Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to betterhow to make bitcoin a better currency. Financial Cryptography and Data Security, pp. 399–414. Springer (2012)
Google Scholar
Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report. DTIC Document (1973)
Google Scholar
Benkler, Y.: The Wealth of Networks: how Social Production Transforms Markets and Freedom. Yale University Press (2006)
Google Scholar
Biba, K.J.: Integrity considerations for secure computer systems. Technical report. DTIC Document (1977)
Google Scholar
Bliss, R.R., Steigerwald, R.S.: Derivatives clearing and settlement: A comparison of central counterparties and alternative structures. Econ. Perspect. 30(4) (2006)
Google Scholar
Buterin, V.: Multisig: The Future of Bitcoin (2014a)
Google Scholar
Buterin, V.: A next-generation smart contract and decentralized application platform. White Paper (2014b)
Google Scholar
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the ninth annual ACM symposium on Theory of computing, pp. 106–112. ACM (1977)
Google Scholar
Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: 1987 IEEE Symposium on. IEEE Security and Privacy, pp. 184–184 (1987)
Google Scholar
Czepluch, J.S., Lollike, N.Z., Malone, S.O.: The Use of Block Chain Technology in Di_erent Application Domains (2015)
Google Scholar
Denning, Dorothy E.: A lattice model of secure information ow. Commun. ACM 19(5), 236–243 (1976)
MathSciNet
CrossRef
MATH
Google Scholar
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: Data and Application Security, pp. 101–112. Springer (2001)
Google Scholar
Douceur, J.R.: The sybil attack. In: Peer-to-peer Systems, pp. 251–260. Springer (2002)
Google Scholar
Duffe, D., Zhu, H.: Does a central clearing counterparty reduce counterparty risk? Review of Asset Pricing Studies, 1(1), 74–95 (2011)
Google Scholar
Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems. Pearson (2014)
Google Scholar
Franco, P.: Understanding Bitcoin: Cryptography, Engineering and Economics. Wiley (2014)
Google Scholar
Ge, X., Polack, F., Laleau, R.: Secure databases: an analysis of Clark-Wilson model in a database environment. In: Advanced Information Systems Engineering, pp. 234–247. Springer (2004)
Google Scholar
Halevi, S., Harnik, D., Pinkas, B, Shulman-Peleg, A.: Proofs of owner- ship in remote storage systems. In: Proceedings of the 18th ACM conference on Computer and communications security, pp. 491–500. ACM (2011)
Google Scholar
Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. Technical report. Cryptology ePrint Archive, Report 2015/675, 2015 (2015). http://eprint.iacr.org
Lamport, Leslie, Shostak, Robert, Pease, Marshall: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382–401 (1982)
CrossRef
MATH
Google Scholar
Merkle, R.C.: Protocols for public key cryptosystems. In: Null, pp. 122. IEEE (1980)
Google Scholar
Merkle, R.C.: Secrecy, Authentication, and Public Key Systems (1979)
Google Scholar
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Google Scholar
Pessoa, M., Williams, M.J.: Government cash management: relationship between the treasury and the Central Bank. Int. Monetary Fund (2013)
Google Scholar
Peters, G.W., Panayi, E., Chapelle, A.: Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective (2015). arXiv preprint arXiv:1508.04364
Peters, G.W., Chapelle, A., Panayi, E.: Opening discussion on banking sector risk exposures and vulnerabilities from virtual currencies: an operational risk perspective. Available at SSRN 2491991
Google Scholar
Redmond, E., Wilson, J.R.: Seven databases in seven weeks: a guide to modern databases and the NoSQL movement. Pragmatic Bookshelf (2012)
Google Scholar
Reid, F., Harrigan, M.: An Analysis of Anonymity in the Bitcoin System. Springer (2013)
Google Scholar
Rosenfeld, M.: Overview of colored coins. White paper, bitcoil.co.il (2013)
Google Scholar
Sandhu, Ravi S.: Lattice-based access control models. Computer 26(11), 9–19 (1993)
CrossRef
Google Scholar
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc. (2015)
Google Scholar
Swanson, T.: (2015) Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems
Google Scholar
Szabo, Nick: Formalizing and securing relationships on public networks. First Monday 2(9), 31 (1997)
CrossRef
Google Scholar
Tripunitara, Mahesh V., Li, Ninghui: The foundational work of Harrison-Ruzzo-Ullman revisited. IEEE Trans. Dependable Secure Comput. 10(1), 28–39 (2013)
CrossRef
Google Scholar
Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014)
Google Scholar
Yaker, I.F., Pattanayak, S.: . Treasury Single Account: an essential tool for government cash management. Int. Monetary Fund (2012)
Google Scholar
Zyskind, G., Nathan, O.z., Pentland, A.: Enigma: Decentralized Computation Platform with Guaranteed Privacy (2015). arXiv preprint arXiv:1506.03471