{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T10:30:15Z","timestamp":1757586615523,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:00:00Z","timestamp":1695254400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,21]]},"DOI":"10.23919\/softcom58365.2023.10271602","type":"proceedings-article","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T18:50:19Z","timestamp":1696963819000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Blockchain-based Identity and Access Management in a Community Cloud"],"prefix":"10.23919","author":[{"given":"Kouadio Rodrigue","family":"N\u2019Goran","sequence":"first","affiliation":[{"name":"Lab-STICC IMT-Atlantique,Brest,France"}]},{"given":"Jean-Louis","family":"Tetchueng","sequence":"additional","affiliation":[{"name":"Lab-STICC Universit&#x00E9; Rennes 1,Rennes,France"}]},{"given":"Yvon","family":"Kermarrec","sequence":"additional","affiliation":[{"name":"Lab-STICC IMT-Atlantique,Brest,France"}]},{"given":"Agui\u00e9 Pac\u00f4me Bertrand","family":"Brou","sequence":"additional","affiliation":[{"name":"LASTIC ESATIC,Abidjan,C&#x00F4;te d&#x2019;Ivoire"}]},{"given":"Olivier","family":"Asseu","sequence":"additional","affiliation":[{"name":"LASTIC INP-HB,Yamoussoukro,C&#x00F4;te d&#x2019;Ivoire"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref12","first-page":"1","article-title":"A note on anonymous credentials using BLS signatures","author":"rondelet","year":"2020","journal-title":"arXiv 2006 05201"},{"key":"ref23","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Decentralized Bus Rev"},{"key":"ref15","first-page":"37","article-title":"Smart Contract Federated Identity Management without Third Party Authentication Services","author":"mell","year":"2019","journal-title":"LNI Gesellschaft f&#x00FC;r Informatik"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2021.93007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS53615.2022.9668529"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4236\/eng.2022.1411036"},{"key":"ref10","first-page":"1","article-title":"A Study of Blockchain Oracles","author":"beniiche","year":"2020","journal-title":"arXiv 2004 07140"},{"key":"ref21","first-page":"8","article-title":"The Laws of Identity","author":"cameron","year":"2005","journal-title":"Microsoft Corporation"},{"journal-title":"La gestion des identit&#x00E9;s num&#x00E9;riques","year":"2015","author":"laurent","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0759-8.ch003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2020.2970737"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2019.00051"},{"key":"ref19","first-page":"170","article-title":"Cloud identity management-A critical analysis","volume":"2239","author":"abayomi-zannu","year":"2019","journal-title":"International MultiConference of Engineers and Computer Scientists"},{"key":"ref18","article-title":"A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records","volume":"9","author":"manoj","year":"2022","journal-title":"Cogent Engineering"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon55845.2022.9932120"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85867-4_8"},{"journal-title":"Verifiable credentials data model v1 1","year":"0","key":"ref4"},{"journal-title":"Decentralized Identifiers (DIDs) v1 0","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102731"},{"key":"ref5","first-page":"45","article-title":"Identity management on blockchain &#x2013; Privacy and security aspects","volume":"21","author":"panait","year":"2020","journal-title":"Proceedings of the Romanian Academy"}],"event":{"name":"2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","start":{"date-parts":[[2023,9,21]]},"location":"Split, Croatia","end":{"date-parts":[[2023,9,23]]}},"container-title":["2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10271384\/10271386\/10271602.pdf?arnumber=10271602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T18:57:08Z","timestamp":1699297028000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10271602\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,21]]},"references-count":23,"URL":"https:\/\/doi.org\/10.23919\/softcom58365.2023.10271602","relation":{},"subject":[],"published":{"date-parts":[[2023,9,21]]}}}