{"id":"https://openalex.org/W4408339280","doi":"https://doi.org/10.1145/3721140","title":"Security Architectural Approaches and Risk Assessment Methods for Blockchain Systems: A Review and Future Directions","display_name":"Security Architectural Approaches and Risk Assessment Methods for Blockchain Systems: A Review and Future Directions","publication_year":2025,"publication_date":"2025-03-11","ids":{"openalex":"https://openalex.org/W4408339280","doi":"https://doi.org/10.1145/3721140"},"language":"en","primary_location":{"id":"doi:10.1145/3721140","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721140","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3721140","source":{"id":"https://openalex.org/S4387283489","display_name":"Distributed Ledger Technologies Research and Practice","issn_l":"2769-6480","issn":["2769-6480"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Distributed Ledger Technologies: Research and Practice","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3721140","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073681741","display_name":"Sabreen Ahmadjee","orcid":"https://orcid.org/0000-0003-4553-4770"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Sabreen Ahmadjee","raw_affiliation_strings":["Department of Cybersecurity, College of Computing, Umm Al-Qura University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, College of Computing, Umm Al-Qura University, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046897546","display_name":"Carlos Mera\u2010G\u00f3mez","orcid":"https://orcid.org/0000-0002-7014-1138"},"institutions":[{"id":"https://openalex.org/I2135383","display_name":"Escuela Superior Politecnica del Litoral","ror":"https://ror.org/04qenc566","country_code":"EC","type":"education","lineage":["https://openalex.org/I2135383"]},{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["EC","GB"],"is_corresponding":false,"raw_author_name":"Carlos Mera-G\u00f3mez","raw_affiliation_strings":["Escuela Superior Politecnica del Litoral, Guayaquil, Ecuador and University of Birmingham, Birmingham, United Kingdom of Great Britain and Northern Ireland","Escuela Superior Polit\u00e9cnica del Litoral, ESPOL, Ecuador and University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"Escuela Superior Politecnica del Litoral, Guayaquil, Ecuador and University of Birmingham, Birmingham, United Kingdom of Great Britain and Northern Ireland","institution_ids":["https://openalex.org/I2135383"]},{"raw_affiliation_string":"Escuela Superior Polit\u00e9cnica del Litoral, ESPOL, Ecuador and University of Birmingham, UK","institution_ids":["https://openalex.org/I2135383","https://openalex.org/I79619799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031155155","display_name":"Rami Bahsoon","orcid":"https://orcid.org/0000-0002-1139-5795"},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]},{"id":"https://openalex.org/I3133184724","display_name":"University College Birmingham","ror":"https://ror.org/042ver755","country_code":"GB","type":"education","lineage":["https://openalex.org/I3133184724"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rami Bahsoon","raw_affiliation_strings":["University of Birmingham College of Engineering and Physical Sciences, Birmingham, United Kingdom of Great Britain and Northern Ireland","University of Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"University of Birmingham College of Engineering and Physical Sciences, Birmingham, United Kingdom of Great Britain and Northern Ireland","institution_ids":["https://openalex.org/I3133184724","https://openalex.org/I79619799"]},{"raw_affiliation_string":"University of Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014716105","display_name":"Rajkumar Buyya","orcid":"https://orcid.org/0000-0001-9754-6496"},"institutions":[{"id":"https://openalex.org/I4210144487","display_name":"Cloud Computing Center","ror":"https://ror.org/04aa0zm65","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210144487"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rajkumar Buyya","raw_affiliation_strings":["Cloud Computing and Distributed Systems (CLOUDS) Lab, Melbourne, Australia","Cloud Computing and Distributed Systems (CLOUDS) Lab, Australia"],"affiliations":[{"raw_affiliation_string":"Cloud Computing and Distributed Systems (CLOUDS) Lab, Melbourne, Australia","institution_ids":["https://openalex.org/I4210144487"]},{"raw_affiliation_string":"Cloud Computing and Distributed Systems (CLOUDS) Lab, Australia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073681741"],"corresponding_institution_ids":["https://openalex.org/I199693650"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05399539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"5","issue":"1","first_page":"1","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9464305639266968},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4843069612979889},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.39837995171546936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2635192275047302},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17950710654258728}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9464305639266968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4843069612979889},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.39837995171546936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2635192275047302},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17950710654258728}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3721140","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721140","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3721140","source":{"id":"https://openalex.org/S4387283489","display_name":"Distributed Ledger Technologies Research and Practice","issn_l":"2769-6480","issn":["2769-6480"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Distributed Ledger Technologies: Research and Practice","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:publications/e511e819-d375-4770-8569-b503e8a530b3","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/e511e819-d375-4770-8569-b503e8a530b3","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ahmadjee, S, Mera-G\u00f3mez, C, Bahsoon, R & Buyya, R 2026, 'Security Architectural Approaches and Risk Assessment Methods for Blockchain Systems : A Review and Future Directions', Distributed Ledger Technologies, vol. 5, no. 1, 7. https://doi.org/10.1145/3721140","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3721140","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3721140","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3721140","source":{"id":"https://openalex.org/S4387283489","display_name":"Distributed Ledger Technologies Research and Practice","issn_l":"2769-6480","issn":["2769-6480"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Distributed Ledger Technologies: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4408339280.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W851575271","https://openalex.org/W1543330234","https://openalex.org/W1975675278","https://openalex.org/W2527800909","https://openalex.org/W2538848838","https://openalex.org/W2604844934","https://openalex.org/W2620904645","https://openalex.org/W2908704987","https://openalex.org/W2910723953","https://openalex.org/W2914735843","https://openalex.org/W2954266647","https://openalex.org/W2963264685","https://openalex.org/W2968269657","https://openalex.org/W2981495462","https://openalex.org/W2998563643","https://openalex.org/W2998877372","https://openalex.org/W3028385805","https://openalex.org/W3031032747","https://openalex.org/W3034459010","https://openalex.org/W3083367393","https://openalex.org/W3085641574","https://openalex.org/W3095983164","https://openalex.org/W3107042223","https://openalex.org/W3107245412","https://openalex.org/W3110587988","https://openalex.org/W3112973068","https://openalex.org/W3116484444","https://openalex.org/W3137035939","https://openalex.org/W3183518770","https://openalex.org/W3195472360","https://openalex.org/W4220847066","https://openalex.org/W4229772528","https://openalex.org/W4234251954","https://openalex.org/W4253646952","https://openalex.org/W4281691046","https://openalex.org/W4361983239","https://openalex.org/W4367844079","https://openalex.org/W4385683049","https://openalex.org/W4392789389","https://openalex.org/W6779236108"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W3048554917","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047"],"abstract_inverted_index":{"Amid":[0],"the":[1,7,18,47,122],"widespread":[2],"use":[3],"of":[4,10,37,49],"blockchain":[5,38,89,111],"technology,":[6],"escalating":[8],"frequency":[9],"cyberattacks":[11],"exploiting":[12],"its":[13],"inherent":[14],"security":[15,26,56,85],"challenges":[16,128],"underscores":[17],"critical":[19],"necessity":[20],"for":[21,83],"a":[22,65],"robust":[23],"and":[24,33,77,90,107,118,129],"adaptable":[25],"risk":[27,48,112,115],"assessment":[28,113],"approach.":[29],"The":[30,93],"distinctive":[31],"attributes":[32],"intricate":[34],"internal":[35],"structure":[36],"not":[39],"only":[40],"attract":[41],"malicious":[42],"actors":[43],"but":[44],"also":[45],"elevate":[46],"ill-informed":[50],"architectural":[51,74,101,126],"design":[52,75,105,127],"decisions,":[53],"potentially":[54],"introducing":[55],"vulnerabilities.":[57],"This":[58],"study":[59,123],"addresses":[60],"this":[61,135],"imperative":[62],"by":[63],"conducting":[64],"systematic":[66],"literature":[67],"review,":[68],"classifying":[69],"publications":[70],"that":[71,80],"elucidate":[72],"secure":[73,100],"approaches":[76,98],"categorising":[78],"those":[79],"delineate":[81],"methods":[82],"assessing":[84],"risks":[86],"associated":[87],"with":[88],"smart":[91],"contracts.":[92],"findings":[94],"reveal":[95],"four":[96],"prevalent":[97],"supporting":[99],"design\u2014decision":[102],"models,":[103],"taxonomies,":[104],"patterns":[106],"guidelines\u2014alongside":[108],"contributions":[109],"in":[110,134],"encompassing":[114],"identification,":[116],"analysis":[117],"evaluation":[119],"methods.":[120],"Furthermore,":[121],"identifies":[124],"unresolved":[125],"proposes":[130],"future":[131],"research":[132],"directions":[133],"evolving":[136],"landscape.":[137]},"counts_by_year":[],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
