Maesa et al., 2019 - Google Patents
A blockchain based approach for the definition of auditable access control systemsMaesa et al., 2019
View PDF- Document ID
- 16195191750743376411
- Author
- Maesa D
- Mori P
- Ricci L
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
This work proposes to exploit blockchain technology to define Access Control systems that guarantee the auditability of access control policies evaluation. The key idea of our proposal is to codify attribute-based Access Control policies as smart contracts and deploy them on a …
- 238000011156 evaluation 0 abstract description 81
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Maesa et al. | A blockchain based approach for the definition of auditable access control systems | |
| Younis et al. | An access control model for cloud computing | |
| EP2025092B1 (en) | Abstracting security policy from, and transforming to, native representations of access check mechanisms | |
| US20090205018A1 (en) | Method and system for the specification and enforcement of arbitrary attribute-based access control policies | |
| US9805172B2 (en) | System and methods of resource usage using an interoperable management framework | |
| CN112738194A (en) | Access control system for safe operation and maintenance management | |
| Buecker et al. | Reduce Risk and Improve Security on IBM Mainframes: Volume 1 Architecture and Platform Security | |
| Mazzoleni et al. | XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! | |
| Ray et al. | Trust-based access control for secure cloud computing | |
| Belmann et al. | de. NBI Cloud federation through ELIXIR AAI | |
| Morelli et al. | Audit-based access control with a distributed ledger: Applications to healthcare organizations | |
| Delessy et al. | Patterns for access control in distributed systems | |
| Sherazi et al. | A blockchain based approach for the authorization policies delegation in emergency situations | |
| Jannes et al. | DEDACS: Decentralized and dynamic access control for smart contracts in a policy-based manner | |
| Bandopadhyay et al. | DataPAL: data protection and authorization lifecycle framework | |
| Boltz et al. | Modeling and analyzing zero trust architectures regarding performance and security | |
| Babuji et al. | Enabling interactive analytics of secure data using cloud kotta | |
| Puligheddu et al. | Managing CRM with Fabric Hyperledger blockchain technology | |
| Moyo et al. | The Use of Blockchain for Identity and Access Management (IAM) in Multi-cloud | |
| Alamri et al. | Evaluation factors for blockchain identity management systems | |
| Mahar et al. | TTECCDU: a blockchain-based approach for expressive authorization management | |
| Bijon | Constraints for attribute based access control with application in cloud IaaS | |
| Sehra et al. | Policy specification in role based access control on clouds | |
| Ots | Identity and Access Management | |
| Bertino et al. | Security for distributed systems—foundations of access control |