The evolution of smart contract platforms: A look at current trends and future directions

T Timuçin, S Biroğul - Mugla Journal of Science and Technology, 2023 - dergipark.org.tr
Blockchain-based smart contracts are self-running computer programs that can automate a
variety of commercial activities. Currently, the majority of these decentralized applications …

[HTML][HTML] A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art

MS Ahsan, ASK Pathan - IoT, 2025 - mdpi.com
The Internet of Things (IoT) is a technologyof connecting billions of devices with
heterogeneous types and capabilities. Even though it is an attractive environment that could …

A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes

A Abid, S Cheikhrouhou, S Kallel, M Jmaiel - Computer Standards & …, 2025 - Elsevier
Blockchain is a potential technology for collaborating organizations, notably for executing
their Inter-Organizational Business Processes (IOBPs). While Blockchain's transparency and …

A smart contract-driven access control scheme with integrity checking for electronic health records

H Li, D Li, W Liang - Cluster Computing, 2024 - Springer
The application of healthcare systems has led to an explosive growth in personal electronic
health records (EHRs). These EHRs are generated from different healthcare institutions and …

Fuzzy-Enhanced Secure Messaging Framework for Smart Healthcare System

N Patel, D Patel, NK Jadav, T Rathod, S Tanwar… - IEEE …, 2024 - ieeexplore.ieee.org
The healthcare industry is exponentially growing its dependence on smart wearables and
remote devices for efficient treatment and diagnosis. These smart devices benefit the …

Zero-Trust Blockchain-Enabled Secure Next-Generation Healthcare Communication Network

H Zhu, X Xue, M Xu, BG Kim, X Lyu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Conventional security architectures and models are considered single-network architecture
solutions, which assume that devices authenticated within the network are implicitly trusted …

[HTML][HTML] Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review

S Mariettou, C Koutsojannis, V Triantafillou - Algorithms, 2025 - mdpi.com
This paper explores the overall picture regarding healthcare security systems through an
extensive literature review. As the healthcare sector has now become digitalized, the …

PAVA: Privacy-Preserving Attribute-Based Verifiable Authentication in Healthcare using Smart Contracts

M Chegenizadeh, CJ Tessone - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
This paper explores the synergetic potential of blockchain technology and attribute-based
encryption to enhance security and privacy in decentralized data sharing systems …

Thematic editorial: edge computing, fog computing, and internet of things

A Fernández Anta - The Computer Journal, 2024 - academic.oup.com
Edge computing processes data near the source, minimizing latency and reducing
bandwidth consumption by avoiding unnecessary data transmission to cloud servers. This …

Thematic Editorial, It Is Hard To Imagine A World Without Algorithms and Data Science

F Kamareddine - The Computer Journal, 2024 - academic.oup.com
It is hard to imagine where we would be today without the algorithm or the computer
technology and we certainly would miss important luxuries (and even necessities) if there …