Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 462-468.doi: 10.11896/jsjkx.210700016
• Information Security • Previous Articles Next Articles
GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong
CLC Number:
[1] XIA S Y,TANG L.Research on the Theoretical Framework and Improvement Path of RegTech[J].Southwest Finance,2020(11):86-96. [2] ZHANG Y L.Principle Position,Mode Selection and Legal System Innovation of Financial Regulation[J].Law Review,2020(5):112-124. [3] LI W.Research on the Application Path of Regulatory Techno-logy[J].Tsinghua Financial Review,2018(3):20-22. [4] DOSSA A,RUIZ P,VOGELSTELLER F,et al.ERC 1400:Security Token Standard[EB/OL].(2018-09-14) [2021-06-10].https://github.com/ethereum/eips/issues/1411. [5] DIEM ASSOCIATION.Diem White Paper[EB/OL].(2020-12-01) [2021-06-10].https://www.diem.com/en-us/white-paper/. [6] ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger Fabric:a Distributed Operating System for Permissioned Blockchains[C]//European Conference on Computer Systems.2018:1-15. [7] CHOUDHURY O,RUDOLPH N,SYLLA I,et al.Auto-Generation of Smart Contracts from Domain-Specific Ontologies and Semantic Rules[C]//IEEE International Congress on Cybermatics.2018:963-970. [8] COLOMBO C,ELLUL J,PACE G J.Contracts over smart contracts:Recovering from violations dynamically[C]//InternationalSymposium on Leveraging Applications of Formal Methods.2018:300-315. [9] AMIRI M J,AGRAWAL D,ABBADI A E.ParBlockchain:Leveraging Transaction Parallelism in Permissioned Blockchain Systems[C]//IEEE International Conference on Distributed Computing Systems.2019:1337-1347. [10] DANNEN C.Introducing Ethereum and Solidity[M].Brooklyn:Springer,2017. [11] KALEEM M,MAVRIDOU A,LASZKA A.Vyper:a SecurityComparison with Solidity Based on Common Vulnerabilities[C]//Conference on Blockchain Research & Applications for Innovative Networks and Services.2020:107-111. [12] BLACKSHEAR S,CHENG E,DILL D L,et al.Move:a Language with Programmable Resources[EB/OL].(2020-12-01) [2021-06-10].https://developers.diem.com/docs/technical-papers/move-paper/. [13] BIRYUKOV A,KHOVRATOVICH D,TIKHOMIROV S.Findel:Secure Derivative Contracts for Ethereum[C]//InternationalConference on Financial Cryptography and Data Security.2017:453-467. [14] BARTOLETTI M,ZUNINO R.BitML:a Calculus for Bitcoin Smart Contracts[C]//ACM SIGSAC Conference on Computer and Communications Security.2018:83-100. [15] ASTIGARRAGA T,CHEN X,CHEN Y,et al.Empowering Business-Level Blockchain Users with a Rules Framework for Smart Contracts[C]//International Conference on Service Oriented Computing.2018:111-128. [16] UK RESEARCH AND INNOVATION.Blockchain Technology for Algorithmic Regulation and Compliance (BARAC)[EB/OL].(2017-05-01) [2021-06-10].https://gtr.ukri.org/projects?ref=EP/P031730/1. [17] FINANCIAL CONDUCT AUTHORITY.Digital RegulatoryReporting[EB/OL].(2020-10-14) [2021-06-10].https://www.fca.org.uk/innovation/regtech/digital-regulatory-reporting. [18] WANG Y.The Types of Civil Code and Their Configuration Relations[J].Tsinghua University Law Journal,2014,8(6):54-63. [19] ZAVE P,JACKSON M.Four Dark Corners of RequirementsEngineering[J].ACM Transactions on Software Engineering and Methodology,1997,6(1):1-30. [20] TRELEAVEN P,BATRINCA B,OTHER S.Algorithmic Regulation:Automating Financial Compliance Monitoring and Regulation Using AI and Blockchain[J].Journal of Financial Transformation,2017,45:14-21. [21] KAHRAMAN G,BILGEN S.A Framework for Qualitative Assessment of Domain-Specific Languages[J].Software & Systems Modeling,2015,14(4):1505-1526. [22] SANTOS F,NUNES I,BAZZAN A L C.Model-Driven Agent-Based Simulation Development:a Modeling Language and Empirical Evaluation in the Adaptive Traffic Signal Control Domain[J].Simulation Modelling Practice and Theory,2018,83:162-187. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[8] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[9] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[10] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[11] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[12] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[13] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[14] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[15] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
|