Almakhour et al., 2018 - Google Patents
Trustless blockchain-based access control in dynamic collaboration.Almakhour et al., 2018
View PDF- Document ID
- 14661027009771787422
- Author
- Almakhour M
- Sliman L
- Samhat A
- Gaaloul W
- Publication year
- Publication venue
- BDCSIntell
External Links
Snippet
AC (Access Control) is the process of ensuring that an authenticated user accesses only what he or she is authorized to do with respect to certain models and security policies. In business collaboration systems, services are designed to conduct actions requested by a …
- 238000000034 method 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kamboj et al. | User authentication using Blockchain based smart contract in role-based access control | |
Battah et al. | Blockchain-based multi-party authorization for accessing IPFS encrypted data | |
Sharma et al. | Blockchain technology for cloud storage: A systematic literature review | |
Cruz et al. | RBAC-SC: Role-based access control using smart contract | |
Guo et al. | Multi-authority attribute-based access control with smart contract | |
Novo | Blockchain meets IoT: An architecture for scalable access management in IoT | |
Di Francesco Maesa et al. | Blockchain based access control | |
Tobin et al. | The inevitable rise of self-sovereign identity | |
Rahman et al. | Blockchain-based access control management for decentralized online social networks | |
JP2023527811A (en) | Method, apparatus, and computer readable medium for authentication and authorization of networked data transactions | |
US9769137B2 (en) | Extensible mechanism for securing objects using claims | |
Sarfaraz et al. | AccessChain: An access control framework to protect data access in blockchain enabled supply chain | |
CN115699000A (en) | Method, apparatus and computer readable medium for secure multilateral data exchange over a computer network | |
TWI717927B (en) | Hybrid blockchain architecture with computing pool | |
Ali et al. | BCON: Blockchain based access CONtrol across multiple conflict of interest domains | |
Agarkar et al. | Blockchain aware decentralized identity management and access control system | |
Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
Almakhour et al. | Trustless blockchain-based access control in dynamic collaboration. | |
Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
Mounnan et al. | Decentralized access control infrastructure using blockchain for big data | |
Islam et al. | User authentication and access control to blockchain-based forensic log data | |
Nyante | Secure identity management on the blockchain | |
Jannes et al. | DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner | |
Shekar et al. | Securing personal identity using blockchain | |
Sabzmakan et al. | An improved distributed access control model in cloud computing by blockchain |