2021
DOI: 10.1016/j.dcan.2020.10.002
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain-empowered AAA scheme in the large-scale HetNet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 90 publications
(48 citation statements)
references
References 24 publications
0
48
0
Order By: Relevance
“…Shi et al . [88] AAA scheme It is a blockchain-empowered Authentication/Authorization/Auditing (AAA) scheme to protect the data in the large-scale HetNet where the access control permission of data is stored on the blockchain. Yu et al [112] AC scheme in IIoT It is a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories.…”
Section: Data Management-centric Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Shi et al . [88] AAA scheme It is a blockchain-empowered Authentication/Authorization/Auditing (AAA) scheme to protect the data in the large-scale HetNet where the access control permission of data is stored on the blockchain. Yu et al [112] AC scheme in IIoT It is a blockchain-enhanced security access control scheme that supports traceability and revocability has been proposed in IIoT for smart factories.…”
Section: Data Management-centric Solutionsmentioning
confidence: 99%
“…For this purpose, smart contracts can be used to express access control policies to transform the policy evaluation process into a distributed smart contract execution. In this context, several studies [36, 61,74,88,112,114] have been proposed. For instance, Maesa et al [61] proposed to exploit a blockchain to store access control policies and manage attributes, as well as to execute the access decision process.…”
Section: Data Accessmentioning
confidence: 99%
“…In this context, work in [32] allows distributed management of identity and authorization policies by lever-aging Blockchain technology. Similarly, in [33], Blockchain is used for the identity authentication, and the access control permission of data is redesigned and stored on the Blockchain. Authors in [34] use Blockchain to extract and analyze the re-quested permissions in an Android application.…”
Section: Blockchain In Broker Systemsmentioning
confidence: 99%
“…Other works that is of interest are : AuthPrivacyChain (blockchain-based access control framework with privacy protection) proposed by Caixia Yang, et al, [10]; blockchain-empowered AAA scheme for accessing data of LS-HetNet proposed by Na Shi, et al, [70] and zkCrowd (an innovative hybrid blockchain crowdsourcing platform) named and proposed by, Saide Zhu et al, [80].…”
Section: B Block Chain In Health Carementioning
confidence: 99%