2019 26th Asia-Pacific Software Engineering Conference (APSEC) 2019
DOI: 10.1109/apsec48747.2019.00010
|View full text |Cite
|
Sign up to set email alerts
|

BLINKER: A Blockchain-Enabled Framework for Software Provenance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Bubbles' sizes represent the frequency of studies that fall within these intersections (The total number of studies in this map overcomes the number of selected studies, because one study, in specific, [30] refers to more than one topic). Inspired by SWEBOK, we classified the selected studies into 8 categories, namely, (i) software requirements [43], (ii) software engineering process [30,[44][45][46], (iii) software testing [47,48], (iv) software quality [49][50][51], (v) software maintenance [29], (vi) software configuration management [30,41,52], (vii) software engineering management [37,42,[53][54][55][56], and (viii) professional practice [57][58][59]. We briefly describe the SE applications below.…”
Section: Experience Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Bubbles' sizes represent the frequency of studies that fall within these intersections (The total number of studies in this map overcomes the number of selected studies, because one study, in specific, [30] refers to more than one topic). Inspired by SWEBOK, we classified the selected studies into 8 categories, namely, (i) software requirements [43], (ii) software engineering process [30,[44][45][46], (iii) software testing [47,48], (iv) software quality [49][50][51], (v) software maintenance [29], (vi) software configuration management [30,41,52], (vii) software engineering management [37,42,[53][54][55][56], and (viii) professional practice [57][58][59]. We briefly describe the SE applications below.…”
Section: Experience Studymentioning
confidence: 99%
“…Regulations and best practices, e.g., libraries should not be used if their vulnerability score is 5 and above (vulnerability threshold is 4), are encoded in the form of smart contracts [53]. Additionally, the framework enables the analysis of provenance through services, such as provenance query services that can focus on agents, artifacts or the process, and inference services to uncover non-trivial insights [54]. Finally, the framework provides services that generate composite cryptographic hashes of artifacts as the result of the concatenation of the hashes based on metadata and hashes based on content.…”
mentioning
confidence: 99%
“…The incentive mechanism enabled by blockchain technology eliminates the need for project leaders to assign tasks to developers; instead of that developers compete for creating the best code. Other SE researchers have proposed the use of blockchain as a backbone of the SDLC ecosystem [114][115][116], while Singi et al [114] presented a blockchain-enabled governance framework to ensure the trustworthiness of the software development process. The framework monitors and captures event data and assesses their adherence to regulations and best practices by means of smart contracts.…”
Section: Blockchain Applicabilitymentioning
confidence: 99%
“…A SP from the industry is presented and explains that the model allows sharing SP provenance data, in addition to providing inferences and insights about these data. The applicability of the PROV-SwProcess model in sharing SP provenance data can also be validated as presented by Bose et al [2019]. This related work presents BLINKER, an extensible framework that implements/uses the PROV-SwProcess model in a blockchainbased conceptual framework for capturing, storing, exploring, and analyzing software provenance data.…”
Section: Final Remarksmentioning
confidence: 99%
“…Provenance can be divided into two types: (i) prospective provenance that captures a computational task's specification and corresponds to the steps that must be followed to generate a data product, and (ii) retrospective provenance that captures the steps executed as well as information about the environment used to derive a specific data product [FREIRE et al, 2008]. Tracking provenance enables sharing, discovering, and reusing data, simplifying collaborative activities in a GSD scenario, in addition to reproducing how something like a build failure was generated, for example [BOSE et al, 2019]. Besides that, a provenance model enables "inter-operable interchange of provenance information in heterogeneous environments such as the Web" [GROTH and MOREAU, 2013].…”
Section: Introductionmentioning
confidence: 99%