2021
DOI: 10.1016/j.jnca.2020.102950
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 80 publications
(25 citation statements)
references
References 58 publications
0
25
0
Order By: Relevance
“…Hence, to solve this problem, Blockchain can be integrated with AI to protect data access and secure the implementation of federated learning in healthcare applications. Through smart contracts, access control rules will be imposed on the data access from different data holders for secure data sharing [27,[48][49][50][51][52][53][54][55]. Table 17 gives overview of some Blockchain for AI based healthcare applications.…”
Section: • Energy Marketmentioning
confidence: 99%
“…Hence, to solve this problem, Blockchain can be integrated with AI to protect data access and secure the implementation of federated learning in healthcare applications. Through smart contracts, access control rules will be imposed on the data access from different data holders for secure data sharing [27,[48][49][50][51][52][53][54][55]. Table 17 gives overview of some Blockchain for AI based healthcare applications.…”
Section: • Energy Marketmentioning
confidence: 99%
“…The introduction of smart contracts and blockchain technology has paved the way toward the development of efficient EHR access control approaches for supporting secure identification, authorization, and authentication of clients and studying state-of-the-art blockchain-based approaches of the access control in the healthcare industry. A thematic classification of blockchain-based access control approaches has been suggested to obtain the following objectives: recognize the security problems that are related to available approaches, highlight the main requirements of security for designing a granular access control approach, and examine the differences and similarities of the conventional approaches of access control and some of the important and outstanding challenges as future directions [13].…”
Section: Previous Related Workmentioning
confidence: 99%
“…Another aim of this review is to attract the attention of scientists to this field and boost the informatics/bioinformatics community to develop new approaches for solving the problems on these issues. Recently, some review papers are published on similar topics (Casino, Dasaklis & Patsakis, 2019;Drosatos & Kaldoudi, 2019;Abu-elezz et al, 2020;Hasselgren, et al, 2020;Ramachandran et al, 2020;Ahmad et al, 2021;Sookhak et al, 2021;Omar et al, 2021).…”
Section: Rationale Of the Review And Intended Audiencementioning
confidence: 99%