[go: up one dir, main page]

Maesa et al., 2019 - Google Patents

A blockchain based approach for the definition of auditable access control systems

Maesa et al., 2019

View PDF
Document ID
16195191750743376411
Author
Maesa D
Mori P
Ricci L
Publication year
Publication venue
Computers & Security

External Links

Snippet

This work proposes to exploit blockchain technology to define Access Control systems that guarantee the auditability of access control policies evaluation. The key idea of our proposal is to codify attribute-based Access Control policies as smart contracts and deploy them on a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Similar Documents

Publication Publication Date Title
Maesa et al. A blockchain based approach for the definition of auditable access control systems
Younis et al. An access control model for cloud computing
EP2025092B1 (en) Abstracting security policy from, and transforming to, native representations of access check mechanisms
US20090205018A1 (en) Method and system for the specification and enforcement of arbitrary attribute-based access control policies
US9805172B2 (en) System and methods of resource usage using an interoperable management framework
CN112738194A (en) Access control system for safe operation and maintenance management
Buecker et al. Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security
Mazzoleni et al. XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Ray et al. Trust-based access control for secure cloud computing
Belmann et al. de. NBI Cloud federation through ELIXIR AAI
Morelli et al. Audit-based access control with a distributed ledger: Applications to healthcare organizations
Delessy et al. Patterns for access control in distributed systems
Sherazi et al. A blockchain based approach for the authorization policies delegation in emergency situations
Jannes et al. DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner
Bandopadhyay et al. DataPAL: data protection and authorization lifecycle framework
Boltz et al. Modeling and analyzing zero trust architectures regarding performance and security
Babuji et al. Enabling interactive analytics of secure data using cloud kotta
Puligheddu et al. Managing CRM with Fabric Hyperledger blockchain technology
Moyo et al. The Use of Blockchain for Identity and Access Management (IAM) in Multi-cloud
Alamri et al. Evaluation factors for blockchain identity management systems
Mahar et al. TTECCDU: a blockchain-based approach for expressive authorization management
Bijon Constraints for attribute based access control with application in cloud IaaS
Sehra et al. Policy specification in role based access control on clouds
Ots Identity and Access Management
Bertino et al. Security for distributed systems—foundations of access control