Blockchain for IoT access control: Recent trends and future research directions
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …
information and communication technologies, there is tremendous growth in the use of …
Blockchain-based authentication schemes in smart environments: A systematic literature review
This study presents a systematic literature review on blockchain-based authentication in
smart environments that include smart city, smart home, smart grid, smart healthcare, smart …
smart environments that include smart city, smart home, smart grid, smart healthcare, smart …
[HTML][HTML] A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges
Abstract The Internet of Things (IoT) network is rapidly expanding due to sudden
technological advancements, which enable objects to become intelligent and contribute to …
technological advancements, which enable objects to become intelligent and contribute to …
A survey on cross-chain technology: Challenges, development, and prospect
With the continuous development of blockchain technology, many blockchain applications,
such as digital currencies in the form of tokens, are deployed. However, due to the lack of …
such as digital currencies in the form of tokens, are deployed. However, due to the lack of …
Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey
The accelerated growth of networking technologies highlights the importance of
Authentication and Access Control (AAC) as protection against associated attacks …
Authentication and Access Control (AAC) as protection against associated attacks …
Attribute-based access control scheme for data sharing on hyperledger fabric
X Zhao, S Wang, Y Zhang, Y Wang - Journal of Information Security and …, 2022 - Elsevier
With the popularization of the IoT and big data, the application value of data has become
increasingly prominent. Therefore, it is particularly important to ensure the legitimate use of …
increasingly prominent. Therefore, it is particularly important to ensure the legitimate use of …
A DLT-based framework for secure IoT infrastructure in smart communities
In the field of smart communities, significant progress has been made in recent years. The
objective of constructing smart communities is to improve the quality of life of their …
objective of constructing smart communities is to improve the quality of life of their …
A novel access control method via smart contracts for internet-based service provisioning
The dramatic rise in internet-based service provisioning has highlighted the importance of
deploying scalable access control methods, facilitating service authorization for eligible …
deploying scalable access control methods, facilitating service authorization for eligible …
Identity and access management using distributed ledger technology: A survey
As the basic building block of any information security system, identity and access
management (IAM) solutions play vital role in enterprise's security programmes. Providing …
management (IAM) solutions play vital role in enterprise's security programmes. Providing …
A literature review on access control in networking employing blockchain
PADSN Wijesekara - The Indonesian Journal of Computer Science, 2024 - ijcs.net
Access Control (AC) in networking attempts to make sure that only authorized devices
perform actions formed upon privileges defined for them with a view to prevent malicious …
perform actions formed upon privileges defined for them with a view to prevent malicious …