2019
DOI: 10.1007/s11276-019-01968-x
|View full text |Cite
|
Sign up to set email alerts
|

An extended access control model for permissioned blockchain frameworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…By default, Fabric uses Role-based Access Control. Khan et al [22] propose an alternative way of managing access control for private blockchain frameworks using Distributed Usage Control (DUC). Besides determining if access to a certain object on the ledger can be granted, using DUC would make it possible to track the usage of accessing these objects stored on the ledger.…”
Section: Related Workmentioning
confidence: 99%
“…By default, Fabric uses Role-based Access Control. Khan et al [22] propose an alternative way of managing access control for private blockchain frameworks using Distributed Usage Control (DUC). Besides determining if access to a certain object on the ledger can be granted, using DUC would make it possible to track the usage of accessing these objects stored on the ledger.…”
Section: Related Workmentioning
confidence: 99%
“…The ledger data can be stored in multiple formats and consensus mechanisms can be switched in and out. Fabric provides a secure and transparent Byzantine-fault tolerant (BFT) consensus algorithms for ensuring secure and reliable communication amongst the group of untrusted stakeholders [77].…”
Section: Hyperledger Fabric Blockchainmentioning
confidence: 99%
“…An option we have is to use the TRADERS contract to check every transaction, but this kind of controlled access is a property of a permissioned blockchain, like Hyperledger Fabric [24]. We decided that this issue lies outside of the scope of our proof of concept implementation and approaches like [25] can be used to resolve this issue in practice.…”
Section: Implementation and Evaluation A Implementationmentioning
confidence: 99%