[go: up one dir, main page]

Badhe et al., 2023 - Google Patents

Access control systems based on blockchain technology

Badhe et al., 2023

View PDF
Document ID
8209235645039869068
Author
Badhe G
Arjunwadkar D
Publication year
Publication venue
Int. J. Eng. Technol. Manag. Sci

External Links

Snippet

Now a days the need for decentralized applications is increasing and blockchain provides the foundational technology for creating and developing them. The security and integrity of the blockchain network and its resources are supported by access controls, which is a …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • G06F15/163Interprocessor communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US12294650B2 (en) Dynamic authorization and access management
Ali et al. xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things
CN110892691B (en) Secure execution platform cluster
Indu et al. Identity and access management in cloud environment: Mechanisms and challenges
Kaaniche et al. A blockchain-based data usage auditing architecture with enhanced privacy and availability
Sutradhar et al. Enhancing identity and access management using hyperledger fabric and oauth 2.0: A block-chain-based approach for security and scalability for healthcare industry
US20070101400A1 (en) Method of providing secure access to computer resources
Sauber et al. A new secure model for data protection over cloud computing
Elisa et al. Consortium blockchain for security and privacy-preserving in E-government Systems
Aramide Decentralized identity for secure network access: A blockchain-based approach to user-centric authentication
Khattak et al. A study on threat model for federated identities in federated identity management system
WO2007048251A1 (en) Method of providing secure access to computer resources
Anand et al. Identity and access management systems
Seyam et al. A systematic review of blockchain-based identity management solutions
Akbarfam et al. Dlacb: Deep learning based access control using blockchain
Mumtaz et al. PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing.
El Haddouti et al. A secure and trusted fog computing approach based on blockchain and identity federation for a granular access control in iot environments
Ferretti et al. Authorization transparency for accountable access to IoT services
Zhang et al. A review on blockchain-based access control models in IoT applications
Badhe et al. Access control systems based on blockchain technology
Shepherd Zero trust architecture: Framework and case study
Sagar et al. Information security: safeguarding resources and building trust
Jensen Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks
Tanrıverdi Blockchain-Based Secure Authentication Solution for Web Applications
Kavyashree et al. Security enhancement of IIOT with permissioned blockchain and cloud computing