The specification and enforcement of network-wide policies in a single administrative domain is common in today's networks and considered as already resolved. However, this is not the case for multi-administrative domains, e.g. among different enterprises. In such situation, new problems arise that challenge classical solutions such as PKIs, which suffer from scalability and granularity concerns. In this paper, we present an extension to Group-Based Policy -a widely used network policy languagefor the aforementioned scenario. To do so, we take advantage of a permissioned blockchain implementation (Hyperledger Fabric) to distribute access control policies in a secure and auditable manner, preserving at the same time the independence of each ...
This paper presents an architecture of a Personal Information Management System, in which individual...
International audiencePermissioned blockchains are decentralized digital systems, which are used to ...
In a distributed system, cross-domain access control is an important mechanism to realize secure dat...
We defined a distributed access control system on top of blockchain technology. The underlying idea ...
Access Control systems are used in computer security to reg- ulate the access to critical or valuab...
Blockchain technologies allow users to securely store and trace their data on a fully decentralized ...
Abstract With the rapid increment of the demand for data sharing among parties, data is considered a...
The use of blockchain technology has been proposed to provide auditable access control for individua...
International audienceIn the Internet of Things (IoT) context, the number of connected devices can b...
The concept of "network perimeter" in industrial control system is becoming vague due to the integra...
Multi-party business processes are based on the cooperation of different actors in a distributed set...
Access control is one of the fundamental security mechanisms of IT systems. Most existing access con...
Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primiti...
Although there are several access control systems in the literature for flexible policy management i...
This work proposes to exploit blockchain technology to define Access Control systems that guarantee ...
This paper presents an architecture of a Personal Information Management System, in which individual...
International audiencePermissioned blockchains are decentralized digital systems, which are used to ...
In a distributed system, cross-domain access control is an important mechanism to realize secure dat...
We defined a distributed access control system on top of blockchain technology. The underlying idea ...
Access Control systems are used in computer security to reg- ulate the access to critical or valuab...
Blockchain technologies allow users to securely store and trace their data on a fully decentralized ...
Abstract With the rapid increment of the demand for data sharing among parties, data is considered a...
The use of blockchain technology has been proposed to provide auditable access control for individua...
International audienceIn the Internet of Things (IoT) context, the number of connected devices can b...
The concept of "network perimeter" in industrial control system is becoming vague due to the integra...
Multi-party business processes are based on the cooperation of different actors in a distributed set...
Access control is one of the fundamental security mechanisms of IT systems. Most existing access con...
Access Control (AC) is a fundamental aspect of modern technology infrastructure. While most primiti...
Although there are several access control systems in the literature for flexible policy management i...
This work proposes to exploit blockchain technology to define Access Control systems that guarantee ...
This paper presents an architecture of a Personal Information Management System, in which individual...
International audiencePermissioned blockchains are decentralized digital systems, which are used to ...
In a distributed system, cross-domain access control is an important mechanism to realize secure dat...