen Tan , Xiaorong Zhu , and X. Zhang . 2020. A Blockchain-Based Authentication and Service Provision Scheme for Internet of Things . In IEEE Globecom Workshops. https:\/\/doi.org\/10 .1109\/GCWkshps50303. 2020 .9367565 10.1109\/GCWkshps50303.2020.9367565 Meijuan Chen, Chen Tan, Xiaorong Zhu, and X. Zhang. 2020. A Blockchain-Based Authentication and Service Provision Scheme for Internet of Things. In IEEE Globecom Workshops. https:\/\/doi.org\/10.1109\/GCWkshps50303.2020.9367565"},{"key":"e_1_3_2_1_8_1","unstructured":"Cybersecurity and Infrastructure Security Agency. 2022. Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. https:\/\/www.cisa.gov\/news-events\/ cybersecurity-advisories\/aa22-047a  Cybersecurity and Infrastructure Security Agency. 2022. Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology. https:\/\/www.cisa.gov\/news-events\/ cybersecurity-advisories\/aa22-047a"},{"key":"#cr-split#-e_1_3_2_1_9_1.1","doi-asserted-by":"crossref","unstructured":"Md Jobair Hossain Faruk Santhiya Subramanian Hossain Shahriar Maria Valero Xia Li and Masrura Tasnim. 2022. Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. In 2022 IEEE\/ACIS 20th International Conference on Software Engineering Research Management and Applications (SERA). 120-127. https:\/\/doi.org\/10.1109\/SERA54885.2022.9806817 10.1109\/SERA54885.2022.9806817","DOI":"10.1109\/SERA54885.2022.9806817"},{"key":"#cr-split#-e_1_3_2_1_9_1.2","doi-asserted-by":"crossref","unstructured":"Md Jobair Hossain Faruk Santhiya Subramanian Hossain Shahriar Maria Valero Xia Li and Masrura Tasnim. 2022. Software Engineering Process and Methodology in Blockchain-Oriented Software Development: A Systematic Study. In 2022 IEEE\/ACIS 20th International Conference on Software Engineering Research Management and Applications (SERA). 120-127. https:\/\/doi.org\/10.1109\/SERA54885.2022.9806817","DOI":"10.1109\/SERA54885.2022.9806817"},{"key":"e_1_3_2_1_10_1","volume-title":"Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. In 2021 IEEE International Conference on Digital Health (ICDH). 299\u2013308","author":"Hossain Faruk Md Jobair","year":"2021","unstructured":"Md Jobair Hossain Faruk , Hossain Shahriar , Maria Valero , Sweta Sneha , Sheikh I. Ahamed , and Mohammad Rahman . 2021 . Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. In 2021 IEEE International Conference on Digital Health (ICDH). 299\u2013308 . https:\/\/doi.org\/10.1109\/ICDH52753.2021.00054 10.1109\/ICDH52753.2021.00054 Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Sweta Sneha, Sheikh I. Ahamed, and Mohammad Rahman. 2021. Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring. In 2021 IEEE International Conference on Digital Health (ICDH). 299\u2013308. https:\/\/doi.org\/10.1109\/ICDH52753.2021.00054"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461144"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN50884.2021.9333857"},{"key":"e_1_3_2_1_13_1","volume-title":"Research on Authentication and Key Negotiation Based on Smart Water Environment. In 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA)","volume":"2","author":"Lin Lu","year":"2021","unstructured":"Lu Lin and Baocheng Wang . 2021 . Research on Authentication and Key Negotiation Based on Smart Water Environment. In 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) , Vol. 2 . 268\u2013272. https:\/\/doi.org\/10.1109\/ICIBA52610.2021.9688062 10.1109\/ICIBA52610.2021.9688062 Lu Lin and Baocheng Wang. 2021. Research on Authentication and Key Negotiation Based on Smart Water Environment. In 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), Vol. 2. 268\u2013272. https:\/\/doi.org\/10.1109\/ICIBA52610.2021.9688062"},{"key":"e_1_3_2_1_14_1","volume-title":"An Overview of Smart Contract and Use Cases in Blockchain Technology. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20134. https:\/\/doi.org\/10","author":"Mohanta Bhabendu Kumar","year":"2018","unstructured":"Bhabendu Kumar Mohanta , Soumyashree S Panda , and Debasish Jena . 2018 . An Overview of Smart Contract and Use Cases in Blockchain Technology. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20134. https:\/\/doi.org\/10 .1109\/ICCCNT.2018.8494045 10.1109\/ICCCNT.2018.8494045 Bhabendu Kumar Mohanta, Soumyashree S Panda, and Debasish Jena. 2018. An Overview of Smart Contract and Use Cases in Blockchain Technology. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 1\u20134. https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494045"},{"key":"#cr-split#-e_1_3_2_1_15_1.1","doi-asserted-by":"crossref","unstructured":"Jaideep Kaur Mudhar Sheetal Kalra and Jyoteesh Malhotra. 2020. An Efficient Blockchain Based Authentication Scheme to Secure Fog Enabled IoT Devices. In 2020 Indo - Taiwan 2nd International Conference on Computing Analytics and Networks (Indo-Taiwan ICAN). 75-80. https:\/\/doi.org\/10.1109\/Indo-TaiwanICAN48429.2020.9181356 10.1109\/Indo-TaiwanICAN48429.2020.9181356","DOI":"10.1109\/Indo-TaiwanICAN48429.2020.9181356"},{"key":"#cr-split#-e_1_3_2_1_15_1.2","doi-asserted-by":"crossref","unstructured":"Jaideep Kaur Mudhar Sheetal Kalra and Jyoteesh Malhotra. 2020. An Efficient Blockchain Based Authentication Scheme to Secure Fog Enabled IoT Devices. In 2020 Indo - Taiwan 2nd International Conference on Computing Analytics and Networks (Indo-Taiwan ICAN). 75-80. https:\/\/doi.org\/10.1109\/Indo-TaiwanICAN48429.2020.9181356","DOI":"10.1109\/Indo-TaiwanICAN48429.2020.9181356"},{"key":"e_1_3_2_1_16_1","volume-title":"Blockchain-Based Verifiable Credential Sharing with Selective Disclosure. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 959\u2013966","author":"Mukta Rahma","year":"2020","unstructured":"Rahma Mukta , James Martens , Hye-young Paik, Qinghua Lu , and Salil S. Kanhere . 2020 . Blockchain-Based Verifiable Credential Sharing with Selective Disclosure. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 959\u2013966 . https:\/\/doi.org\/10.1109\/TrustCom50675. 2020 .00128 10.1109\/TrustCom50675.2020.00128 Rahma Mukta, James Martens, Hye-young Paik, Qinghua Lu, and Salil S. Kanhere. 2020. Blockchain-Based Verifiable Credential Sharing with Selective Disclosure. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 959\u2013966. https:\/\/doi.org\/10.1109\/TrustCom50675.2020.00128"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"Office of Scientific and Technical Information. 2021. Cybersecurity and Privacy for Scientific Computing Ecosystems. https:\/\/doi.org\/10.2172\/1843573 10.2172\/1843573","DOI":"10.2172\/1843573"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"Office of Scientific and Technical Information. 2021. Cybersecurity and Privacy for Scientific Computing Ecosystems. https:\/\/doi.org\/10.2172\/1843573","DOI":"10.2172\/1843573"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441970"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050676"},{"key":"e_1_3_2_1_20_1","volume-title":"Verifiable Credentials Data Model v1.1. W3C","author":"C.","year":"2022","unstructured":"W3 C. 2022. Verifiable Credentials Data Model v1.1. W3C ( 2022 ). https:\/\/www.w3.org\/TR\/vc-data-model\/ W3C. 2022. Verifiable Credentials Data Model v1.1. W3C (2022). https:\/\/www.w3.org\/TR\/vc-data-model\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219104.3219135"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332186.3333258"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3148303"}],"event":{"name":"PEARC '23: Practice and Experience in Advanced Research Computing","location":"Portland OR USA","acronym":"PEARC '23","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SIGHPC ACM Special Interest Group on High Performance Computing, Special Interest Group on High Performance Computing"]},"container-title":["Practice and Experience in Advanced Research Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569951.3597566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569951.3597566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:52Z","timestamp":1750183672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569951.3597566"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,23]]},"references-count":27,"alternative-id":["10.1145\/3569951.3597566","10.1145\/3569951"],"URL":"https:\/\/doi.org\/10.1145\/3569951.3597566","relation":{},"subject":[],"published":{"date-parts":[[2023,7,23]]},"assertion":[{"value":"2023-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}