{"id":"https://openalex.org/W3176774009","doi":"https://doi.org/10.1109/icbc51069.2021.9461117","title":"SAMOS: a Smart Contract Access Management over Opaque and Substructural Types","display_name":"SAMOS: a Smart Contract Access Management over Opaque and Substructural Types","publication_year":2021,"publication_date":"2021-05-03","ids":{"openalex":"https://openalex.org/W3176774009","doi":"https://doi.org/10.1109/icbc51069.2021.9461117","mag":"3176774009"},"language":"en","primary_location":{"id":"doi:10.1109/icbc51069.2021.9461117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc51069.2021.9461117","pdf_url":null,"source":{"id":"https://openalex.org/S4363608612","display_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013463606","display_name":"Markus Knecht","orcid":null},"institutions":[{"id":"https://openalex.org/I2972652528","display_name":"FHNW University of Applied Sciences and Arts","ror":"https://ror.org/04mq2g308","country_code":"CH","type":"education","lineage":["https://openalex.org/I2972652528"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Markus Knecht","raw_affiliation_strings":["University of Z&#x00FC;rich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH\u20148050","Institute for Mobile and Distributed Systems IMVS, University of Applied Sciences Northwestern Switzerland, Windisch, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Z&#x00FC;rich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH\u20148050","institution_ids":[]},{"raw_affiliation_string":"Institute for Mobile and Distributed Systems IMVS, University of Applied Sciences Northwestern Switzerland, Windisch, Switzerland","institution_ids":["https://openalex.org/I2972652528"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033030418","display_name":"Burkhard Stiller","orcid":"https://orcid.org/0000-0002-7461-7463"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Burkhard Stiller","raw_affiliation_strings":["University of Z&#x00FC;rich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH\u20148050"],"affiliations":[{"raw_affiliation_string":"University of Z&#x00FC;rich UZH,Communication Systems Group CSG,Department of Informatics IfI,Z&#x00FC;rich,Switzerland,CH\u20148050","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013463606"],"corresponding_institution_ids":["https://openalex.org/I2972652528"],"apc_list":null,"apc_paid":null,"fwci":0.5672,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.60399774,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permission","display_name":"Permission","score":0.9500817060470581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7549000978469849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6209846138954163},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6191357970237732},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4532904624938965},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.41553381085395813},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33182644844055176},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.20402666926383972}],"concepts":[{"id":"https://openalex.org/C2779089604","wikidata":"https://www.wikidata.org/wiki/Q7169333","display_name":"Permission","level":2,"score":0.9500817060470581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7549000978469849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6209846138954163},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6191357970237732},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4532904624938965},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.41553381085395813},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33182644844055176},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20402666926383972},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icbc51069.2021.9461117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icbc51069.2021.9461117","pdf_url":null,"source":{"id":"https://openalex.org/S4363608612","display_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1969344535","https://openalex.org/W2056073317","https://openalex.org/W2065076704","https://openalex.org/W2095881341","https://openalex.org/W2965753846","https://openalex.org/W2990836972","https://openalex.org/W4234461277","https://openalex.org/W4248175462"],"related_works":["https://openalex.org/W2373984226","https://openalex.org/W2349137515","https://openalex.org/W2130613250","https://openalex.org/W2361337511","https://openalex.org/W1513229083","https://openalex.org/W2358774039","https://openalex.org/W2353815999","https://openalex.org/W4390864104","https://openalex.org/W2364540050","https://openalex.org/W2124367090"],"abstract_inverted_index":{"Public":[0],"Blockchains":[1],"(BC)":[2],"in":[3,15,68],"support":[4],"of":[5,32,41,109,178],"Smart":[6],"Contracts":[7],"(SC),":[8],"e.g.,":[9],"Ethereum,":[10],"enable":[11],"everyone":[12],"to":[13,19,47,58,78,85,96,106,128,152],"coordinate":[14],"a":[16,39,72,97,135],"decentralized":[17],"model":[18],"manage":[20,38],"scarce":[21],"and":[22,37,52,64,75,118,148],"valuable":[23],"resources,e.g.,":[24],"cryptocurrencies.":[25],"Such":[26],"BCs":[27,70],"allow":[28,89],"for":[29,138],"the":[30,101,107],"building":[31],"SCs":[33],"that":[34,88,162],"own":[35],"resources":[36,51],"set":[40],"permissions":[42,80,140],"describing":[43],"who":[44],"is":[45],"allowed":[46],"interact":[48],"with":[49,142],"these":[50],"what":[53],"actions":[54],"they":[55],"can":[56,166],"apply":[57],"them.":[59],"However,":[60],"Programming":[61],"Languages":[62],"(PL)":[63],"run-time":[65],"systems":[66],"used":[67],"current":[69],"lack":[71],"secure,":[73],"flexible,":[74],"straightforward":[76],"way":[77],"implement":[79],"within":[81],"their":[82],"SCs,":[83],"leading":[84],"erroneous":[86],"implementations":[87],"unauthorized":[90],"access.":[91],"The":[92,157],"best-known":[93],"incident":[94],"related":[95],"permission":[98,155,168],"problem":[99],"was":[100],"\"Parity":[102],"Hack\",":[103],"which":[104],"led":[105],"\"loss\"":[108],"tokens,":[110],"valued":[111],"at":[112],"approximately":[113],"31":[114],"M":[115],"USD.A":[116],"better":[117],"secure":[119],"SC":[120,144],"access":[121],"control":[122],"concept":[123,137],"provides":[124],"an":[125,175],"improved":[126],"path":[127],"managing":[129],"permissions.":[130],"Thus,":[131],"this":[132],"paper":[133],"presents":[134],"novel":[136],"handling":[139],"compatible":[141],"functional":[143],"languages":[145],"leveraging":[146],"opaque":[147,158],"substructural":[149],"data":[150,159,172],"types":[151,160,173],"provide":[153],"capability-based":[154],"management.":[156],"enforce":[161],"only":[163],"designated":[164],"functions":[165],"create":[167],"carrying":[169],"capabilities.":[170,179],"Substructural":[171],"prevent":[174],"unpermitted":[176],"duplication":[177]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
