{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T14:58:35Z","timestamp":1765378715716,"version":"3.46.0"},"reference-count":71,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2026,3,31]]},"abstract":"<jats:p>Amid the widespread use of blockchain technology, the escalating frequency of cyberattacks exploiting its inherent security challenges underscores the critical necessity for a robust and adaptable security risk assessment approach. The distinctive attributes and intricate internal structure of blockchain not only attract malicious actors but also elevate the risk of ill-informed architectural design decisions, potentially introducing security vulnerabilities. This study addresses this imperative by conducting a systematic literature review, classifying publications that elucidate secure architectural design approaches and categorising those that delineate methods for assessing security risks associated with blockchain and smart contracts. The findings reveal four prevalent approaches supporting secure architectural design\u2014decision models, taxonomies, design patterns and guidelines\u2014alongside contributions in blockchain risk assessment encompassing risk identification, analysis and evaluation methods. Furthermore, the study identifies unresolved architectural design challenges and proposes future research directions in this evolving landscape.<\/jats:p>","DOI":"10.1145\/3721140","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T06:59:46Z","timestamp":1741676386000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Architectural Approaches and Risk Assessment Methods for Blockchain Systems: A Review and Future Directions"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4553-4770","authenticated-orcid":false,"given":"Sabreen","family":"Ahmadjee","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, College of Computing, Umm Al-Qura University, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7014-1138","authenticated-orcid":false,"given":"Carlos","family":"Mera-G\u00f3mez","sequence":"additional","affiliation":[{"name":"Escuela Superior Politecnica del Litoral, Guayaquil, Ecuador and University of Birmingham, Birmingham, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1139-5795","authenticated-orcid":false,"given":"Rami","family":"Bahsoon","sequence":"additional","affiliation":[{"name":"University of Birmingham College of Engineering and Physical Sciences, Birmingham, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9754-6496","authenticated-orcid":false,"given":"Rajkumar","family":"Buyya","sequence":"additional","affiliation":[{"name":"Cloud Computing and Distributed Systems (CLOUDS) Lab, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,12,10]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Sabreen Ahmadjee Carlos Mera-G\u00f3mez Rami Bahsoon and Rick Kazman. 2022. A study on blockchain architecture design decisions and their security attacks and threats. ACM Transactions on Software Engineering and Methodology 31 2 Article 36e (April 2022) 45 pages.","DOI":"10.1145\/3502740"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.28945\/4837"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/OJITS.2021.3106863","article-title":"Cyber-security risk assessment framework for blockchains in smart mobility","volume":"2","author":"Al Mallah Ranwa","year":"2021","unstructured":"Ranwa Al Mallah, David L\u00f3pez, and Bilal Farooq. 2021. Cyber-security risk assessment framework for blockchains in smart mobility. IEEE Open Journal of Intelligent Transportation Systems 2 (2021), 294\u2013311.","journal-title":"IEEE Open Journal of Intelligent Transportation Systems"},{"key":"e_1_3_1_5_2","first-page":"1007","article-title":"A survey of attacks on Ethereum smart contracts","volume":"2016","author":"Atzei Nicola","year":"2016","unstructured":"Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2016. A survey of attacks on Ethereum smart contracts. IACR Cryptology ePrint Archive 2016 (2016), 1007.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_1_6_2","first-page":"164","volume-title":"Proceedings of the 6th International Conference on Principles of Security and Trust (POST \u201917), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS \u201917)","author":"Atzei Nicola","year":"2017","unstructured":"Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli. 2017. A survey of attacks on Ethereum smart contracts (SoK). In Proceedings of the 6th International Conference on Principles of Security and Trust (POST \u201917), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS \u201917). Springer, 164\u2013186."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00991-6"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114384"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108005"},{"key":"e_1_3_1_11_2","first-page":"704","volume-title":"Proceedings of the 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)","author":"Chauhan Neelam","year":"2022","unstructured":"Neelam Chauhan and Rajendra Kumar Dwivedi. 2022. A secure design of the healthcare IoT system using blockchain technology. In Proceedings of the 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 704\u2013709."},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3391195","article-title":"A survey on Ethereum systems security: Vulnerabilities, attacks, and defenses","volume":"53","author":"Chen Huashan","year":"2020","unstructured":"Huashan Chen, Marcus Pendleton, Laurent Njilla, and Shouhuai Xu. 2020. A survey on Ethereum systems security: Vulnerabilities, attacks, and defenses. ACM Computing Surveys 53, 3 (2020), 1\u201343.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_1_13_2","unstructured":"Deloitte. 2022. Risk Advisory. Retrieved from https:\/\/www2.deloitte.com\/uk\/en\/services\/risk-advisory.html?icid=top_risk-advisory"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2019.103409"},{"key":"e_1_3_1_15_2","unstructured":"Dennis de Vries Eamonn Maguire Kiran Nagaraj. 2018. Realizing Blockchain\u2019s Potential. Retrieved from https:\/\/assets.kpmg\/content\/dam\/kpmg\/xx\/pdf\/2018\/09\/realizing-blockchains-potential.pdf"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2956897"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117609"},{"key":"e_1_3_1_18_2","unstructured":"European Union Agency for Cybersecurity. 2017. Distributed Ledger Technology & Cybersecurity\u2014Improving Information Security in the Financial Sector. Retrieved from https:\/\/www.enisa.europa.eu\/publications\/blockchain-security"},{"key":"e_1_3_1_19_2","unstructured":"German Federal Office for Information Security: Bonn. 2019. Towards Secure Blockchains. Retrieved from https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Crypto\/Secure_Blockchain.html"},{"key":"e_1_3_1_20_2","unstructured":"American Council for Technology-Industry Advisory Council. 2021. Blockchain Playbook Online\u2014Beta. Retrieved from https:\/\/rb.gy\/g5ci8e"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2790-1"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"issue":"2","key":"e_1_3_1_23_2","first-page":"100067","article-title":"2022. A survey on blockchain technology and its security","volume":"3","author":"Guo Huaqun","year":"2022","unstructured":"Huaqun Guo and Xingjie Yu. 2022. A survey on blockchain technology and its security. Blockchain: Research and Applications 3, 2 (2022), 100067.","journal-title":"Blockchain: Research and Applications"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2060"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.101038"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3033665"},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1145\/3180155.3180235","volume-title":"Proceedings of the 40th International Conference on Software Engineering (ICSE \u201918)","author":"Huang Xin","year":"2018","unstructured":"Xin Huang, He Zhang, Xin Zhou, Muhammad Ali Babar, and Song Yang. 2018. Synthesizing qualitative research in software engineering: A critical review. In Proceedings of the 40th International Conference on Software Engineering (ICSE \u201918). ACM, New York, NY, 1207\u20131218."},{"key":"e_1_3_1_28_2","volume-title":"Information Technology\u2014Server Management Command Line Protocol","author":"IEC","year":"2011","unstructured":"IEC. 2011. Information Technology\u2014Server Management Command Line Protocol. ISO. Retrieved March 23, 2022 from https:\/\/www.iso.org\/standard\/53458.html"},{"key":"e_1_3_1_29_2","unstructured":"ISO\/IEC. 2018. ISO 31000:2018 Risk Management\u2014Guidelines. Retrieved from https:\/\/www.iso.org\/standard\/65694.html"},{"key":"e_1_3_1_30_2","unstructured":"ISO\/IEC. 2022. ISO\/IEC 27001:2022 Information Security Management Systems. Retrieved from https:\/\/www.iso.org\/standard\/27001"},{"key":"e_1_3_1_31_2","unstructured":"Staffs Keele. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical report Ver. 2.3 EBSE Technical Report. EBSE."},{"key":"e_1_3_1_32_2","first-page":"1","volume-title":"Proceedings of the 2018 International Conference on Platform Technology and Service (PlatCon)","author":"Kim Chang Yeon","year":"2018","unstructured":"Chang Yeon Kim and Kyungho Lee. 2018. Risk management to cryptocurrency exchange and investors guidelines to prevent potential threats. In Proceedings of the 2018 International Conference on Platform Technology and Service (PlatCon). IEEE, 1\u20136."},{"key":"e_1_3_1_33_2","unstructured":"Eamonn Maguire and Kiran Nagaraj. 2017. Securing the Chain. Retrieved from https:\/\/assets.kpmg\/content\/dam\/kpmg\/xx\/pdf\/2017\/05\/securing-the-chain.pdf"},{"issue":"12","key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"222","DOI":"10.3390\/fi12120222","article-title":"Comparing blockchain standards and recommendations","volume":"12","author":"K\u00f6nig Lukas","year":"2020","unstructured":"Lukas K\u00f6nig, Yuliia Korobeinikova, Simon Tjoa, and Peter Kieseberg. 2020. Comparing blockchain standards and recommendations. Future Internet 12, 12 (2020), 222.","journal-title":"Future Internet"},{"key":"e_1_3_1_35_2","unstructured":"KPMG. 2022. KPMG. Retrieved from https:\/\/home.kpmg\/xx\/en\/home.html"},{"key":"e_1_3_1_36_2","volume-title":"Writing Secure Code","author":"LeBlanc David","year":"2002","unstructured":"David LeBlanc and Michael Howard. 2002. Writing Secure Code. Pearson Education."},{"key":"e_1_3_1_37_2","unstructured":"Ledger. 2020. E-commerce and Marketing Data Breach. Retrieved from https:\/\/bit.ly\/2WI33EC"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038641"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3424771.3424802"},{"key":"e_1_3_1_41_2","first-page":"183","volume-title":"Proceedings of the 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC)","author":"Mackenzie Beverley","year":"2018","unstructured":"Beverley Mackenzie, Robert Ian Ferguson, and Xavier Bellekens. 2018. An assessment of blockchain consensus protocols for the Internet of Things. In Proceedings of the 2018 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC). IEEE, 183\u2013190."},{"key":"e_1_3_1_42_2","unstructured":"MITRE. 2018. MITRE ATT&CK. Retrieved from https:\/\/attack.mitre.org\/"},{"key":"e_1_3_1_43_2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/LADC.2018.00019","volume-title":"Proceedings of the 2018 8th Latin-American Symposium on Dependable Computing (LADC)","author":"Morganti Giacomo","year":"2018","unstructured":"Giacomo Morganti, Enrico Schiavone, and Andrea Bondavalli. 2018. Risk assessment of blockchain technology. In Proceedings of the 2018 8th Latin-American Symposium on Dependable Computing (LADC). IEEE, 87\u201396."},{"key":"e_1_3_1_44_2","unstructured":"Francis Jee Nadia Hewett Sumedha Deshmukh. 2020. Cybersecurity. Retrieved from https:\/\/widgets.weforum.org\/blockchain-toolkit\/cybersecurity"},{"key":"e_1_3_1_45_2","unstructured":"NIST. 2022. Standards & Measurements. Retrieved from https:\/\/www.nist.gov\/"},{"key":"e_1_3_1_46_2","unstructured":"Abhishek Biswas Prakash Santhana. 2017. Blockchain Risk Management Risk Functions Need to Play an Active Role in Shaping Blockchain Strategy. Retrieved from https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/financial-services\/us-fsi-blockchain-risk-management.pdf"},{"issue":"2","key":"e_1_3_1_47_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s12626-023-00139-x","article-title":"Review and comparison of US, EU, and UK regulations on cyber risk\/security of the current blockchain technologies: Viewpoint from 2023","volume":"17","author":"Radanliev Petar","year":"2023","unstructured":"Petar Radanliev. 2023. Review and comparison of US, EU, and UK regulations on cyber risk\/security of the current blockchain technologies: Viewpoint from 2023. The Review of Socionetwork Strategies 17, 2 (2023), 105\u2013129.","journal-title":"The Review of Socionetwork Strategies"},{"issue":"1","key":"e_1_3_1_48_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40854-023-00537-8","article-title":"The rise and fall of cryptocurrencies: Defining the economic and social values of blockchain technologies, assessing the opportunities, and defining the financial and cybersecurity risks of the Metaverse","volume":"10","author":"Radanliev Petar","year":"2024","unstructured":"Petar Radanliev. 2024. The rise and fall of cryptocurrencies: Defining the economic and social values of blockchain technologies, assessing the opportunities, and defining the financial and cybersecurity risks of the Metaverse. Financial Innovation 10, 1 (2024), 1.","journal-title":"Financial Innovation"},{"key":"e_1_3_1_49_2","first-page":"34","volume-title":"Proceedings of the 2020 the 3rd International Conference on Blockchain Technology and Applications","author":"Richard Harjanto Prabowo","year":"2020","unstructured":"Richard, Harjanto Prabowo, Agung Trisetyarso, and Benfano Soewito. 2020. Smart contract development model and the future of blockchain technology. In Proceedings of the 2020 the 3rd International Conference on Blockchain Technology and Applications, 34\u201339."},{"key":"e_1_3_1_50_2","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/ICSAW.2017.25","volume-title":"Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops (ICSAW)","author":"Santos Joanna C. S.","year":"2017","unstructured":"Joanna C. S. Santos, Katy Tarrit, and Mehdi Mirakhorli. 2017. A catalog of security architecture weaknesses. In Proceedings of the 2017 IEEE International Conference on Software Architecture Workshops (ICSAW). IEEE, 220\u2013223."},{"key":"e_1_3_1_51_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/SERVICES.2019.00018","volume-title":"Proceedings of the 2019 IEEE World Congress on Services (SERVICES)","volume":"2642","author":"Sargsyan Gohar","year":"2019","unstructured":"Gohar Sargsyan, Nicolas Castellon, Raymond Binnendijk, and Peter Cozijnsen. 2019. Blockchain security by design framework for trust and adoption in IoT environment. In Proceedings of the 2019 IEEE World Congress on Services (SERVICES), Vol. 2642. IEEE, 15\u201320."},{"key":"e_1_3_1_52_2","first-page":"102470","article-title":"Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity","author":"Schlatt Vincent","year":"2022","unstructured":"Vincent Schlatt, Tobias Guggenberger, Jonathan Schmid, and Nils Urbach. 2022. Attacking the trust machine: Developing an information systems research agenda for blockchain cybersecurity. International Journal of Information Management (2022), 102470.","journal-title":"International Journal of Information Management"},{"key":"e_1_3_1_53_2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1109\/SRDS.2018.00031","volume-title":"Proceedings of the 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","author":"Staderini Mirko","year":"2018","unstructured":"Mirko Staderini, Enrico Schiavone, and Andrea Bondavalli. 2018. A requirements-driven methodology for the proper selection and configuration of blockchains. In Proceedings of the 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS). IEEE, 201\u2013206."},{"key":"e_1_3_1_54_2","unstructured":"Stephanie. 2014. What is Cohen\u2019s Kappa Statistic? Statistics How To. Retrieved May 16 2022 from https:\/\/www.statisticshowto.com\/cohens-kappa-statistic\/"},{"key":"e_1_3_1_55_2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/ICSA47634.2020.00020","volume-title":"Proceedings of the 2020 IEEE International Conference on Software Architecture (ICSA)","author":"Tran Nguyen Khoi","year":"2020","unstructured":"Nguyen Khoi Tran and M. Ali Babar. 2020. Anatomy, concept, and design space of blockchain networks. In Proceedings of the 2020 IEEE International Conference on Software Architecture (ICSA). IEEE, 125\u2013134."},{"key":"e_1_3_1_56_2","first-page":"67","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918)","author":"Tsankov Petar","year":"2018","unstructured":"Petar Tsankov, Andrei Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian B\u00fcnzli, and Martin Vechev. 2018. Securify: Practical security analysis of smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918). ACM, New York, NY, 67\u201382."},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110891"},{"key":"e_1_3_1_58_2","first-page":"1410","volume-title":"Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Wan Zhiyuan","year":"2021","unstructured":"Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, and Xiaohu Yang. 2021. Smart contract security: A practitioners\u2019 perspective. In Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), 1410\u20131422."},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"e_1_3_1_60_2","first-page":"10","volume-title":"Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering (EASE \u201914)","author":"Wohlin Claes","year":"2014","unstructured":"Claes Wohlin. 2014. Guidelines for snowballing in systematic literature studies and a replication in software engineering. In Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering (EASE \u201914). ACM, New York, NY, Article 38, 10 pages."},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"e_1_3_1_62_2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/IWBOSE.2018.8327565","volume-title":"Proceedings of the 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE)","author":"Wohrer Maximilian","year":"2018","unstructured":"Maximilian Wohrer and Uwe Zdun. 2018. Smart contracts: Security patterns in the Ethereum ecosystem and solidity. In Proceedings of the 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE, 2\u20138."},{"key":"e_1_3_1_63_2","first-page":"45","volume-title":"Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT)","author":"W\u00fcst Karl","year":"2018","unstructured":"Karl W\u00fcst and Arthur Gervais. 2018. Do you need a blockchain? In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). IEEE, 45\u201354."},{"key":"e_1_3_1_64_2","first-page":"47","volume-title":"Proceedings of the 2021 IEEE 18th International Conference on Software Architecture (ICSA)","author":"Xu Xiwei","year":"2021","unstructured":"Xiwei Xu, HMN Dilum Bandara, Qinghua Lu, Ingo Weber, Len Bass, and Liming Zhu. 2021. A decision model for choosing patterns in blockchain-based applications. In Proceedings of the 2021 IEEE 18th International Conference on Software Architecture (ICSA). IEEE, 47\u201357."},{"key":"e_1_3_1_65_2","first-page":"182","volume-title":"Proceedings of the 2016 13th Working IEEE\/IFIP Conference on Software Architecture (WICSA)","author":"Xu Xiwei","year":"2016","unstructured":"Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen. 2016. The blockchain as a software connector. In Proceedings of the 2016 13th Working IEEE\/IFIP Conference on Software Architecture (WICSA). IEEE, 182\u2013191."},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3282308.3282312"},{"key":"e_1_3_1_67_2","first-page":"243","volume-title":"Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA)","author":"Xu Xiwei","year":"2017","unstructured":"Xiwei Xu, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. 2017. A taxonomy of blockchain-based systems for architecture design. In Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA). IEEE, 243\u2013252."},{"key":"e_1_3_1_68_2","doi-asserted-by":"crossref","unstructured":"Dylan Yaga Peter Mell Nik Roby and Karen Scarfone. 2019. Blockchain technology overview. arXiv:1906.11078. Retrieved from https:\/\/arxiv.org\/abs\/1906.11078","DOI":"10.6028\/NIST.IR.8202"},{"issue":"3","key":"e_1_3_1_69_2","article-title":"Architecting Internet of Things systems with blockchain: A catalog of tactics","volume":"30","author":"Y\u00e1nez Wendy","year":"2021","unstructured":"Wendy Y\u00e1nez, Rami Bahsoon, Yuqun Zhang, and Rick Kazman. 2021. Architecting Internet of Things systems with blockchain: A catalog of tactics. ACM Transactions on Software Engineering and Methodology 30, 3, Article 35 (April 2021), 46 pages.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106397"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2020.2990103"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3721140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T14:55:43Z","timestamp":1765378543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,10]]},"references-count":71,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,3,31]]}},"alternative-id":["10.1145\/3721140"],"URL":"https:\/\/doi.org\/10.1145\/3721140","relation":{},"ISSN":["2769-6480","2769-6480"],"issn-type":[{"type":"print","value":"2769-6480"},{"type":"electronic","value":"2769-6480"}],"subject":[],"published":{"date-parts":[[2025,12,10]]},"assertion":[{"value":"2024-03-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}