{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:56:53Z","timestamp":1773154613557,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/cscloud-edgecom54986.2022.00014","type":"proceedings-article","created":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T15:23:16Z","timestamp":1659626596000},"page":"24-29","source":"Crossref","is-referenced-by-count":11,"title":["Current Status and Prospects of Blockchain Security Standardization"],"prefix":"10.1109","author":[{"given":"Xiaofeng","family":"Chen","sequence":"first","affiliation":[{"name":"Zhejiang University,Blockchain Research Center,Hangzhou Qulian Technology Co., Ltd.,Hangzhou,China"}]},{"given":"Zunbo","family":"Wei","sequence":"additional","affiliation":[{"name":"Hangzhou Qulian Technology Co., Ltd.,Hangzhou,China"}]},{"given":"Xiangjuan","family":"Jia","sequence":"additional","affiliation":[{"name":"Hangzhou Qulian Technology Co., Ltd.,Hangzhou,China"}]},{"given":"Peiyu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Hangzhou Qulian Technology Co., Ltd.,Hangzhou,China"}]},{"given":"Mengwei","family":"Han","sequence":"additional","affiliation":[{"name":"Hangzhou Qulian Technology Co., Ltd.,Hangzhou,China"}]},{"given":"Xiaohu","family":"Yang","sequence":"additional","affiliation":[{"name":"Zhejiang University,Blockchain Research Center,Hangzhou,China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008010"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2020.9248667"},{"key":"ref33","year":"0","journal-title":"ISO\/TC 307 Blockchain and distributed ledger technologies"},{"key":"ref32","year":"0","journal-title":"ITU-T Recommendations"},{"key":"ref31","year":"2018","journal-title":"Blockchain Security White Paper&#x2014;Technology Application Edition"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2022.9745865"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2022.9745868"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2020.9303503"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2021.9329260"},{"key":"ref10","year":"0","journal-title":"PRC personal data protection"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2994743"},{"key":"ref11","year":"0","journal-title":"2018 China Blockchain Industry White Paper"},{"key":"ref12","year":"0","journal-title":"Analysis Report on the Security Vulnerability of Open Source Software Source Code - Blockchain Topic"},{"key":"ref13","first-page":"1","article-title":"Failure rate minimization with multiple function unit scheduling for heterogeneous WANs","author":"qiu","year":"2008","journal-title":"IEEE GLOBECOM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.59"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2012.11.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900243"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2952553"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.07.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4278"},{"key":"ref28","year":"0","journal-title":"Interpretation of blockchain technology security framework"},{"key":"ref4","year":"0","journal-title":"Chinese Blockchain Technology Application and Development White Paper"},{"key":"ref27","year":"2018","journal-title":"Blockchain white paper"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.011"},{"key":"ref6","year":"0","journal-title":"A History of &#x2018;The DAO&#x2019; Hack"},{"key":"ref29","year":"0","journal-title":"China has put forward 30 standards related to blockchain"},{"key":"ref5","year":"0","journal-title":"The inside story of mt gox bitcoin's $460 million disaster"},{"key":"ref8","year":"0","journal-title":"Distributed Ledger Technology Beyond Block Chain"},{"key":"ref7","year":"0","journal-title":"Cross-Chain DeFi Site Poly Network Hacked"},{"key":"ref2","first-page":"4156","article-title":"Differential privacy-based blockchain for industrial Internet-of-Things","volume":"16","author":"gai","year":"2019","journal-title":"IEEE TII"},{"key":"ref9","year":"0","journal-title":"$700 Billion Senate Defense Bill Calls for Blockchain Cybersecurity Study"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05764-0_17"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60248-2_46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.004"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.06.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.031"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2705807"},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.1201\/9781351006620","author":"li","year":"2019","journal-title":"Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2911679"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60239-0_19"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.2973467"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453108"},{"key":"ref25","first-page":"11","article-title":"Secure Data Sharing Through Untrusted Clouds with Blockchain-enhanced Key Management","year":"2020","journal-title":"Conf SmartBlock"}],"event":{"name":"2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom)","location":"Xi'an, China","start":{"date-parts":[[2022,6,25]]},"end":{"date-parts":[[2022,6,27]]}},"container-title":["2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9842862\/9842867\/09843045.pdf?arnumber=9843045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T16:03:19Z","timestamp":1661184199000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9843045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/cscloud-edgecom54986.2022.00014","relation":{},"subject":[],"published":{"date-parts":[[2022,6]]}}}