{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:57:41Z","timestamp":1767859061906,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cyber Security Research Centre Limited"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3594556.3594608","type":"proceedings-article","created":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T21:34:46Z","timestamp":1694554486000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0047-556X","authenticated-orcid":false,"given":"Fokke","family":"Heikamp","sequence":"first","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4691-8330","authenticated-orcid":false,"given":"Lei","family":"Pan","sequence":"additional","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6850","authenticated-orcid":false,"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"Centre for Cyber Resilience and Trust (CREST), Deakin University, Australia and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8714-4626","authenticated-orcid":false,"given":"Rolando","family":"Trujillo-Rasua","sequence":"additional","affiliation":[{"name":"Universitat Rovira i Virgili, Spain and Cyber Security Cooperative Research Centre, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-6709","authenticated-orcid":false,"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[{"name":"University of New South Wales, Australia and Cyber Security Cooperative Research Centre, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989305"},{"key":"e_1_3_2_1_2_1","unstructured":"Denis Avrilionis and Thomas Hardjono. 2022. From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3. arxiv:2205.04899\u00a0[cs]  Denis Avrilionis and Thomas Hardjono. 2022. From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3. arxiv:2205.04899\u00a0[cs]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2768022"},{"key":"e_1_3_2_1_4_1","unstructured":"Jaewook Byun and Jin Mitsugi. 2022. EPC Tag Data Standard (TDS).  Jaewook Byun and Jin Mitsugi. 2022. EPC Tag Data Standard (TDS)."},{"key":"e_1_3_2_1_5_1","volume-title":"Operational Semantics and Verification of Security Protocols","author":"Cremers Cas","unstructured":"Cas Cremers and Sjouke Mauw . 2012. Operational Semantics and Verification of Security Protocols . Springer , Heidelberg [u.a.]. Cas Cremers and Sjouke Mauw. 2012. Operational Semantics and Verification of Security Protocols. Springer, Heidelberg [u.a.]."},{"key":"e_1_3_2_1_6_1","volume-title":"Formal to Practical Security, V\u00e9ronique Cortier, Claude Kirchner, Mitsuhiro Okada, and Hideki Sakurada (Eds.). Vol.\u00a05458","author":"Cremers Cas","year":"2002","unstructured":"Cas J.\u00a0F. Cremers , Pascal Lafourcade , and Philippe Nadeau . 2009. Comparing State Spaces in Automatic Security Protocol Analysis . In Formal to Practical Security, V\u00e9ronique Cortier, Claude Kirchner, Mitsuhiro Okada, and Hideki Sakurada (Eds.). Vol.\u00a05458 . Springer Berlin Heidelberg , Berlin, Heidelberg , 70\u201394. https:\/\/doi.org\/10.1007\/978-3-642-0 2002 -5_5 10.1007\/978-3-642-02002-5_5 Cas J.\u00a0F. Cremers, Pascal Lafourcade, and Philippe Nadeau. 2009. Comparing State Spaces in Automatic Security Protocol Analysis. In Formal to Practical Security, V\u00e9ronique Cortier, Claude Kirchner, Mitsuhiro Okada, and Hideki Sakurada (Eds.). Vol.\u00a05458. Springer Berlin Heidelberg, Berlin, Heidelberg, 70\u201394. https:\/\/doi.org\/10.1007\/978-3-642-02002-5_5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102554"},{"key":"e_1_3_2_1_9_1","unstructured":"Everledger. 2023. Main Home - Everledger. https:\/\/everledger.io\/.  Everledger. 2023. Main Home - Everledger. https:\/\/everledger.io\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2021.11.166"},{"key":"e_1_3_2_1_11_1","unstructured":"GS1 AISBL. 2017. GS1 Global Traceability Standard.  GS1 AISBL. 2017. GS1 Global Traceability Standard."},{"key":"e_1_3_2_1_12_1","volume-title":"Smart Contract-Based Approach for Efficient Shipment Management. Computers & Industrial Engineering 136 (Oct","author":"Hasan Haya","year":"2019","unstructured":"Haya Hasan , Esra AlHadhrami , Alia AlDhaheri , Khaled Salah , and Raja Jayaraman . 2019. Smart Contract-Based Approach for Efficient Shipment Management. Computers & Industrial Engineering 136 (Oct . 2019 ), 149\u2013159. https:\/\/doi.org\/10.1016\/j.cie.2019.07.022 10.1016\/j.cie.2019.07.022 Haya Hasan, Esra AlHadhrami, Alia AlDhaheri, Khaled Salah, and Raja Jayaraman. 2019. Smart Contract-Based Approach for Efficient Shipment Management. Computers & Industrial Engineering 136 (Oct. 2019), 149\u2013159. https:\/\/doi.org\/10.1016\/j.cie.2019.07.022"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3025775"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 2022 International Conference on Network and System Security","author":"Heikamp Fokke","unstructured":"Fokke Heikamp , Lei Pan , Rolando Trujillo-Rasua , Sushmita Ruj , and Robin Doss . 2022. Forward Traceability for Product Authenticity Using Ethereum Smart Contracts . In Proceedings of the 2022 International Conference on Network and System Security , Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, and Suryadipta Majumdar (Eds.). Springer Nature Switzerland , Cham , 514\u2013523. Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, and Robin Doss. 2022. Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. In Proceedings of the 2022 International Conference on Network and System Security, Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, and Suryadipta Majumdar (Eds.). Springer Nature Switzerland, Cham, 514\u2013523."},{"key":"e_1_3_2_1_15_1","volume-title":"A Survey on Provenance: What for? What Form? What From?The VLDB Journal \u2014 The International Journal on Very Large Data Bases 26, 6 (Dec","author":"Herschel Melanie","year":"2017","unstructured":"Melanie Herschel , Ralf Diestelk\u00e4mper , and Houssem Ben\u00a0Lahmar . 2017. A Survey on Provenance: What for? What Form? What From?The VLDB Journal \u2014 The International Journal on Very Large Data Bases 26, 6 (Dec . 2017 ), 881\u2013906. https:\/\/doi.org\/10.1007\/s00778-017-0486-1 10.1007\/s00778-017-0486-1 Melanie Herschel, Ralf Diestelk\u00e4mper, and Houssem Ben\u00a0Lahmar. 2017. A Survey on Provenance: What for? What Form? What From?The VLDB Journal \u2014 The International Journal on Very Large Data Bases 26, 6 (Dec. 2017), 881\u2013906. https:\/\/doi.org\/10.1007\/s00778-017-0486-1"},{"key":"e_1_3_2_1_16_1","volume-title":"Integrating Blockchain into Supply Chain Safeguarded by PUF-enabled RFID. Internet of Things 18 (May","author":"Islam Md\u00a0Didarul","year":"2022","unstructured":"Md\u00a0Didarul Islam , Haoting Shen , and Shahriar Badsha . 2022. Integrating Blockchain into Supply Chain Safeguarded by PUF-enabled RFID. Internet of Things 18 (May 2022 ), 100505. https:\/\/doi.org\/10.1016\/j.iot.2022.100505 10.1016\/j.iot.2022.100505 Md\u00a0Didarul Islam, Haoting Shen, and Shahriar Badsha. 2022. Integrating Blockchain into Supply Chain Safeguarded by PUF-enabled RFID. Internet of Things 18 (May 2022), 100505. https:\/\/doi.org\/10.1016\/j.iot.2022.100505"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2021.04.013"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts","volume":"2021","author":"Lou Menghui","year":"2021","unstructured":"Menghui Lou , Xiaolei Dong , Zhenfu Cao , and Jiachen Shen . 2021 . SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts . Security and Communication Networks 2021 (2021), 1 \u2013 18 . Menghui Lou, Xiaolei Dong, Zhenfu Cao, and Jiachen Shen. 2021. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Security and Communication Networks 2021 (2021), 1\u201318.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795075"},{"key":"e_1_3_2_1_21_1","unstructured":"Tom\u00a0De Nies. 2013. Constraints of the PROV Data Model. https:\/\/www.w3.org\/TR\/2013\/REC-prov-constraints-20130430\/.  Tom\u00a0De Nies. 2013. Constraints of the PROV Data Model. https:\/\/www.w3.org\/TR\/2013\/REC-prov-constraints-20130430\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tifs.2012.10.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2021.3136055"},{"key":"e_1_3_2_1_24_1","volume-title":"AgriOnBlock: Secured Data Harvesting for Agriculture Sector Using Blockchain Technology","author":"Patel Hiren","year":"2023","unstructured":"Hiren Patel and Bela Shrimali . 2023. AgriOnBlock: Secured Data Harvesting for Agriculture Sector Using Blockchain Technology . ICT Express ( July 2023 ), S2405959521000862. https:\/\/doi.org\/10.1016\/j.icte.2021.07.003 10.1016\/j.icte.2021.07.003 Hiren Patel and Bela Shrimali. 2023. AgriOnBlock: Secured Data Harvesting for Agriculture Sector Using Blockchain Technology. ICT Express (July 2023), S2405959521000862. https:\/\/doi.org\/10.1016\/j.icte.2021.07.003"},{"key":"e_1_3_2_1_25_1","volume-title":"Are Distributed Ledger Technologies the Panacea for Food Traceability?Global Food Security 20 (March","author":"Pearson Simon","year":"2019","unstructured":"Simon Pearson , David May , Georgios Leontidis , Mark Swainson , Steve Brewer , Luc Bidaut , Jeremy\u00a0 G. Frey , Gerard Parr , Roger Maull , and Andrea Zisman . 2019. Are Distributed Ledger Technologies the Panacea for Food Traceability?Global Food Security 20 (March 2019 ), 145\u2013149. https:\/\/doi.org\/10.1016\/j.gfs.2019.02.002 10.1016\/j.gfs.2019.02.002 Simon Pearson, David May, Georgios Leontidis, Mark Swainson, Steve Brewer, Luc Bidaut, Jeremy\u00a0G. Frey, Gerard Parr, Roger Maull, and Andrea Zisman. 2019. Are Distributed Ledger Technologies the Panacea for Food Traceability?Global Food Security 20 (March 2019), 145\u2013149. https:\/\/doi.org\/10.1016\/j.gfs.2019.02.002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103116"},{"key":"e_1_3_2_1_27_1","volume-title":"LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Computers & Security","author":"Shah W","year":"2021","unstructured":"Syed\u00a0 W Shah , Naeem\u00a0 F Syed , Arash Shaghaghi , Adnan Anwar , Zubair Baig , and Robin Doss . 2021 . LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Computers & Security (2021), 102351. Syed\u00a0W Shah, Naeem\u00a0F Syed, Arash Shaghaghi, Adnan Anwar, Zubair Baig, and Robin Doss. 2021. LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Computers & Security (2021), 102351."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106895"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102536"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2720760"},{"key":"e_1_3_2_1_31_1","unstructured":"TradeLens. 2023. TradeLens | Supply Chain Data and Docs. https:\/\/www.tradelens.com\/.  TradeLens. 2023. TradeLens | Supply Chain Data and Docs. https:\/\/www.tradelens.com\/."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpharm.2021.120235"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.01.007"}],"event":{"name":"ASIA CCS '23: ACM Asia Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3594556.3594608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:07Z","timestamp":1750183747000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3594556.3594608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":33,"alternative-id":["10.1145\/3594556.3594608","10.1145\/3594556"],"URL":"https:\/\/doi.org\/10.1145\/3594556.3594608","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}