{"id":"https://openalex.org/W4220978049","doi":"https://doi.org/10.1002/cpe.6934","title":"Securing the access control policies to the Internet of Things resources through permissioned blockchain","display_name":"Securing the access control policies to the Internet of Things resources through permissioned blockchain","publication_year":2022,"publication_date":"2022-03-12","ids":{"openalex":"https://openalex.org/W4220978049","doi":"https://doi.org/10.1002/cpe.6934"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.6934","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.6934","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.6934","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102714079","display_name":"Alessandra Rizzardi","orcid":"https://orcid.org/0000-0003-4765-5365"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessandra Rizzardi","raw_affiliation_strings":["Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001461899","display_name":"Sabrina Sicari","orcid":"https://orcid.org/0000-0002-6824-8075"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Sabrina Sicari","raw_affiliation_strings":["Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy","institution_ids":["https://openalex.org/I115752224"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023093130","display_name":"Daniele Miorandi","orcid":"https://orcid.org/0000-0002-3089-977X"},"institutions":[{"id":"https://openalex.org/I4210107393","display_name":"U-Hopper (Italy)","ror":"https://ror.org/01r3ms014","country_code":"IT","type":"company","lineage":["https://openalex.org/I4210107393"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Daniele Miorandi","raw_affiliation_strings":["U-Hopper, Trento, Italy"],"affiliations":[{"raw_affiliation_string":"U-Hopper, Trento, Italy","institution_ids":["https://openalex.org/I4210107393"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033025864","display_name":"Alberto Coen\u2010Porisini","orcid":"https://orcid.org/0000-0002-3788-8926"},"institutions":[{"id":"https://openalex.org/I115752224","display_name":"University of Insubria","ror":"https://ror.org/00s409261","country_code":"IT","type":"education","lineage":["https://openalex.org/I115752224"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alberto Coen\u2010Porisini","raw_affiliation_strings":["Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Scienze Teoriche e Applicate Universit\u00e0 degli Studi dell'Insubria Varese Italy","institution_ids":["https://openalex.org/I115752224"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001461899"],"corresponding_institution_ids":["https://openalex.org/I115752224"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"apc_paid":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"fwci":8.984,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":22,"citation_normalized_percentile":{"value":0.99998,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"34","issue":"15","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9686,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86103916},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7726173},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.69956154},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6977823},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6933296},{"id":"https://openalex.org/C169468491","wikidata":"https://www.wikidata.org/wiki/Q146923","display_name":"Middleware (distributed applications)","level":2,"score":0.58943486},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.49717572},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.45474386},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26663023},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11584011}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.6934","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.6934","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"http://hdl.handle.net/11383/2130204","pdf_url":"https://irinsubria.uninsubria.it/bitstream/11383/2130204/2/Securing%20the%20access%20control%20policies%20to%20the%20Internet%20of%20Things%20through%20permissioned%20blockchain.pdf","source":{"id":"https://openalex.org/S4377196351","display_name":"IrInSubria (University of Insubria)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115752224","host_organization_name":"University of Insubria","host_organization_lineage":["https://openalex.org/I115752224"],"host_organization_lineage_names":["University of Insubria"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1002/cpe.6934","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.6934","source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":36,"referenced_works":["https://openalex.org/W117100801","https://openalex.org/W2046229586","https://openalex.org/W2082031503","https://openalex.org/W2104927807","https://openalex.org/W2114579022","https://openalex.org/W2114623221","https://openalex.org/W2115958335","https://openalex.org/W2122442215","https://openalex.org/W2158298409","https://openalex.org/W2277678732","https://openalex.org/W2392113277","https://openalex.org/W2417363734","https://openalex.org/W2486460265","https://openalex.org/W2536325433","https://openalex.org/W2548327609","https://openalex.org/W2583031215","https://openalex.org/W2588585573","https://openalex.org/W2606467208","https://openalex.org/W2611626082","https://openalex.org/W2624953603","https://openalex.org/W2736954495","https://openalex.org/W2753914774","https://openalex.org/W2768696376","https://openalex.org/W2793346081","https://openalex.org/W2793976436","https://openalex.org/W2803371618","https://openalex.org/W2805930283","https://openalex.org/W2885100636","https://openalex.org/W2897450989","https://openalex.org/W2910815950","https://openalex.org/W2963434081","https://openalex.org/W2964129362","https://openalex.org/W3099251797","https://openalex.org/W3101098008","https://openalex.org/W3119536597","https://openalex.org/W3197014427"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W4210406818","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525"],"abstract_inverted_index":{"Abstract":[0],"Security":[1],"and":[2,27,43,48,132,151,153,167,178,183],"privacy":[3],"of":[4,14,50,86,98,119,157,161,169],"information":[5],"transmitted":[6],"among":[7],"the":[8,64,68,84,93,96,116,124,138,165,170,184],"devices":[9],"involved":[10],"in":[11,21],"an":[12,58,103],"Internet":[13],"Things":[15],"(IoT)":[16],"network":[17],"represent":[18],"relevant":[19,145],"issues":[20],"IoT":[22,32,69,108,142,179],"contexts.":[23],"Guaranteeing":[24],"effective":[25],"control":[26,54],"supervising":[28],"access":[29,53,120],"permissions":[30],"to":[31,40,114,121,136],"applications":[33,177],"is":[34,129],"a":[35,80,91,99,130,190],"complex":[36],"task,":[37],"mainly":[38],"due":[39],"resources'":[41],"heterogeneity":[42],"scalability":[44],"requirements.":[45],"The":[46,127,159,181],"design":[47],"development":[49],"highly":[51],"customizable":[52],"policies,":[55],"along":[56],"with":[57,74],"efficient":[59],"mechanism":[60],"for":[61],"ensuring":[62],"that":[63],"rules":[65],"applied":[66],"by":[67,123,141],"platform":[70],"are":[71,187],"not":[72,106],"tampered":[73],"or":[75],"violated,":[76],"will":[77,163],"undoubtedly":[78],"have":[79],"significant":[81],"impact":[82],"on":[83],"diffusion":[85],"IoT\u2010based":[87],"solutions.":[88],"In":[89],"such":[90,148],"direction,":[92],"article":[94],"proposes":[95],"integration":[97],"permissioned":[100],"blockchain":[101,162],"within":[102],"honest\u2010but\u2010curious":[104],"(i.e.,":[105],"trusted)":[107],"distributed":[109,171],"middleware":[110],"layer,":[111],"which":[112],"aims":[113],"guarantee":[115],"correct":[117],"management":[118],"resources":[122],"interested":[125],"parties.":[126],"result":[128],"robust":[131],"lightweight":[133],"system,":[134,172],"able":[135],"manage":[137],"data":[139],"produced":[140],"devices,":[143],"support":[144],"security":[146],"features,":[147],"as":[149],"integrity":[150],"confidentiality,":[152],"resist":[154],"different":[155],"kinds":[156],"attacks.":[158],"use":[160],"ensure":[164],"tamper\u2010resistance":[166],"synchronization":[168],"where":[173],"various":[174],"stakeholders":[175],"own":[176],"platforms.":[180],"methodology":[182],"proposed":[185],"architecture":[186],"validated":[188],"employing":[189],"test\u2010bed.":[191]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4220978049","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":5}],"updated_date":"2024-12-10T18:16:11.897478","created_date":"2022-04-03"}