|
[1] S. Mandal, D. A. Khan, and S. Jain, “Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic” New Gener, vol. 39, pp. 599–622, 2021. [2] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and Challenges” IEEE 11th Consumer Communications and Networking Conference, pp. 80-85, 2014. [3] G. Sushil, R. Deshmuk, and A. Junnarkar, “Security Challenges and Cyber Forensics for IoT Driven BYOD System” IEEE 7th International conference for Convergence in Technology (I2CT), pp. 1-7, 2022. [4] U. Javaid, M. Aman, and B. Sikdar, “Defining Trust in IoT Environments via Distributed Remote Attestation using Blockchain” Mobihoc '20: Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, pp. 321–326, 2020. [5] J. Kindervag, “No More Chewy Centers: Introducing the Zero Trust Model of Information Security” Forrester Research, 2010. [6] K. Luo, W. Yu, H. Amjad, S. Wang, L. Gao, and K. Hu, “A Multiple Blockchains Architecture On Inter-Blockchain Communication” IEEE International Conference on Software Quality, Reliability and Security Companion, pp. 139- 145, 2018. [7] R. Banoth, and M. Dave, “Blockchain-Enabled Intrusion Detection and Prevention System of APTs Within Zero Trust Architecture” IEEE Access, vol. 10, pp. 89270-89288, 2022. [8] G. Wang, Z. Shi, M. Nixon, and S. Han, “ChainSplitter: Towards Blockchain- Based Industrial IoT Architecture for Supporting Hierarchical Storage” IEEE International Conference on Blockchain (blockchain), pp. 166-175, 2019. [9] S. Suhail, R. Hussain, R. Jurdak, A. Oracevic, K. Salah, R. Matulevičius, and C. Hong, “Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges” Cryptography and Security, arXiv preprint arXiv:2103.11585. [10] P. Frauenthaler, M. Sigwart, C. Spanring, M. Sober, and S. Schulte, “ETH Relay: A Cost-efficient Relay for Ethereum-based Blockchains” IEEE International Conference on Blockchain (Blockchain), pp. 204-213, 2020. [11] B. Pillai, and K. Biswas, “Cross-chain Interoperability Among Blockchain-based Systems Using Transactions” The Knowledge Engineering Review, vol. 35, p. e23, 2020. [12] M. Ahmed, I. Elahi, M. Abrar, U. Aslam, I. Khalid, and M. Habib, “Understanding Blockchain: Platforms, Applications and Implementation Challenges” ICFNDS '19: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, No. 35, pp. 1-8, 2019. [13] I. Igboanusi, J. Lee, and D. Kim, “A Survey on Low Latency Blockchain Architectures for Industrial Networks” International Conference on Information and Communication Technology Convergence (ICTC), pp. 664-668, 2021. [14] T. Yang, “On the Design of Secure Blockchain-based Framework for Electronic Medical Record System” NTUST Dissertation, 2020. [15] R. Banoth, and M. Dave, “A Survey on Decentralized Application based On Blockchain Platform” International Conference on Sustainable Computing and Data Communication Systems (ICSCDS-2022), pp. 1171-1174, 2022. [16] Sun Jianjun, Li Ming, and Ma Jingang, “Research and application of data sharing platform integrating Ethereum and IPFs Technology” 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES), pp. 279-282, 2020. [17] Xu, X., Weber, I., Staples, M., Zhu, L., Bosch, J., Bass, L., and Rimba, P., “A taxonomy of blockchain-based systems for architecture design” IEEE international conference on software architecture (ICSA), pp. 243-252, 2017. [18] Jin, H., Dai, X., and Xiao, J., “Towards a novel architecture for enabling interoperability amongst multiple blockchains” 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1203-1211, 2018. [19] K. Lougheed, and Y. Rekhter, “Border Gateway Protocol (BGP)” IETF Standard RFC1105, [Online]Available: http://tools.ietf.org/rfc/rfc1105.txt, 1989 [20] A. Garoffolo, D. Kaidalov and R. Oliynykov, "Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains" IEEE 40th International Conference on Distributed Computing Systems (ICDCS), pp. 1257-1262, 2020. [21] Falazi, G., Breitenbücher, U., Daniel, F., Lamparelli, A., Leymann, F., and Yussupov, V., “Smart contract invocation protocol (SCIP): A protocol for the uniform integration of heterogeneous blockchain smart contracts” International Conference on Advanced Information Systems Engineering, pp. 134-149, 2020. [22] M. I. Ali, S. Kaur, A. Khamparia, D. Gupta, S. Kumar, A. Khanna, and F. Al- Turjman, "Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment" IEEE Access, vol. 8, pp. 172770-172782, 2020. [23] Y. Wang, J. Wei, and K. Vangury, “Bring Your Own Device Security Issues and Challenges” IEEE 11th Consumer Communications and Networking Conference, pp. 80-85, 2014. [24] “IPFS documents” IPFS, [Online]Available: https://docs.ipfs.tech/, 2022 [25] T. Hardjono, A. Lipton, and A. Pentland, “Towards an Interoperability Architecture for Blockchain Autonomous Systems” IEEE Transactions on Engineering Management, vol. 67, no. 4, pp. 1298-1309, 2020. [26] “Geth Documentation” Geth, [Online] Available: https://geth.ethereum.org, 2022 [27] W. Ao, C. Zhang, F. Xia, S. Fu, and Y. Huang, “A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography” IEEE 2nd International Conference on Computer and Communication Engineering Technology-CCET, pp. 90-95, 2019. |