Badhe et al., 2023 - Google Patents
Access control systems based on blockchain technologyBadhe et al., 2023
View PDF- Document ID
- 8209235645039869068
- Author
- Badhe G
- Arjunwadkar D
- Publication year
- Publication venue
- Int. J. Eng. Technol. Manag. Sci
External Links
Snippet
Now a days the need for decentralized applications is increasing and blockchain provides the foundational technology for creating and developing them. The security and integrity of the blockchain network and its resources are supported by access controls, which is a …
- 238000005516 engineering process 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12294650B2 (en) | Dynamic authorization and access management | |
| Ali et al. | xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things | |
| CN110892691B (en) | Secure execution platform cluster | |
| Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
| Kaaniche et al. | A blockchain-based data usage auditing architecture with enhanced privacy and availability | |
| Sutradhar et al. | Enhancing identity and access management using hyperledger fabric and oauth 2.0: A block-chain-based approach for security and scalability for healthcare industry | |
| US20070101400A1 (en) | Method of providing secure access to computer resources | |
| Sauber et al. | A new secure model for data protection over cloud computing | |
| Elisa et al. | Consortium blockchain for security and privacy-preserving in E-government Systems | |
| Aramide | Decentralized identity for secure network access: A blockchain-based approach to user-centric authentication | |
| Khattak et al. | A study on threat model for federated identities in federated identity management system | |
| WO2007048251A1 (en) | Method of providing secure access to computer resources | |
| Anand et al. | Identity and access management systems | |
| Seyam et al. | A systematic review of blockchain-based identity management solutions | |
| Akbarfam et al. | Dlacb: Deep learning based access control using blockchain | |
| Mumtaz et al. | PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing. | |
| El Haddouti et al. | A secure and trusted fog computing approach based on blockchain and identity federation for a granular access control in iot environments | |
| Ferretti et al. | Authorization transparency for accountable access to IoT services | |
| Zhang et al. | A review on blockchain-based access control models in IoT applications | |
| Badhe et al. | Access control systems based on blockchain technology | |
| Shepherd | Zero trust architecture: Framework and case study | |
| Sagar et al. | Information security: safeguarding resources and building trust | |
| Jensen | Identity management lifecycle-exemplifying the need for holistic identity assurance frameworks | |
| Tanrıverdi | Blockchain-Based Secure Authentication Solution for Web Applications | |
| Kavyashree et al. | Security enhancement of IIOT with permissioned blockchain and cloud computing |