This HTML5 document contains 28 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n10http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n13https://kar.kent.ac.uk/id/subject/
n9https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n20https://kar.kent.ac.uk/66569/
n3http://eprints.org/ontology/
n12https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n11https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n4https://kar.kent.ac.uk/id/document/
n21https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n16doi:10.1145/
n17https://kar.kent.ac.uk/id/person/
n6https://kar.kent.ac.uk/id/eprint/66569#

Statements

Subject Item
n2:66569
rdf:type
bibo:Article n3:EPrint n3:BookSectionEPrint bibo:BookSection
rdfs:seeAlso
n20:
owl:sameAs
n16:3194133.3194150
n3:hasDocument
n4:2938459 n4:2938460 n4:2922000 n4:2938457 n4:2938458 n4:980058
n3:hasSubmitted
n4:980058
dc:hasVersion
n4:980058
dcterms:title
Self-adaptation made easy with Blockchains
wdrs:describedby
n9:export_kar_RDFN3.n3 n18:export_kar_RDFN3.n3
dcterms:date
2018-05-28
dcterms:creator
n17:ext-ps448@kent.ac.uk n17:ext-r.delemos@kent.ac.uk
bibo:status
n10:peerReviewed n10:published
dcterms:publisher
n11:ext-2af1883e4bbfa0356fcedb366171cb38
bibo:abstract
This position paper describes how blockchains facilitate the implementation of distributed self-adaptive systems. We demonstrate how the master/slave decentralised control pattern for self-adaptive systems, integrated with a permissioned blockchain, can protect nodes of a network against attacks by continuously adapting the membership of an access control list. Whenever malicious behaviour is detected, consensus on an updated access control list is reached, and that node is removed from the network. Using a smart home, as an example, we demonstrate that a permissioned blockchain is able to maintain a consistent view of a network of Internet of Things (IoT) devices in the presence of malicious nodes.
dcterms:isPartOf
n21:repository
dcterms:subject
n13:QA76.76
bibo:authorList
n6:authors
bibo:presentedAt
n12:ext-f996a0d8d8b9e724da36ef3f20e89019