2018 IEEE 11th International Conference on Cloud Computing (CLOUD) 2018
DOI: 10.1109/cloud.2018.00081
|View full text |Cite
|
Sign up to set email alerts
|

(WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…Bubbles' sizes represent the frequency of studies that fall within these intersections (The total number of studies in this map overcomes the number of selected studies, because one study, in specific, [30] refers to more than one topic). Inspired by SWEBOK, we classified the selected studies into 8 categories, namely, (i) software requirements [43], (ii) software engineering process [30,[44][45][46], (iii) software testing [47,48], (iv) software quality [49][50][51], (v) software maintenance [29], (vi) software configuration management [30,41,52], (vii) software engineering management [37,42,[53][54][55][56], and (viii) professional practice [57][58][59]. We briefly describe the SE applications below.…”
Section: Experience Studymentioning
confidence: 99%
“…Bubbles' sizes represent the frequency of studies that fall within these intersections (The total number of studies in this map overcomes the number of selected studies, because one study, in specific, [30] refers to more than one topic). Inspired by SWEBOK, we classified the selected studies into 8 categories, namely, (i) software requirements [43], (ii) software engineering process [30,[44][45][46], (iii) software testing [47,48], (iv) software quality [49][50][51], (v) software maintenance [29], (vi) software configuration management [30,41,52], (vii) software engineering management [37,42,[53][54][55][56], and (viii) professional practice [57][58][59]. We briefly describe the SE applications below.…”
Section: Experience Studymentioning
confidence: 99%
“…Ulybyshev et al [39] explained that the blockchain is used to provide the process of audibility, traceability in software development, and a role-based access control mechanism for the accesses of unauthorized data. Hossain et al [40] proposed a forensic investigation framework based on the blockchain, which focuses on detecting various criminal incidents in the IoT and also on collecting the details of communications from different entities present in it.…”
Section: Existing Researchmentioning
confidence: 99%
“…The blockchain technologies can ensure integrity, trust, immutability and authenticity in untrusted software development. In [35], blockchain is used to provide the auditability, traceability in software development and a role-based access control mechanism for unauthorized data accesses is developed.…”
Section: A Related Workmentioning
confidence: 99%