{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T08:27:46Z","timestamp":1723364866107},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3286978.3287022","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System"],"prefix":"10.1145","author":[{"given":"Ronghua","family":"Xu","sequence":"first","affiliation":[{"name":"Dept. of Electrical and Computer Engineering, Binghamton University, SUNY Binghamton, New York"}]},{"given":"Xuheng","family":"Lin","sequence":"additional","affiliation":[{"name":"Dept. of Electrical and Computer Engineering, Binghamton University, SUNY Binghamton, New York"}]},{"given":"Qi","family":"Dong","sequence":"additional","affiliation":[{"name":"Dept. of Electrical and Computer Engineering, Binghamton University, SUNY Binghamton, New York"}]},{"given":"Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"Dept. of Electrical and Computer Engineering, Binghamton University, SUNY Binghamton, New York"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. TimeBanks USA. http:\/\/timebanks.org\/. accessed September 3 2018. {n. d.}. TimeBanks USA. http:\/\/timebanks.org\/. accessed September 3 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557061"},{"key":"e_1_3_2_1_3_1","volume-title":"Time banking: An idea whose time has come. Yes Magazine","author":"Cahn Edgar","year":"2011","unstructured":"Edgar Cahn . 2011. Time banking: An idea whose time has come. Yes Magazine ( 2011 ). Edgar Cahn. 2011. Time banking: An idea whose time has come. Yes Magazine (2011)."},{"key":"e_1_3_2_1_4_1","unstructured":"Edgar S Cahn. 2000. No more throw-away people: The co-production imperative. Edgar Cahn. Edgar S Cahn. 2000. No more throw-away people: The co-production imperative. Edgar Cahn."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38706-7_11"},{"key":"e_1_3_2_1_6_1","unstructured":"Martin Chorzempa Paul Triolo Samm Sacks etal 2018. China\u00e2\u0102Źs Social Credit System: A Mark of Progress or a Threat to Privacy? Technical Report. Martin Chorzempa Paul Triolo Samm Sacks et al. 2018. China\u00e2\u0102Źs Social Credit System: A Mark of Progress or a Threat to Privacy? Technical Report."},{"key":"e_1_3_2_1_7_1","volume-title":"You Will Lose Your Job to a Robot\u00e2\u0102\u0164and Sooner Than You Think. https:\/\/www.motherjones.com\/politics\/2017\/10\/you-will-lose-your-job-to-a-robot-and-sooner-than-you-think\/","author":"Drum Kevin","year":"2017","unstructured":"Kevin Drum . 2017. You Will Lose Your Job to a Robot\u00e2\u0102\u0164and Sooner Than You Think. https:\/\/www.motherjones.com\/politics\/2017\/10\/you-will-lose-your-job-to-a-robot-and-sooner-than-you-think\/ ( 2017 ). Kevin Drum. 2017. You Will Lose Your Job to a Robot\u00e2\u0102\u0164and Sooner Than You Think. https:\/\/www.motherjones.com\/politics\/2017\/10\/you-will-lose-your-job-to-a-robot-and-sooner-than-you-think\/ (2017)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.004"},{"key":"e_1_3_2_1_9_1","volume-title":"Community currency activities, community attachment, and quality of life: A case study of the crooked river alliance of TimeBanks","author":"Kwon Mizzo","year":"2017","unstructured":"Mizzo Kwon , Chanam Lee , Yu Xiao , and William A McIntosh . 2017. Community currency activities, community attachment, and quality of life: A case study of the crooked river alliance of TimeBanks . Time & Society ( 2017 ), 0961463X17716737. Mizzo Kwon, Chanam Lee, Yu Xiao, and William A McIntosh. 2017. Community currency activities, community attachment, and quality of life: A case study of the crooked river alliance of TimeBanks. Time & Society (2017), 0961463X17716737."},{"key":"e_1_3_2_1_10_1","volume-title":"The Human Promise of the AI Revolution. The Wall Street Journal September 14","author":"Lee Kai-Fu","year":"2018","unstructured":"Kai-Fu Lee . 2018. The Human Promise of the AI Revolution. The Wall Street Journal September 14 ( 2018 ). Kai-Fu Lee. 2018. The Human Promise of the AI Revolution. The Wall Street Journal September 14 (2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure. Policy & Internet","author":"Liang Fan","year":"2018","unstructured":"Fan Liang , Vishnupriya Das , Nadiya Kostyuk , and Muzammil M Hussain . 2018. Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure. Policy & Internet ( 2018 ). Fan Liang, Vishnupriya Das, Nadiya Kostyuk, and Muzammil M Hussain. 2018. Constructing a Data-Driven Society: China's Social Credit System as a State Surveillance Infrastructure. Policy & Internet (2018)."},{"key":"e_1_3_2_1_12_1","unstructured":"Loretta J Mester etal 1997. What's the point of credit scoring? Business review 3 Sep\/Oct (1997) 3--16. Loretta J Mester et al. 1997. What's the point of credit scoring? Business review 3 Sep\/Oct (1997) 3--16."},{"key":"e_1_3_2_1_13_1","volume-title":"Seyed Yahya Nikouei, and Yu Chen","author":"Nagothu Deeraj","year":"2018","unstructured":"Deeraj Nagothu , Ronghua Xu , Seyed Yahya Nikouei, and Yu Chen . 2018 . A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology . arXiv preprint arXiv:1807.07487 (2018). Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, and Yu Chen. 2018. A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology. arXiv preprint arXiv:1807.07487 (2018)."},{"key":"e_1_3_2_1_14_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_15_1","volume-title":"Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. arXiv preprint arXiv:1807.06179","author":"Nikouei Seyed Yahya","year":"2018","unstructured":"Seyed Yahya Nikouei , Ronghua Xu , Deeraj Nagothu , Yu Chen , Alexander Aved , and Erik Blasch . 2018. Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. arXiv preprint arXiv:1807.06179 ( 2018 ). Seyed Yahya Nikouei, Ronghua Xu, Deeraj Nagothu, Yu Chen, Alexander Aved, and Erik Blasch. 2018. Real-Time Index Authentication for Event-Oriented Surveillance Video Query using Blockchain. arXiv preprint arXiv:1807.06179 (2018)."},{"key":"e_1_3_2_1_16_1","volume-title":"CNN investigation: 103 Uber drivers accused of sexual assault or abuse. https:\/\/money.cnn.com\/2018\/04\/30\/technology\/uber-driver-sexual-assault\/index.html","author":"O'Brien Sara Ashley","year":"2018","unstructured":"Sara Ashley O'Brien , Nelli Black , Curt Devine , and Drew Griffin . 2018. CNN investigation: 103 Uber drivers accused of sexual assault or abuse. https:\/\/money.cnn.com\/2018\/04\/30\/technology\/uber-driver-sexual-assault\/index.html ( 2018 ). Sara Ashley O'Brien, Nelli Black, Curt Devine, and Drew Griffin. 2018. CNN investigation: 103 Uber drivers accused of sexual assault or abuse. https:\/\/money.cnn.com\/2018\/04\/30\/technology\/uber-driver-sexual-assault\/index.html (2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"How a Fake Vaccine Scandal in China Is Causing a Crisis of Confidence. https:\/\/www.globalcitizen.org\/en\/content\/china-fake-vaccine-rabies-scandal-dpt\/","author":"Selby Daniele","year":"2018","unstructured":"Daniele Selby . 2018. How a Fake Vaccine Scandal in China Is Causing a Crisis of Confidence. https:\/\/www.globalcitizen.org\/en\/content\/china-fake-vaccine-rabies-scandal-dpt\/ ( 2018 ). Daniele Selby. 2018. How a Fake Vaccine Scandal in China Is Causing a Crisis of Confidence. https:\/\/www.globalcitizen.org\/en\/content\/china-fake-vaccine-rabies-scandal-dpt\/ (2018)."},{"key":"e_1_3_2_1_18_1","volume-title":"Blockchain: Blueprint for a new economy. \"O'Reilly Media","author":"Swan Melanie","year":"2015","unstructured":"Melanie Swan . 2015 . Blockchain: Blueprint for a new economy. \"O'Reilly Media , Inc .\". Melanie Swan. 2015. Blockchain: Blueprint for a new economy. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_19_1","volume-title":"Formalizing and securing relationships on public networks. First Monday 2, 9","author":"Szabo Nick","year":"1997","unstructured":"Nick Szabo . 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 ( 1997 ). Nick Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (1997)."},{"key":"e_1_3_2_1_20_1","unstructured":"Yue Wang and Robert Olsen. 2018. China's Didi Chuxing Faces Intense Pressure Amid Public Anger Over Second Passenger Death. https:\/\/www.forbes.com\/sites\/ywang\/2018\/09\/01\/chinas-didi-chuxing-faces-intense-pressure-amid-public-anger-over-second-passenger-death\/#6d4bf787a6d0 (2018). Yue Wang and Robert Olsen. 2018. China's Didi Chuxing Faces Intense Pressure Amid Public Anger Over Second Passenger Death. https:\/\/www.forbes.com\/sites\/ywang\/2018\/09\/01\/chinas-didi-chuxing-faces-intense-pressure-amid-public-anger-over-second-passenger-death\/#6d4bf787a6d0 (2018)."},{"key":"e_1_3_2_1_21_1","volume-title":"BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In the IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain. IEEE.","author":"Xu Ronghua","year":"2018","unstructured":"Ronghua Xu ., Yu Chen , Erik Blasch , and Genshe Chen . 2018 . BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In the IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain. IEEE. Ronghua Xu., Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs. In the IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain. IEEE."},{"key":"e_1_3_2_1_22_1","volume-title":"BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers","author":"Xu Ronghua","year":"2018","unstructured":"Ronghua Xu , Yu Chen , Erik Blasch , and Genshe Chen . 2018. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018 , 7(3), 39; Access on: http:\/\/www.mdpi.com\/2073-431X\/7\/3\/39 (2018). Ronghua Xu, Yu Chen, Erik Blasch, and Genshe Chen. 2018. BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 2018, 7(3), 39; Access on: http:\/\/www.mdpi.com\/2073-431X\/7\/3\/39 (2018)."},{"key":"e_1_3_2_1_23_1","volume-title":"Assessing timebanking use and coordination: implications for service exchange tools. Information Technology & People","author":"Yuan Chien Wen","year":"2018","unstructured":"Chien Wen Yuan , Benjamin V Hanrahan , and John M Carroll . 2018. Assessing timebanking use and coordination: implications for service exchange tools. Information Technology & People ( 2018 ). Chien Wen Yuan, Benjamin V Hanrahan, and John M Carroll. 2018. Assessing timebanking use and coordination: implications for service exchange tools. Information Technology & People (2018)."}],"event":{"name":"MobiQuitous '18: Computing, Networking and Services","location":"New York NY USA","acronym":"MobiQuitous '18","sponsor":["EAI The European Alliance for Innovation"]},"container-title":["Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286978.3287022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T22:33:23Z","timestamp":1673562803000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3287022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":23,"alternative-id":["10.1145\/3286978.3287022","10.1145\/3286978"],"URL":"https:\/\/doi.org\/10.1145\/3286978.3287022","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}