2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) 2019
DOI: 10.1109/bloc.2019.8751479
|View full text |Cite
|
Sign up to set email alerts
|

DAcc: Decentralized Ledger based Access Control for Enterprise Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Big Data, Application Binaries, Plant Phenotyping and Industry 4.0 Systems, Enterprise applications -The other application domains that the studies targeted have provided a direction to be followed to further the research in these application areas. The areas that were focused on were big data [49], application binaries [62], plant phenotyping [63], industry 4.0 systems [84], enterprise applications [46,59], solid ecosystem [28], file sharing [74], digital currency [16], knowledge management systems [30], global internet economy [78] and some generic applications as well.…”
Section: Rq3: What Are the Various Application Domains Covered By Blo...mentioning
confidence: 99%
“…Big Data, Application Binaries, Plant Phenotyping and Industry 4.0 Systems, Enterprise applications -The other application domains that the studies targeted have provided a direction to be followed to further the research in these application areas. The areas that were focused on were big data [49], application binaries [62], plant phenotyping [63], industry 4.0 systems [84], enterprise applications [46,59], solid ecosystem [28], file sharing [74], digital currency [16], knowledge management systems [30], global internet economy [78] and some generic applications as well.…”
Section: Rq3: What Are the Various Application Domains Covered By Blo...mentioning
confidence: 99%
“…They also make use of split keys to protect private data. They use decentralised storage in form of hadoop [13]. Such a storage solution results in data being stored on behalf of other entities, something thatis necessary to avoid in order to meet our requirements.…”
Section: Related Workmentioning
confidence: 99%