Zhao et al., 2024 - Google Patents
StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approachZhao et al., 2024
- Document ID
- 2177435503223209078
- Author
- Zhao G
- He H
- Di B
- Chu J
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Electronic portfolios are crucial means to evaluate the performance of students. However, the traditional student e-portfolio (SEP) system cannot meet the needs of guaranteeing students' information safety due to the system using centralized third-party storage. In …
- 238000013459 approach 0 title abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Digital asset management with distributed permission over blockchain and attribute-based access control | |
Shen et al. | Blockchain for transparent data management toward 6G | |
Sharma et al. | Blockchain-based cloud storage system with CP-ABE-based access control and revocation process | |
Sarfaraz et al. | AccessChain: An access control framework to protect data access in blockchain enabled supply chain | |
Shammar et al. | An attribute‐based access control model for Internet of Things using hyperledger fabric blockchain | |
Xu et al. | An efficient blockchain‐based privacy‐preserving scheme with attribute and homomorphic encryption | |
Zhao et al. | StuChain: an efficient blockchain-based student e-portfolio platform integrating hybrid access control approach | |
Praveena Anjelin et al. | Blockchain technology for data sharing in decentralized storage system | |
Cai et al. | Socialchain: Decoupling social data and applications to return your data ownership | |
Spathoulas et al. | Can Blockchain Technology Enhance Security and Privacy in the Internet of Things? | |
Thilagavathy et al. | A novel framework paradigm for EMR management cloud system authentication using blockchain security network | |
Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
Yang et al. | PrivCrowd: A Secure Blockchain‐Based Crowdsourcing Framework with Fine‐Grained Worker Selection | |
Jamsrandorj | Decentralized Access Control Using The Blockchain | |
Karanjai et al. | Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection | |
CN117457133A (en) | Decentralised electronic medical record sharing method and system supporting dynamic access | |
US11824896B2 (en) | Cross-service rulebook management in a dynamic and adversarial environment | |
Piechotta et al. | A secure dynamic collaboration environment in a cloud context | |
Velmurugan et al. | Provably secure data selective sharing scheme with cloud-based decentralized trust management systems | |
Talukder et al. | Blockchain-integrated secure framework for enhanced e-government services | |
Jaafar et al. | Enhancing Educational Certificate Verification With Blockchain and IPFS: A Decentralized Approach Using Hyperledger Fab. | |
Pericherla et al. | Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain | |
Muni Venkateswarlu et al. | A blockchain based approach to resource sharing in smart neighbourhoods | |
Yang et al. | The next generation identity platform for digital era based on blockchain | |
Hu et al. | EduASAC: A Blockchain-Based Education Archive Sharing and Access Control System. |