Articles with "access control" as a keyword



Blockchain‐based access control with k $k$ ‐times tamper resistance in cloud environment

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22904

Abstract: While cloud computing services such as cloud storage are fairly mature, it remains challenging to design efficient and secure cryptographic schemes to facilitate fine‐grained access control and achieve other features. For example, existing ciphertext‐policy attribute‐based… read more here.

Keywords: blockchain based; control times; based access; access control ... See more keywords

Safe design and evolution of smart contracts using dynamic condition response graphs to model generic role‐based behaviors

Sign Up to like & get
recommendations!
Published in 2024 at "Journal of Software: Evolution and Process"

DOI: 10.1002/smr.2730

Abstract: Smart contracts executed on blockchains are interactive programs where external actors generate events that trigger function invocations. Events can be emitted by participants asynchronously. However, some functionalities should be restricted to participants inhabiting specific roles… read more here.

Keywords: access; access control; evolution smart; smart contracts ... See more keywords
Photo by byfortytwo from unsplash

FPGA Implementation of Lifting-Based Data Hiding Scheme for Efficient Quality Access Control of Images

Sign Up to like & get
recommendations!
Published in 2019 at "Circuits, Systems, and Signal Processing"

DOI: 10.1007/s00034-018-0893-6

Abstract: AbstractIn this paper, a hardware implementation of a data hiding technique is proposed for efficient quality access control of images using lifting-based discrete wavelet transformation (DWT). Host image is decomposed into n-level wavelet tiles. A… read more here.

Keywords: scheme; implementation; quality; access control ... See more keywords

Efficient access control system based on aesthetic QR code

Sign Up to like & get
recommendations!
Published in 2017 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-017-1089-y

Abstract: With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The… read more here.

Keywords: aesthetic code; access control; control system; code ... See more keywords

OrBAC from access control model to access usage model

Sign Up to like & get
recommendations!
Published in 2017 at "Applied Intelligence"

DOI: 10.1007/s10489-017-1064-3

Abstract: The purpose based access control model has been proposed recently to restrict the access to the sensitive data which are out of control of their owner. This model can be enforced by ensuring that the… read more here.

Keywords: model; access control; control model; access ... See more keywords

A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0863-y

Abstract: WSN-integrated cloud computing (WCC) has become a promising cloud service architecture, in which sensors and mobile devices are utilized as the data collecting and processing nodes for the cloud service model, while cloud servers can… read more here.

Keywords: data access; wsn; fine grained; access control ... See more keywords
Photo from wikipedia

A flexible fine-grained dynamic access control approach for cloud computing environment

Sign Up to like & get
recommendations!
Published in 2021 at "Cluster Computing"

DOI: 10.1007/s10586-020-03196-x

Abstract: As a pioneering surge of ICT technologies, offering computing resources on-demand, the exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the same time, security stands as a most prior… read more here.

Keywords: cloud; cloud computing; access control; computing environment ... See more keywords
Photo from wikipedia

A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis

Sign Up to like & get
recommendations!
Published in 2021 at "Information Systems Frontiers"

DOI: 10.1007/s10796-021-10167-z

Abstract: Over the past few years, several efforts have been made to enable specification and enforcement of flexible and dynamic access control policies using traditional access control (such as role based access control (RBAC), etc.) and… read more here.

Keywords: heterogeneous access; control policies; access; administrative model ... See more keywords

A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Medical Systems"

DOI: 10.1007/s10916-019-1467-2

Abstract: As a consequence of the epidemiological transition towards non-communicable diseases, integrated care approaches are required, not solely focused on medical purposes, but also on a range of essential activities for the maintenance of the individuals’… read more here.

Keywords: control policies; access control; definition access;

Emergency Medical Access Control System Based on Public Blockchain

Sign Up to like & get
recommendations!
Published in 2024 at "Journal of Medical Systems"

DOI: 10.1007/s10916-024-02102-x

Abstract: IT has made significant progress in various fields over the past few years, with many industries transitioning from paper-based to electronic media. However, sharing electronic medical records remains a long-term challenge, particularly when patients are… read more here.

Keywords: system; public blockchain; emergency; access control ... See more keywords

ITrust: identity and trust based access control model for healthcare system security

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-07923-4

Abstract: The patient and healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging healthcare system has several advantages such as better management of the… read more here.

Keywords: healthcare; healthcare system; trust; access control ... See more keywords