Abstract is missing.
- Message from the General Chairs: IEEE CISOSE 2023Iraklis Varlamis, Jerry Z. Gao 0002. [doi]
- Tracking Decisions about Granting Access to Health Data: Application Analysis and RequirementsMohammad Salar Arbabi, Arlindo Flávio da Conceição, Thiago Garrett, Jan F. Nygård, Roman Vitenberg. 1-6 [doi]
- B-ROSCA: A Smart Contract-Based Selection of ROSCA Communities Using CollateralZahra Batool, Sion Israel Sion, Rodrigue Tonga Naha, Kaiwen Zhang 0001. 7-12 [doi]
- Proof-of-Contribution-Based Design for Collaborative Machine Learning on BlockchainBaturalp Buyukates, Chaoyang He 0001, Shanshan Han, Zhiyong Fang, Yupeng Zhang 0001, Jieyi Long, Ali Farahanchi, Salman Avestimehr. 13-22 [doi]
- UBIC-A Blockchain-Less CryptocurrencyMaurantonio Caprolu, Elmahdi Bentafat, Spiridon Bakiras, Roberto Di Pietro. 23-30 [doi]
- Blockchain-Based Platform for Crowdsourcing Machine Learning Models Design and Training, while Incentivizing Continuous ImprovementNicola Cibin, Michele Albano. 31-37 [doi]
- A Robust Front-Running Methodology for Malicious Flash- Loan DeFi AttacksXun Deng, Zihan Zhao, Sidi Mohamed Beillahi, Han Du, Cyrus Minwalla, Keerthi Nelaturu, Andreas G. Veneris, Fan Long. 38-47 [doi]
- Automating Intellectual Property License Agreements with DLTDamiano Di Francesco Maesa, Frank Tietze. 48-56 [doi]
- A Taxonomy of Decentralized Identifier Methods for PractitionersFelix Hoops, Alexander Mühle, Florian Matthes, Christoph Meinel. 57-65 [doi]
- Ditto: Towards Decentralised Similarity Search for Web3 ServicesNavin V. Keizer, Onur Ascigil, Michal Król, George Pavlou. 66-75 [doi]
- Automatic Detection of API Access Control Vulnerabilities in Decentralized Web3 ApplicationsRizwan Patan, Reza M. Parizi. 76-85 [doi]
- Funding Large Projects with a Blockchain Based Automated Fractional Reserve CurrencyMichael F. Toutonghi, Marc X. Makkes. 86-93 [doi]
- Using Django Framework and DLT for Drug Supply Chain ManagementLodovica Marchesi. 94-99 [doi]
- Analyzing Geospatial Distribution in BlockchainsShashank Motepalli, Hans-Arno Jacobsen. 100-108 [doi]
- VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity PlatformsRahma Mukta, Rue C. Teh, Hye-Young Paik, Qinghua Lu 0001, Salil S. Kanhere. 109-118 [doi]
- Static Capability-Based Security for Smart ContractsJonas Schiffl, Alexander Weigl, Bernhard Beckert. 110-117 [doi]
- Efficient Credential Revocation Using Cryptographic AccumulatorsDaria Schumm, Rahma Mukta, Hye-Young Paik. 127-134 [doi]
- Performance Evaluation of Self-Sovereign Identity Use CasesAlexandre Gomes de Siqueira, Arlindo Flávio da Conceição, Vladimir Rocha 0001. 135-144 [doi]
- Blockly2Hooks: Smart Contracts for Everyone with the XRP Ledger and Google BlocklyLucian Trestioreanu, Wazen M. Shbair, Flaviene Scheidt de Cristo, Radu State. 145-150 [doi]
- Building a Cross-Chain Identity: A Self-Sovereign Identity-Based FrameworkMarco Zecchini, Michael Sober, Stefan Schulte 0002, Andrea Vitaletti. 149-156 [doi]
- DIDAPPER: A Practical and Auditable On-Chain Identity Service for Decentralized ApplicationsLibin Xia, Jiashuo Zhang, Xihan Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen 0001. 151-157 [doi]
- Identification and Analysis of Self-Sovereign Identity User Interface and User Experience Design PatternsSpela Cucko, Bostjan Sumak, Muhamed Turkanovic. 166-173 [doi]