[go: up one dir, main page]

Almakhour et al., 2018 - Google Patents

Trustless blockchain-based access control in dynamic collaboration.

Almakhour et al., 2018

View PDF
Document ID
14661027009771787422
Author
Almakhour M
Sliman L
Samhat A
Gaaloul W
Publication year
Publication venue
BDCSIntell

External Links

Snippet

AC (Access Control) is the process of ensuring that an authenticated user accesses only what he or she is authorized to do with respect to certain models and security policies. In business collaboration systems, services are designed to conduct actions requested by a …
Continue reading at ceur-ws.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Kamboj et al. User authentication using Blockchain based smart contract in role-based access control
Battah et al. Blockchain-based multi-party authorization for accessing IPFS encrypted data
Sharma et al. Blockchain technology for cloud storage: A systematic literature review
Cruz et al. RBAC-SC: Role-based access control using smart contract
Guo et al. Multi-authority attribute-based access control with smart contract
Novo Blockchain meets IoT: An architecture for scalable access management in IoT
Di Francesco Maesa et al. Blockchain based access control
Tobin et al. The inevitable rise of self-sovereign identity
Rahman et al. Blockchain-based access control management for decentralized online social networks
JP2023527811A (en) Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions
US9769137B2 (en) Extensible mechanism for securing objects using claims
Sarfaraz et al. AccessChain: An access control framework to protect data access in blockchain enabled supply chain
CN115699000A (en) Method, apparatus and computer readable medium for secure multilateral data exchange over a computer network
TWI717927B (en) Hybrid blockchain architecture with computing pool
Ali et al. BCON: Blockchain based access CONtrol across multiple conflict of interest domains
Agarkar et al. Blockchain aware decentralized identity management and access control system
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
Almakhour et al. Trustless blockchain-based access control in dynamic collaboration.
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
Mounnan et al. Decentralized access control infrastructure using blockchain for big data
Islam et al. User authentication and access control to blockchain-based forensic log data
Nyante Secure identity management on the blockchain
Jannes et al. DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner
Shekar et al. Securing personal identity using blockchain
Sabzmakan et al. An improved distributed access control model in cloud computing by blockchain