2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA) 2016
DOI: 10.1109/wicsa.2016.21
|View full text |Cite
|
Sign up to set email alerts
|

The Blockchain as a Software Connector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
211
0
5

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 383 publications
(230 citation statements)
references
References 10 publications
0
211
0
5
Order By: Relevance
“…To address the limitations described above, we consider the use of blockchain technology [1], the following features of which can be seen as potential solutions: a public ledger of transactions copied to all nodes of the blockchain network without transaction party identities [34]; the use of public key infrastructure (PKI) to decrypt and encrypt a transaction and to notify counterparties about the existence of an executable transaction with unique single-time keys [34,35]; and the concept of the smart contract [35].…”
Section: Digital Supply Chainsmentioning
confidence: 99%
See 3 more Smart Citations
“…To address the limitations described above, we consider the use of blockchain technology [1], the following features of which can be seen as potential solutions: a public ledger of transactions copied to all nodes of the blockchain network without transaction party identities [34]; the use of public key infrastructure (PKI) to decrypt and encrypt a transaction and to notify counterparties about the existence of an executable transaction with unique single-time keys [34,35]; and the concept of the smart contract [35].…”
Section: Digital Supply Chainsmentioning
confidence: 99%
“…In addition, the ledger is copied to all nodes of the network [1,35]. If a transaction is changed, a new block is created and chained to previous blocks.…”
Section: Digital Supply Chainsmentioning
confidence: 99%
See 2 more Smart Citations
“…With the fundamental technology of Bitcoin, the blockchain has gained more and more attention and has begun to be applied to various fields [30], such as medicine [31,32], economics [33,34], the Internet of Things [35,36], and software engineering [37]. We believe that there will be a wide range of applications in M2M security.…”
Section: Data Securitymentioning
confidence: 99%