2020
DOI: 10.1007/978-3-030-63095-9_25
|View full text |Cite
|
Sign up to set email alerts
|

Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Colored Petri Nets in particular became popular for formalizing blockchain-based protocols, e.g., [15][16][17]. Both can be understood as state machines, and mappings from blockchain data structures (tokens) to coloured CPN tokens exists.…”
Section: Formalizing Blockvokementioning
confidence: 99%
See 1 more Smart Citation
“…Colored Petri Nets in particular became popular for formalizing blockchain-based protocols, e.g., [15][16][17]. Both can be understood as state machines, and mappings from blockchain data structures (tokens) to coloured CPN tokens exists.…”
Section: Formalizing Blockvokementioning
confidence: 99%
“…New Internet security-related protocols are proposed regularly and analysed in terms of security and correctness using different types of formalisms, e.g., π-calculus [29], Communicating Sequential Processes [30], or Colored Petri Nets (CPNs) [31]. CPNs in particular became popular to formalize and verify blockchain-based protocols, smart contracts and blockchain-based applications, e.g., [15][16][17]32] and further previous research demonstrated their feasibility for formalising and analysing protocols [33][34][35][36]. Most recently, Pinna and Tonelli [37] analysed and classified the application of the Petri net formalism in the design and development of Smart Contracts for modelling as well as verification purposes.…”
Section: Related Workmentioning
confidence: 99%
“…Amoah et al [35] identified a Denial-of-Service (DoS) attack against the DNP3 protocol as part of a security analysis using a CPN model. Duo et al and others [16][17][18] utilized CPN models to formalize and verify blockchain-based protocols, smart contracts and blockchainbased applications. Leiding et al [19,20] first formalized the Authcoin protocol [21] using CPNs and subsequently performed a risk and threat analysis using the ISSRM domain model [22] before mitigating identified risks using security risk-oriented patterns (SRPs) [23,24].…”
Section: Related Workmentioning
confidence: 99%
“…Colored Petri Nets in particular became popular for formalizing blockchain-based protocols, e.g., [16][17][18]. Both can be understood as state machines, and a mapping exists from blockchain data structures (tokens) to colored CPN tokens.…”
Section: Introductionmentioning
confidence: 99%
“…Initially, blockchain applications were limited to cryptocurrencies and financial transactions. The invention of smart contracts oversees the development of more diverse application scenarios such as healthcare [11] and supply chains [12]. Since blockchain is a decentralized system, it can solve a single point of failure from the cloud.…”
Section: Introductionmentioning
confidence: 99%