Merlec et al., 2024 - Google Patents
SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT SystemsMerlec et al., 2024
View PDF- Document ID
- 8748683532759951890
- Author
- Merlec M
- In H
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Integrating blockchain technology with the Internet of Things (IoT) facilitates seamless interaction between IoT devices and systems to securely share, access, and exchange data. However, ensuring adequate access control within blockchain-enabled IoT (BIoT) systems …
- 230000007246 mechanism 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ouaddah et al. | Access control in the Internet of Things: Big challenges and new opportunities | |
Xu et al. | Blendcac: A blockchain-enabled decentralized capability-based access control for iots | |
Hu et al. | Guide to attribute based access control (abac) definition and considerations (draft) | |
Khan et al. | An extended access control model for permissioned blockchain frameworks | |
Hernandez-Ramos et al. | Security and privacy in internet of things-enabled smart cities: Challenges and future directions | |
Bouras et al. | IoT-CCAC: a blockchain-based consortium capability access control approach for IoT | |
Kagal et al. | Developing secure agent systems using delegation based trust management | |
Xu et al. | Decentralized access control for IoT based on blockchain and smart contract | |
Bagdasaryan et al. | Ancile: Enhancing privacy for ubiquitous computing with use-based privacy | |
Rahman | Scalable role-based access control using the eos blockchain | |
Veloudis et al. | Achieving security-by-design through ontology-driven attribute-based access control in cloud environments | |
Merlec et al. | SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems | |
Shammar et al. | An attribute‐based access control model for Internet of Things using hyperledger fabric blockchain | |
Singh et al. | ITrust: identity and trust based access control model for healthcare system security | |
Ray et al. | Trust-based access control for secure cloud computing | |
Alayda et al. | A novel hybrid approach for access control in cloud computing | |
Trabelsi et al. | Access control in Internet of Things: A survey | |
Rahman et al. | Context-aware and dynamic role-based access control using blockchain | |
Mishra et al. | Blockchain DrivenAccess control architecture for the internet of things | |
Sedrati et al. | IoT-Gov: an IoT governance framework using the blockchain | |
Pham et al. | On a taxonomy of delegation | |
Narayanan | Securing hadoop | |
Al-Jaroodi et al. | A survey of security middleware for pervasive and ubiquitous systems | |
Shi et al. | DUCE: Distributed usage control enforcement for private data sharing in Internet of Things | |
Salim et al. | Towards authorisation models for secure information sharing: A survey and research agenda |