1. Jing, J.: The development status and tendency of internet trusted identity management. J. Inf. Secur. Res. 2(7), 666–668 (2016)
2. Jiang, W., Li, H., Hao, Y., Dong, G.: A survey on cyberspace identity management. Inf. Secur. Commun. Priv. 9, 46–57 (2019)
3. Dong, G., Zhang, Z., Li, H.: Regulatory system architecture and key mechanisms of blockchain-based heterogeneous identity alliance. Commun. Technol. 53(2), 401–413 (2020)
4. Yang, M., Zhang, S., Zhang, H.: User trust negotiation model based on two-layer blockchain in heterogeneous alliance system. J. Appl. Sci. 37(2), 244–252 (2019)
5. Chen, W.H., Wan, J.: Xia: task-attribute-based access control scheme for IoT via blockchain. Comput. Mater. Continua 53(3), 2441–2453 (2020)