Nothing Special   »   [go: up one dir, main page]

Zhao et al., 2024 - Google Patents

StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approach

Zhao et al., 2024

Document ID
2177435503223209078
Author
Zhao G
He H
Di B
Chu J
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Electronic portfolios are crucial means to evaluate the performance of students. However, the traditional student e-portfolio (SEP) system cannot meet the needs of guaranteeing students' information safety due to the system using centralized third-party storage. In …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Zhu et al. Digital asset management with distributed permission over blockchain and attribute-based access control
Shen et al. Blockchain for transparent data management toward 6G
Sharma et al. Blockchain-based cloud storage system with CP-ABE-based access control and revocation process
Sarfaraz et al. AccessChain: An access control framework to protect data access in blockchain enabled supply chain
Shammar et al. An attribute‐based access control model for Internet of Things using hyperledger fabric blockchain
Xu et al. An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption
Zhao et al. StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approach
Praveena Anjelin et al. Blockchain technology for data sharing in decentralized storage system
Cai et al. Socialchain: Decoupling social data and applications to return your data ownership
Spathoulas et al. Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?
Thilagavathy et al. A novel framework paradigm for EMR management cloud system authentication using blockchain security network
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Yang et al. PrivCrowd: A Secure Blockchain‐Based Crowdsourcing Framework with Fine‐Grained Worker Selection
Jamsrandorj Decentralized Access Control Using The Blockchain
Karanjai et al. Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection
CN117457133A (en) Decentralised electronic medical record sharing method and system supporting dynamic access
US11824896B2 (en) Cross-service rulebook management in a dynamic and adversarial environment
Piechotta et al. A secure dynamic collaboration environment in a cloud context
Velmurugan et al. Provably secure data selective sharing scheme with cloud-based decentralized trust management systems
Talukder et al. Blockchain-integrated secure framework for enhanced e-government services
Jaafar et al. Enhancing Educational Certificate Verification With Blockchain and IPFS: A Decentralized Approach Using Hyperledger Fab.
Pericherla et al. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain
Muni Venkateswarlu et al. A blockchain based approach to resource sharing in smart neighbourhoods
Yang et al. The next generation identity platform for digital era based on blockchain
Hu et al. EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System.