{"id":"https://openalex.org/W2963050166","doi":"https://doi.org/10.1109/noms.2018.8406324","title":"Trustworthy configuration management for networked devices using distributed ledgers","display_name":"Trustworthy configuration management for networked devices using distributed ledgers","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2963050166","doi":"https://doi.org/10.1109/noms.2018.8406324","mag":"2963050166"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2018.8406324","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://arxiv.org/pdf/1804.04798","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015625859","display_name":"Holger Kinkelin","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Holger Kinkelin","raw_affiliation_strings":["Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069877836","display_name":"Valentin Hauner","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Valentin Hauner","raw_affiliation_strings":["Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027667679","display_name":"Heiko Niedermayer","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Heiko Niedermayer","raw_affiliation_strings":["Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060144977","display_name":"Georg Carle","orcid":"https://orcid.org/0000-0002-2347-1839"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Georg Carle","raw_affiliation_strings":["Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Informatics Chair of Network Architectures and Services, Technische Universit\u00e4t M\u00fcnchen, B. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.556,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":6,"citation_normalized_percentile":{"value":0.800954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/configuration-management","display_name":"Configuration Management (ITSM)","score":0.5111399},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.4935845},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.48331928},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.43520096}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7017584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6827904},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6506715},{"id":"https://openalex.org/C78873551","wikidata":"https://www.wikidata.org/wiki/Q5160111","display_name":"Configuration Management (ITSM)","level":2,"score":0.5111399},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.4935845},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.48331928},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46063766},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.43520096},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.43372405},{"id":"https://openalex.org/C85345410","wikidata":"https://www.wikidata.org/wiki/Q851587","display_name":"Business process","level":3,"score":0.4295266},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4111633},{"id":"https://openalex.org/C174998907","wikidata":"https://www.wikidata.org/wiki/Q357662","display_name":"Work in process","level":2,"score":0.32325575},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.30426615},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.28956157},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.26766646},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1691952},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16180754},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.12886256},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2018.8406324","pdf_url":null,"source":{"id":"https://openalex.org/S4363605650","display_name":"NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.04798","pdf_url":"http://arxiv.org/pdf/1804.04798","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://arxiv.org/abs/1804.04798","pdf_url":"http://arxiv.org/pdf/1804.04798","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.57,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":3,"referenced_works":["https://openalex.org/W2105103777","https://openalex.org/W2277037180","https://openalex.org/W2560855557"],"related_works":["https://openalex.org/W4388228623","https://openalex.org/W4378878393","https://openalex.org/W4319430789","https://openalex.org/W4292223684","https://openalex.org/W4290996430","https://openalex.org/W3164449666","https://openalex.org/W3119045199","https://openalex.org/W2987468021","https://openalex.org/W2886165711","https://openalex.org/W2374659758"],"abstract_inverted_index":{"Numerous":[0],"IoT":[1],"applications,":[2],"like":[3,33,58],"building":[4],"automation":[5],"or":[6],"process":[7,98],"control":[8,78],"of":[9,87,179],"industrial":[10],"sites,":[11],"exist":[12],"today.":[13],"These":[14],"applications":[15],"inherently":[16],"have":[17],"a":[18,68,95,117,156,164],"strong":[19],"connection":[20],"to":[21,106,128,171,189,202],"the":[22,129,133,173],"physical":[23],"world.":[24],"Hence,":[25],"IT":[26,46],"security":[27],"threats":[28],"cannot":[29],"only":[30,50],"cause":[31],"problems":[32],"data":[34],"leaks":[35],"but":[36,55],"also":[37,56,187],"safety":[38],"issues":[39],"which":[40,154],"might":[41],"harm":[42],"people.":[43],"Attacks":[44],"on":[45,67],"systems":[47],"are":[48],"not":[49,200],"performed":[51],"by":[52,93,122],"outside":[53],"attackers":[54],"insiders":[57],"administrators.":[59],"For":[60,132],"this":[61,91,180],"reason,":[62],"we":[63,150,169],"present":[64],"ongoing":[65],"work":[66],"Byzantine":[69],"fault":[70],"tolerant":[71],"configuration":[72,96,118,135],"management":[73,97,136],"system":[74,146],"(CMS)":[75],"that":[76,99,168,183,198],"provides":[77,155],"over":[79],"administrators,":[80],"restrains":[81],"their":[82],"rights,":[83],"and":[84,142,163],"enforces":[85],"separation":[86],"concerns.":[88],"We":[89],"reach":[90],"goal":[92],"conducting":[94],"requires":[100],"multi-party":[101],"authorization":[102],"for":[103,160,192],"critical":[104],"configurations":[105,191],"prevent":[107],"individual":[108],"malicious":[109],"administrators":[110],"from":[111],"performing":[112],"undesired":[113],"actions.":[114],"Only":[115],"after":[116],"has":[119],"been":[120],"authorized":[121],"multiple":[123],"experts,":[124],"it":[125],"is":[126,147,182,186],"applied":[127],"targeted":[130],"devices.":[131],"whole":[134],"process,":[137],"our":[138,145,161,184],"CMS":[139,162,185],"guarantees":[140],"accountability":[141],"traceability.":[143],"Lastly,":[144],"tamper-resistant":[148],"as":[149],"leverage":[151],"Hyperledger":[152],"Fabric,":[153],"distributed":[157,166],"execution":[158],"environment":[159],"blockchain-based":[165],"ledger":[167],"use":[170],"store":[172],"configurations.":[174],"A":[175],"beneficial":[176],"side":[177],"effect":[178],"approach":[181],"suitable":[188],"manage":[190],"infrastructure":[193],"shared":[194],"across":[195],"different":[196],"organizations":[197],"do":[199],"need":[201],"trust":[203],"each":[204],"other.":[205]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2963050166","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2024-12-31T13:00:46.340727","created_date":"2019-07-30"}