In a distributed system, cross-domain access control is an important mechanism to realize secure data sharing among multiple domains. Most of the existing cross-domain access control mechanisms are generally based on a single-server architecture, which has limitations in terms of security and reliability (the access decision may be incorrect) and completeness and confidentiality (the access records can be modified). Blockchain technology with decentralization, verifiability, and immutability properties can solve these problems. Motivated by these facts, in this article, we construct a trusted and efficient cross-domain access control system based on blockchain. Consequently, we integrate blockchain and role mapping technology to provide rel...
Some recent trends in distributed intelligent systems rely extensively on agent-based approaches. Th...
Abstract For dispute resolution in daily life, tamper-proof data storage and retrieval of log data a...
Currently, the trust mechanisms of various Internet application platforms are still built under the ...
Access control systems control access to valuable resources such as files, tables, services, data st...
Access Control systems are used in computer security to reg- ulate the access to critical or valuab...
The concept of "network perimeter" in industrial control system is becoming vague due to the integra...
Access Control systems are a key resource in computer security to properly manage the access to digi...
We defined a distributed access control system on top of blockchain technology. The underlying idea ...
Trust and risk issue in distributed environments represent today an important research topic. Access...
A consortium system can leverage information to improve workflows, accountability, and transparency ...
To effectively participate in modern collaborations, member organizations should be able to share di...
Blockchain is an innovated and revolutionized technology, which has attracted wide attention from ac...
In today's on-demand computing and virtual coalition environment, cross-domain services are acquired...
This work proposes to exploit blockchain technology to define Access Control systems that guarantee ...
Nowadays, it is still a major challenge to design a secure cross-domain authentication protocol for ...
Some recent trends in distributed intelligent systems rely extensively on agent-based approaches. Th...
Abstract For dispute resolution in daily life, tamper-proof data storage and retrieval of log data a...
Currently, the trust mechanisms of various Internet application platforms are still built under the ...
Access control systems control access to valuable resources such as files, tables, services, data st...
Access Control systems are used in computer security to reg- ulate the access to critical or valuab...
The concept of "network perimeter" in industrial control system is becoming vague due to the integra...
Access Control systems are a key resource in computer security to properly manage the access to digi...
We defined a distributed access control system on top of blockchain technology. The underlying idea ...
Trust and risk issue in distributed environments represent today an important research topic. Access...
A consortium system can leverage information to improve workflows, accountability, and transparency ...
To effectively participate in modern collaborations, member organizations should be able to share di...
Blockchain is an innovated and revolutionized technology, which has attracted wide attention from ac...
In today's on-demand computing and virtual coalition environment, cross-domain services are acquired...
This work proposes to exploit blockchain technology to define Access Control systems that guarantee ...
Nowadays, it is still a major challenge to design a secure cross-domain authentication protocol for ...
Some recent trends in distributed intelligent systems rely extensively on agent-based approaches. Th...
Abstract For dispute resolution in daily life, tamper-proof data storage and retrieval of log data a...
Currently, the trust mechanisms of various Internet application platforms are still built under the ...