2017
DOI: 10.1007/978-3-319-59665-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based Access Control

Abstract: Access Control systems are used in computer security to regulate the access to critical or valuable resources. The rights of subjects to access such resources are typically expressed through access control policies, which are evaluated at access request time against the current access context. This paper proposes a new approach based on blockchain technology to publish the policies expressing the right to access a resource and to allow the distributed transfer of such right among users. In our proposed protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 198 publications
(56 citation statements)
references
References 7 publications
0
56
0
Order By: Relevance
“…An example would be a data access token, which the owner of a dataset (such as a health record or credit history) issues to a third party wishing to access some of the data. The token functions like a key to the datastore, and transactions of that token are recorded on a blockchain ledger to keep track of who has been granted permission and access (Maesa et al, 2017).…”
Section: The Interplay Of Identifiers Personas and Key Pairs On Thementioning
confidence: 99%
“…An example would be a data access token, which the owner of a dataset (such as a health record or credit history) issues to a third party wishing to access some of the data. The token functions like a key to the datastore, and transactions of that token are recorded on a blockchain ledger to keep track of who has been granted permission and access (Maesa et al, 2017).…”
Section: The Interplay Of Identifiers Personas and Key Pairs On Thementioning
confidence: 99%
“…Accordingly, the contract's interfaces are based upon a Role-based Access Control (RBAC) scheme. We do not describe the access control contract in detail here, as there are other works describing blockchain-based access control schemes [5].…”
Section: Capabilitiesmentioning
confidence: 99%
“…With the widespread use of DLT, and, more specifically, blockchain, novel approaches to resolve the access control problematic appeared using this paradigm, including in e-Health scenarios. Maesa et al [20] proposes a blockchainbased access control, implementing ABAC on top of the blockchain technology, following the XACML reference architecture. This approach validates itself through a reference implementation on top of Bitcoin.…”
Section: Blockchain Applied To Access Controlmentioning
confidence: 99%