{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T11:09:08Z","timestamp":1762254548526,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fundamental Research Grant Scheme for Research Acculturation of Early Career Researchers (FRGS-RACER)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,2,23]]},"DOI":"10.1145\/3587828.3587868","type":"proceedings-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T15:40:57Z","timestamp":1687275657000},"page":"267-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Secure Framework for Vehicle Maintenance Service using Blockchain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1095-640X","authenticated-orcid":false,"given":"Nur Shuhadah","family":"Ab Razak","sequence":"first","affiliation":[{"name":"International Islamic University Malaysia, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4309-7477","authenticated-orcid":false,"given":"Hafizah","family":"Mansor","sequence":"additional","affiliation":[{"name":"Department of Computer Science, International Islamic University Malaysia, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2790-948X","authenticated-orcid":false,"given":"Shaila","family":"Sharmin","sequence":"additional","affiliation":[{"name":"International Islamic University Malaysia, Malaysia"}]}],"member":"320","published-online":{"date-parts":[[2023,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"13","volume-title":"The 49th Annual IEEE International Carnahan Conference on Security Technology","author":"Lin C. Y.","year":"2016","unstructured":"Lin , C. Y. , Chang , M. C. , Chiu , H. C. and Shyu , K. H ..: Secure logging framework integrating with cloud database . In: The 49th Annual IEEE International Carnahan Conference on Security Technology , pp. 13 - 17 . IEEE ( 2016 ). Lin, C. Y., Chang, M. C., Chiu, H. C. and Shyu, K. H..: Secure logging framework integrating with cloud database. In: The 49th Annual IEEE International Carnahan Conference on Security Technology, pp. 13-17. IEEE (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"Robert N. Charette (2022 Jun 07). How Software is Eating the Car. https:\/\/spectrum.ieee.org\/software-eating-car\/  Robert N. Charette (2022 Jun 07). How Software is Eating the Car. https:\/\/spectrum.ieee.org\/software-eating-car\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221958"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2887101"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800137"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895302"},{"key":"e_1_3_2_1_7_1","volume-title":"9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","author":"Kei Leo B.","year":"2018","unstructured":"Kei Leo B. , Thomas H. , Christian P. , Antoine D. , Elyes Ben H. , : \u201c Digitizing, Securing and Sharing Vehicles Life-cycle Over a Consortium Blockchain: Lessons Learned ,\u201d: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) , 2018 . Kei Leo B., Thomas H., Christian P., Antoine D., Elyes Ben H., : \u201cDigitizing, Securing and Sharing Vehicles Life-cycle Over a Consortium Blockchain: Lessons Learned,\u201d: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018."},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"A tamper-proof audit and control system for the doctor in the loop","author":"Kieseberg P.","year":"2016","unstructured":"Kieseberg , P. , Malle , B. , Fr\u00fchwirt , P. , Weippl , E. and Holzinger , A ., \" A tamper-proof audit and control system for the doctor in the loop ,\" Brain Informatics , pp. 1 - 11 , 2016 . Kieseberg, P., Malle, B., Fr\u00fchwirt, P., Weippl, E. and Holzinger, A., \"A tamper-proof audit and control system for the doctor in the loop,\" Brain Informatics, pp. 1-11, 2016.","journal-title":"Brain Informatics"},{"issue":"1732","key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Privacy preservation in resource-constrained IoT devices using blockchain\u2014a survey","volume":"10","author":"Iftikhar Z.","year":"2021","unstructured":"Iftikhar , Z. , Javed , Y. , Abbas Zaidi , S. Y. , Shah , M. A. , Khan , Z. I. , Mussadiq , S. and Abassi , K .: Privacy preservation in resource-constrained IoT devices using blockchain\u2014a survey . Electronics 10 ( 1732 ), 1 - 26 ( 2021 ). Iftikhar, Z., Javed, Y., Abbas Zaidi, S. Y., Shah, M. A., Khan, Z. I., Mussadiq, S. and Abassi, K.: Privacy preservation in resource-constrained IoT devices using blockchain\u2014a survey. Electronics 10(1732), 1-26 (2021).","journal-title":"Electronics"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_1_11_1","first-page":"205190","article-title":"Blockcha","author":"Bharati M.","year":"2020","unstructured":"Bharati , M. , Shri , M. L. , Kadry , S. , Lim , S. : Blockcha in Based Cloud Computing: Architecture and Research Challenges. IEEE Access (8) , 205190 - 205205 ( 2020 ). Bharati, M., Shri, M. L., Kadry, S., Lim, S.: Blockchain Based Cloud Computing: Architecture and Research Challenges. IEEE Access (8), 205190-205205 (2020).","journal-title":"Based Cloud Computing: Architecture and Research Challenges. IEEE Access (8)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900162"},{"issue":"10","key":"e_1_3_2_1_13_1","first-page":"1","article-title":"Technological Aspects of Blockcha","volume":"11","author":"Elagin V.","year":"2020","unstructured":"Elagin , V. , Spirkina , A. , Buinevich , M. , Vladyko , A. : Technological Aspects of Blockcha in Application for Vehicle-to-network. Information , vol. 11 , no. 10 , p. 1 - 19 , 2020 . Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological Aspects of Blockchain Application for Vehicle-to-network. Information, vol. 11, no. 10, p.1-19, 2020.","journal-title":"Application for Vehicle-to-network. Information"},{"key":"e_1_3_2_1_14_1","unstructured":"Kathleen E. Wegrzyn Eugenia Wang (2021 August 19). Types of Blockchain: Public Private or Something in Between. https:\/\/www.foley.com\/en\/insights\/publications\/2021\/08\/types-of-blockchain-public-private-between\/  Kathleen E. Wegrzyn Eugenia Wang (2021 August 19). Types of Blockchain: Public Private or Something in Between. https:\/\/www.foley.com\/en\/insights\/publications\/2021\/08\/types-of-blockchain-public-private-between\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Adam M. (2022 August 16). 11 Best Automotive Scan Tools (for Home and Professional Use). https:\/\/cartreatments.com\/bsest-automotive-scan-toosl\/  Adam M. (2022 August 16). 11 Best Automotive Scan Tools (for Home and Professional Use). https:\/\/cartreatments.com\/bsest-automotive-scan-toosl\/"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"183","article-title":"Car & Motor Vehicles Sales and Maintenance","volume":"6","author":"Rahul K.","year":"2022","unstructured":"Rahul K. , Ateet P. , Shyam K. S., R S. Kadam : \u201c Car & Motor Vehicles Sales and Maintenance \u201d . IRE Journals. Vol. 6 , Issue 1 , p. 183 - 186 , 2022 . Rahul K., Ateet P., Shyam K. S., R S. Kadam: \u201cCar & Motor Vehicles Sales and Maintenance\u201d. IRE Journals. Vol. 6, Issue 1, p. 183-186, 2022.","journal-title":". IRE Journals."},{"key":"e_1_3_2_1_17_1","volume-title":"Forensics Science International: Digital Investigation Vol 36","author":"Kevin Klaus G. B.","year":"2021","unstructured":"Kevin Klaus G. B. , Christopher C. , Hans-Joachim H. : \u201c A generalized approach to automotive forensics \u201d. Forensics Science International: Digital Investigation Vol 36 , 2021 Kevin Klaus G. B., Christopher C., Hans-Joachim H.: \u201cA generalized approach to automotive forensics\u201d. Forensics Science International: Digital Investigation Vol 36, 2021"},{"key":"e_1_3_2_1_18_1","volume-title":"Symp. Digit. Forensic Secur. ISDFS","author":"Siddiqi M.","year":"2017","unstructured":"Siddiqi , M. , All , S. T. , and Sivaraman , V ., \" Secure lightweight context-driven data logging for body worn sensing devices,\" in 2017 5th Int . Symp. Digit. Forensic Secur. ISDFS , 2017 . Siddiqi, M., All, S. T., and Sivaraman, V., \"Secure lightweight context-driven data logging for body worn sensing devices,\" in 2017 5th Int. Symp. Digit. Forensic Secur. ISDFS, 2017."}],"event":{"name":"ICSCA 2023: 2023 12th International Conference on Software and Computer Applications","acronym":"ICSCA 2023","location":"Kuantan Malaysia"},"container-title":["Proceedings of the 2023 12th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587868","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587828.3587868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:28Z","timestamp":1750183708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587828.3587868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":18,"alternative-id":["10.1145\/3587828.3587868","10.1145\/3587828"],"URL":"https:\/\/doi.org\/10.1145\/3587828.3587868","relation":{},"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"2023-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}