[HTML][HTML] Smart contracts in energy systems: A systematic review of fundamental approaches and implementations

D Kirli, B Couraud, V Robu, M Salgado-Bravo… - … and Sustainable Energy …, 2022 - Elsevier
Given the ongoing transition towards a more decentralised and adaptive energy system, the
potential of blockchain-enabled smart contracts for the energy sector is being increasingly …

Blockchain and the built environment: Potentials and limitations

NO Nawari, S Ravindran - Journal of Building Engineering, 2019 - Elsevier
Blockchain is a relatively new concept that originated from the first cryptocurrency known as
Bitcoin and was soon noted to have a much wider range of applications than just serving as …

Blockchain for cities—a systematic literature review

C Shen, F Pena-Mora - Ieee Access, 2018 - ieeexplore.ieee.org
Blockchain is considered one of the most disruptive technologies of our time. Numerous
cities around the world are launching blockchain initiatives as part of the overall efforts …

[PDF][PDF] Blockchain technology and BIM process: review and potential applications.

NO Nawari, S Ravindran - Journal of Information Technology in …, 2019 - academia.edu
A Blockchain Technology (BCT) is an emergent digital technology that in recent years has
gained widespread traction in various industrial, public, and business sectors; primarily in …

Blockchain and building information modeling (BIM): Review and applications in post-disaster recovery

NO Nawari, S Ravindran - Buildings, 2019 - mdpi.com
Blockchain Technology (BCT) is a growing digital technology that in recent years has gained
widespread traction in various industries in the public and private sectors. BCT is a …

{JEDI}:{Many-to-Many}{End-to-End} encryption and key delegation for {IoT}

S Kumar, Y Hu, MP Andersen, RA Popa… - 28th USENIX security …, 2019 - usenix.org
As the Internet of Things (IoT) emerges over the next decade, develo** secure
communication for IoT devices is of paramount importance. Achieving end-to-end encryption …

{WAVE}: A decentralized authorization framework with transitive delegation

MP Andersen, S Kumar, M AbdelBaky… - 28th USENIX Security …, 2019 - usenix.org
Most deployed authorization systems rely on a central trusted service whose compromise
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …

Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for develo** distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Saranyu: Using smart contracts and blockchain for cloud tenant management

S Nayak, NC Narendra, A Shukla… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
While blockchains and smart contracts are primarily known for their use as the technologies
underlying cryptocurrencies like Bitcoin and Ethereum, these technologies also have …

Plaster: An integration, benchmark, and development framework for metadata normalization methods

J Koh, D Hong, R Gupta, K Whitehouse… - Proceedings of the 5th …, 2018 - dl.acm.org
The recent advances in the automation of metadata normalization and the invention of a
unified schema---Brick---alleviate the metadata normalization challenge for deploying …