<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decentralization of the issue-based knowledge transfer platform</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute for Information Recording of National Academy of Sciences of Ukraine</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>We consider issue-based computer platforms, designed to transfer knowledge in a way, that ensures its thorough and effective utilization in various domains. Such platforms have subsystems for collecting knowledge and for decision-making support. Typically, these systems are centrally located and store data in one specific place, such as a data center, or even in one database, where this data can be easily lost or damaged. In addition, this data can be spoofed or altered anonymously in many ways, if traditional software or hardware access to it is attacked or misused. These problems can be partially solved by introduction of proper security and monitoring solutions, using the best security practices, such as secure protocols and first-class encryption. However, this article offers methods that, practically, eliminate the very possibility of data falsification, and add other important properties to computer systems, such as data invariability, decentralization, and fault tolerance of the data registry or individual subsystems of issue-based knowledge transfer platform.</p>
      </abstract>
      <kwd-group>
        <kwd>knowledge transfer platform</kwd>
        <kwd>expert knowledge collection system</kwd>
        <kwd>issue-based computer systems</kwd>
        <kwd>decision support system</kwd>
        <kwd>decentralization</kwd>
        <kwd>blockchain</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        There is a global dilemma of the most thorough use of available knowledge. The
effectiveness of applying this knowledge to various subject domains is one of the most
important factors contributing to overall human progress. According to the research,
conducted by a US company Delphi Group at the beginning of the current millennium [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
a significant share of knowledge (more than 40%), used by a certain organization is
non-formalized and not even registered in any kind of data storage. This knowledge is
based only on the skills, experience, and intuition of certain experts.
      </p>
      <p>There is no doubt that when making decisions in different fields of activity, it is
necessary to rely on all available knowledge, both stored somewhere and provided by
an expert ad hoc. This is especially true for loosely structured data, characterized by
high level of uncertainty and incompleteness.</p>
      <p>The first stage of solving of the above-mentioned problem could be integration of
knowledge of different formats, obtained from different time-dependent sources, with
formalized knowledge and knowledge that experts provide. If combined with
processing and storage of this formalized data in databases, this approach can become an
ultimate solution. Each next transfer of accumulated relevant knowledge for its further
use in decision-making process can be the final stage of decision-making, which brings
the desired results. An example of the implementation of this approach is the
issuebased hardware and software platform of knowledge transfer, created according to the
chart, shown outlined on Figure 1.</p>
      <p>
        Functionally, the knowledge transfer platform is represented by the following
components:
1. The subsystem of knowledge collection and actualization, which is designed to
support the experts’ workflow, knowledge engineers (expert session organizers) and
decision-makers (DMs). The main functions of this subsystem are:
 user registration and accounting.
 assessment of competence for engineers and experts, which provides insights on
what knowledge fields they are most experienced in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
 building of a knowledge base, containing a model of subject areas (performed by
knowledge engineers). This also includes conducting an expertise (expert session).
2. The subsystem for providing knowledge and decision support system (DSS) itself
are intended for:
 choosing the best solution for DMs.
 evaluation of decisions in uncertain conditions.
 strategic planning.
 generating and predicting future scenarios, etc.
      </p>
      <p>
        It is assumed that the knowledge engineer, who is also the main actor in the system
and who has knowledge in specific subject domains, is using these tools for automated
extraction of knowledge and for organizing expert sessions. Engineers, using DSS
tools, create models of subject domains and knowledge databases. Later, based on these
models and knowledge, decision makers get recommendations from the system.
Functionally, in the knowledge transfer platform, the decision support system (DSS) is
responsible for generating recommendations [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ]. Another component of the platform
is a professional social network, which unites specialists-experts in various areas of
study, and utilizes them as another source of knowledge. This social network also
measures the relative competence of each expert, which is considered during decision
support process. Later, the measured competence is also used to determine the financial
reward for each expert [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
1
      </p>
    </sec>
    <sec id="sec-2">
      <title>On the necessity of knowledge transfer platform decentralization</title>
      <p>In this paper, decentralization means the use of a cryptographically protected
decentralized data platform, which works based on blockchain technology. Decentralizing a
centralized system is an important process, which can also be considered a mandatory
one, if there is a need to ensure timely and ultimate data protection against unauthorized
interference and targeted attacks. Before blockchain was invented, this task was solved
using multiple secure layers and geo-decentralization, which, however, could not
guarantee absolute data protection.</p>
      <p>
        System decentralization process is the transition of the system from fully centralized
to partially or fully decentralized mode. Decentralization makes sense if we need the
system to assume the following properties [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]:
 Guarantee of data storage in the immutable, global distributed data registry. This
registry cannot store large amounts of data, but neither it is necessary for the purpose
of data protection [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
 The impossibility of forgery (modification) of stored data in a way that was not
foreseen in advance, including the impossibility of incorrect insertion, processing, and
deletion of data from this registry. The most vulnerable part is the decentralized
program which manages the data, but not the data itself. The decentralized program
must be properly written, audited, tested and stored. These steps ensure, that
decentralized programs will function only in the prescribed manner, programmed once and
forever [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. It is also worth noting that there are other types of attacks, such as, for
instance, a theoretical threat of hacking blockchain platform after adoption of
quantum computers, since the latter have much higher computational performance than
traditional computers and can break the underlying blockchain algorithm. However,
modern decentralized data platforms, based on blockchain technology, have already
implemented algorithms to make blockchains quantum-resistant. So, probably,
attacks of this kind will not be successful [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
 Execution of previously defined set of calculations only (on the blockchain level).
      </p>
      <p>
        When it comes to decentralization of systems built with decentralized data platforms,
the following types of decentralization should be outlined:
 Full decentralization. Systems of this type assume that their computational part,
including the data management and storage subsystems, is also decentralized and,
therefore, cryptographically protected. This is only possible when the program is
fully stored in a decentralized data platform, and no parts of the system are outside
that platform. Modern decentralized data platforms, such as Ethereum and similar
ones, allow you to create the so-called decentralized programs that are loaded into a
decentralized data registry only once and can never be changed again. This
immutability gives strong security advantages, but it means that the software should foresee
all possible scenarios of interacting with it in advance, because, after being loaded,
it will never ever be changed. Thus, there will be no practical possibility of data
forgery and any other methods of interference with the originally uploaded program.
This also requires the program to be carefully reviewed for any vulnerabilities before
uploading it to the decentralized registry [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
 Partial decentralization. As of 2021, there is no decentralized data platform that
can scale indefinitely. All of available data platforms have their own limitations:
mainly bandwidth (the number of transactions per unit of time is limited) and the
presence of fees for using the platform. These problems are usually solved through
partial decentralization, since full decentralization of the system is either too
expensive or impractical.
 No decentralization. All traditional computer and software systems, i.e. systems
that do not use decentralized data platforms, are centralized. Centralization in the
context of software systems means that there are one or more institutions that can at
least somehow affect the operation of the system, control it and/or its data. It should
be noted that system security and its decentralization are different concepts; secure
systems in the classical sense are still centralized.
      </p>
      <p>
        The level of decentralization of any system is determined not only by how it uses
decentralized data platforms and integrates with it, but also by decentralization level of
the decentralized data platform itself (for instance, which algorithm it uses to protect
data and computation centralization). However, this problem is out of scope of this
article [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        When it comes to distributed systems for collecting expert knowledge, which can be
related to partially decentralized systems, the knowledge transfer platform acquires the
following important properties:
 Guaranteed reliability of expert knowledge storage, including permanent availability
of this storage for a small (but sufficient) amount of data needed for DSS system,
and complete protection against unauthorized changes. This property is especially
important for expert systems and knowledge-based systems, because often the
results of a certain examination, after its completion, must be stored for a long time,
for example, up to 10 years from the moment of completion of some research
projects.
 Possibility of conducting a public audit of the system later, based on reliable input
data, stored in the decentralized registry. Since the data, stored in the decentralized
registry, is cryptographically protected, there is no doubt in its authenticity. Using
this reliable data, assuming that the DSS is idempotent when performing calculations
(it produces the same result with the same input data), it is possible to verify the
result and the reliability of the source data by performing the calculation again.
 As a result, we have increased confidence in the functioning of the knowledge
transfer platform, which also increases the credibility of results, obtained from the DSS.
An alternative to decentralization of the subsystem for collecting expert knowledge of
an issue-based knowledge platform is the use of electronic digital signatures (EDS) and
several centralized data registers (like traditional databases). It is worth noting that even
in the case when these alternatives are used, the knowledge collection system still won’t
have the properties, listed above [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
2
      </p>
    </sec>
    <sec id="sec-3">
      <title>The model of knowledge transfer platform using the full decentralization</title>
      <p>A recently conducted research demonstrates, that in a typical system of expert
knowledge collection, the total amount of data (which primarily consists of expert
estimates) recorded in the decentralized register is small, and occupies less than 500
kilobytes of storage space per project. Since the results obtained and stored by the DSS
may be in demand (reviewed and used) for quite a long time after the project completion
(in extreme cases, up to 10 years), we conclude, that for such systems it makes sense to
store all input information in a decentralized register. In other words, a complete
decentralization of a system, which collects expert knowledge, means partial
decentralization of the knowledge transfer platform itself, since the system of expert knowledge
collection is its subsystem.</p>
      <p>
        However, full decentralization of a system always makes it somewhat difficult for
the user to work with it. After decentralization it is necessary to have not only a
decentralized account (also known as a "wallet" in cryptographic decentralized data
platforms), but also a certain number of cryptocurrencies to pay for transactions in the
decentralized network. This problem is classified as a problem of adoption of technology
and is one of the reasons why many systems and products cannot integrate with
decentralized technologies just yet [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. However, with the help of the originally developed
transaction delegation method [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], this interaction is simplified to only creating an
account in the decentralized data platform, without losing any properties of a fully
decentralized system.
      </p>
      <p>After decentralization, the system, which collects expert knowledge, will not have
fundamental differences from the previous version of the system, except for several
additional prerequisites the experts should do before working with the system. There
are also a few steps, which knowledge engineers should also do, but only once before
starting any project:
─ Creating a decentralized program which will be uploaded to the decentralized data
platform. This program can be templated, that is, developed once, and only slightly
modified for each specific subject domain using pre-programmed parameters.
─ Creating a delegate account and providing it with the cryptocurrency, necessary for
further decentralized transactions which experts will perform.
─ Experts, in turn, do several additional simple steps: before entering their estimates
into the system, each expert generates his(her) own decentralized account, and uses
the graphical user interface to register it in a decentralized program (separately for
each expert session project or only once, depending on the system design), thereby
authenticating in the system, and confirming his(her) identity. Experts can associate
any additional data with this identity. No one but experts themselves can input
evaluations on their behalf after such registration in a decentralized system.</p>
      <p>The preparation work consists of the following steps:
1. The administrator develops (or clones an existing) decentralized program created for
a specific expert system (or uses a template). The function of this program is to
perform a cryptographically protected entry of the expert data into a decentralized
register with the help of a delegate, for further reading by the decision support system.
2. The administrator registers this program in a decentralized data platform, thereby
making it immutable. It obtains a unique application address, which is also
immutable.
3. The received address of the decentralized program is written into the centralized
storage (or program code) of the expert system for further interaction with it.
4. Additionally, the administrator generates a delegate account and replenishes its
balance in a decentralized system. The delegate account is also stored in the delegated
transaction support system, which can a be part of the decision support system.
5. Before starting to work with the system, experts create their decentralized accounts
(for example, using the browser extension called Metamask) and register them in the
centralized system by creating electronic digital signatures for certain pieces of data,
requested by the system (for example, an email address). Thus, they confirm that
they are the owners of this decentralized account.
6. After the work with the system is done, the expert performs a delegated transaction
to write the generated data into the decentralized storage. This transaction is genuine,
and no one but the expert himself can change this data after it is stored in the
decentralized registry, and, moreover, at any time anyone can check the correctness of the
data, that was written into the decentralized network (although this is not necessary).</p>
      <p>While expert knowledge is processed by the decision support system, the data is read
from a decentralized registry and converted into a format, that is convenient for
processing. In future, data from the decentralized registry can also be used, for example,
to audit a certain expertise (session). Figure 3 shows the interaction of an expert and
the centralized expert data collection system with the decentralized program before and
after the examination (i. e., how experts work and read data from a decentralized
register).</p>
    </sec>
    <sec id="sec-4">
      <title>Results of decentralization of the expert knowledge collection system</title>
      <p>After decentralization, when the changes, suggested in the paper, were applied, the
(previously centralized) system of expert knowledge collection, acquired the following
properties:
1. The input data, obtained from experts, is now protected and maintained by a global
decentralized data platform, which guarantees its storage and immutability.
2. Since the data is cryptographically secure and immutable, it is considered a reliable
source of credible knowledge (provided that the decentralized program is correct,
which can be easily verified at any time). This allows us to increase the level of trust
to the decision support system itself, and to conduct a post factum auditing of the
system, if necessary.</p>
      <p>In order to implement the above-listed properties within the system, only minor changes
had to be introduced into the existing centralized system.</p>
      <p>Here they are:
1. The need for experts to install an additional (relatively simple) software, as either a
mobile application or a browser plugin. This approach, in its turn, can also
completely replace the process of registration in the expert data collection system using
traditional login and a password.
2. Adding two new steps for the expert to perform: electronic data signature before
(registration) and after (executing a data recording transaction in a decentralized
register) working with the centralized system.</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The result of the conducted research is the method proposal for decentralization of the
issue-based knowledge transfer platforms, which include subsystems for knowledge
collection and decision-making support. The proposed improvements can significantly
increase the security of information storage and processing in the system, allowing it to
prevent any loss, as well as unauthorized storage-level changes of information and
changes to the original software.</p>
      <p>As a result of decentralization, the data, obtained from experts, is protected and
maintained by a global decentralized data platform, which guarantees its lifetime
storage and inability of intruders to compromise it. Once recorded, cryptographically
protected data remains unchanged and can be considered a reliable source of information,
also verifying that if the centralized software is correct and unchanged. The suggested
approach completely eliminates the possibility of data falsification and adds important
properties to the system, such as invariability and fault tolerance. As a result,
decentralization allows to increase the level of confidence in the knowledge transfer platform
and perform open system audits when necessary.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgement</title>
      <p>This work has been produced in collaboration with the European Union’s Horizon
2020 research and innovation programme under the grant agreement N 830943, ECHO
project.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Tuzovskiy</surname>
            <given-names>A.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chirikov</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yampolsky</surname>
            <given-names>V.Z.</given-names>
          </string-name>
          <article-title>Systems management of knowledge (methods and technologists)</article-title>
          . Tomsk :
          <string-name>
            <surname>Yzd-vn</surname>
            <given-names>NTL</given-names>
          </string-name>
          ,
          <year>2005</year>
          . 260 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Tsyganok</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borokhvostov</surname>
            <given-names>I.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roik P.D.</surname>
          </string-name>
          Problem
          <article-title>-oriented knowledge transfer platform for decision making support in socio-technical systems</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , Vol.
          <source>2067 Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS</source>
          <year>2017</year>
          ); Kyiv, Ukraine, November
          <volume>30</volume>
          ,
          <year>2017</year>
          . P.
          <volume>112</volume>
          -
          <fpage>117</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Tsyganok</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andriichuk</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roik</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Combinatorial Method for Aggregation of Incomplete Group Judgments</article-title>
          .
          <source>Proceedings of 2018 IEEE First International Conference on System Analysis &amp; Intelligent Computing (SAIC)</source>
          .
          <article-title>Igor Sikorsky Kyiv Polytechnic Institute</article-title>
          . Kyiv, Ukraine.
          <fpage>08</fpage>
          -
          <issue>12</issue>
          <year>October</year>
          ,
          <year>2018</year>
          . P.
          <volume>25</volume>
          -
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Totsenko</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsyganok</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          <article-title>Method of paired comparisons using feedback with expert</article-title>
          .
          <source>Journal of Automation and Information Sciences</source>
          .
          <year>1999</year>
          .
          <volume>31</volume>
          (
          <issue>7</issue>
          -
          <fpage>9</fpage>
          ). P.
          <volume>86</volume>
          -
          <fpage>96</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Tsyganok</surname>
            ,
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kadenko</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          <article-title>On sufficiency of the consistency level of group ordinal estimates</article-title>
          .
          <source>Journal of Automation and Information Sciences</source>
          .
          <year>2010</year>
          .
          <volume>42</volume>
          (
          <issue>8</issue>
          ). P.
          <volume>42</volume>
          -
          <fpage>47</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Savchenko</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsyganok</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andriichuk</surname>
            <given-names>O.</given-names>
          </string-name>
          <article-title>A Cost-Effective Approach to Securing Systems through Partial Decentralization</article-title>
          .
          <source>Information &amp; Security: An International Journal</source>
          .
          <year>2020</year>
          .
          <volume>47</volume>
          , no. 1. P.
          <volume>109</volume>
          -
          <fpage>121</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Shafagh</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burkhalter</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hithnawi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Duquennoy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <year>2017</year>
          , November.
          <article-title>Towards blockchain-based auditable storage and sharing of iot data</article-title>
          .
          <source>In Proceedings of the 2017 on Cloud Computing Security Workshop</source>
          . (pp.
          <fpage>45</fpage>
          -
          <lpage>50</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Moubarak</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Filiol</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Chamoun</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>On blockchain security and relevant attacks</article-title>
          .
          <source>In 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM) April</source>
          ,
          <year>2018</year>
          . P. 1-
          <fpage>6</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Fernández-Caramès</surname>
            ,
            <given-names>T.M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Fraga-Lamas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks</article-title>
          .
          <source>IEEE Access</source>
          ,
          <year>2020</year>
          . 8. P.
          <volume>21091</volume>
          -
          <fpage>21116</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Skichko</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grinenko</surname>
            <given-names>T. O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Narezhna</surname>
            <given-names>O. P.</given-names>
          </string-name>
          <article-title>Security of blockchain technology for decentralized systems</article-title>
          .
          <source>Global Cyber Security Forum : materials of the First International Scientific and Practical Forum, November 14 - 16</source>
          ,
          <year>2019</year>
          . Kharkiv : NGURE,
          <year>2019</year>
          . - P.
          <fpage>98</fpage>
          -
          <lpage>99</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Gochhayat</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shetty</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukkamala</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Foytik</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamhoua</surname>
            ,
            <given-names>G.A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Njilla</surname>
            ,
            <given-names>L. Measuring</given-names>
          </string-name>
          <article-title>Decentrality in Blockchain Based Systems</article-title>
          . IEEE Access,
          <year>2020</year>
          . 8. P.
          <volume>178372</volume>
          -
          <fpage>178390</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Savchenko</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsyganok</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andriichuk</surname>
            <given-names>O</given-names>
          </string-name>
          .
          <source>Decision Support Systems' Security Model Based on Decentralized Data Platforms. CEUR Workshop Proceedings</source>
          , Vol. 2318
          <source>Selected Papers of the XVIII International Scientific and Practical Conference on Information Technologies and Security (ITS</source>
          <year>2018</year>
          ). Kyiv, Ukraine, November
          <volume>27</volume>
          ,
          <year>2018</year>
          . P.
          <volume>209</volume>
          -
          <fpage>221</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Chod</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trichakis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsoukalas</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aspegren</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Weber</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>On the financing benefits of supply chain transparency and blockchain adoption</article-title>
          .
          <source>Management Science</source>
          .
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Savchenko</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsyganok</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Andriichuk</surname>
            <given-names>O.</given-names>
          </string-name>
          <article-title>An Approach to Transaction Delegation in Selfprotected Decentralized Data Platforms</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , Vol. 2577
          <source>Selected Papers of the XIX International Scientific and Practical Conference on Information Technologies and Security (ITS</source>
          <year>2019</year>
          ). Kyiv, Ukraine, November
          <volume>28</volume>
          ,
          <year>2019</year>
          . P.
          <volume>169</volume>
          -
          <fpage>188</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>