최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.26 no.7, 2022년, pp.1060 - 1070
이용주 (Division of Software, Chungbuk National University) , 우성희 (Department of Computer Engineering, Korea National University of Transportation)
With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This pap...
Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, "Smart Contract-Based Access Control for the Internet of Things," IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1594-1605, Jun. 2018.
F. Tschorsch and B. Scheuermann, "Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084-2123, Mar. 2016.
Y. J. Lee, K. M. Lee, and S. H. Lee, "Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment," Peer-to-Peer Networking and Applications, vol. 13, no. 2, pp. 671-683, May. 2019.
O. Novo, "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1184-1195, Apr. 2018.
N. Atzei, M. Bartoletti, and T. Cimoli, "A Survey of Attacks on Ethereum Smart Contracts," in Proceedings of the 6th International Conference on Principles of Security and Trust, Uppsala, Sweden, vol. 10204, pp. 164-186, Apr. 2017.
A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravarm, "Blockchain for IoT security and privacy: The case study of a smart home," in IEEE international conference on pervasive computing and communications workshops (PerCom workshops), Kona: HI, USA, pp. 618-623, 2017.
C. Dannen, Introducing Ethereum and Solidity, CA: Apress Berkeley, USA, 2017.
J. P. Cruz, Y. Kaji, and N. Yanai, "RBAC-SC: Role-based Access Control Using Smart Contract," IEEE Access, vol. 6, pp. 12240-12251, Mar. 2018.
Y. Lee and K. M. Lee, "Blockchain-based RBAC for user authentication with anonymity," in Proceedings of the Conference on Research in Adaptive and Convergent Systems, Chongqing, China, pp. 289-294, 2019.
A. Ouaddah, A. A. Elkalam, and A. Ouahman, "FairAccess: a new Blockchain-based access control framework for the Internet of Things," Security and communication networks, vol. 9, no. 18, pp. 5943-5964, Feb. 2017.
G. Zyskind, O. Nathan, and A. S. Pentland, "Decentralizing Privacy: Using Blockchain to Protect Personal Data," in IEEE Security and Privacy Workshops, San Jose: CA, USA, pp. 180-184, 2015.
Y. Xiao, N. Zhang, J. Li, W. Lou, and Y. T. Hou, "PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-Chain Contract Execution," in European Symposium on Research in Computer Security, Guildfor, UK, pp. 610-629, 2020.
D. D. F. Maesa, P. Mori, and L. Ricci "Blockchain Based Access Control," in IFIP International Conference on Distributed Applications and Interoperable Systems, Neuchatel, Switzerland, pp. 206-220, 2017.
O. J. A. Pinno, A. R. A. Gregio, and L. C. E. D. Boan, "Controlchain: Blockchain as a central enabler for access control authorizations in the iot," in GLOBECOM IEEE Global Communications Conference, Singapore, pp. 1-6. 2017.
G. Fragkos, J. Johnson, and E. E. Tsiropoulou, "Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach," IEEE Transactions on Human-Machine Systems, pp. 1-13, Apr. 2022.
D. Ferraiolo, R. Sandhu, S. Gavrilla, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 224-274, Aug. 2001.
G. J. Sahani, C. S. Thaker, and S. M. Shah, "Scalable RBAC model for large-scale applications with automatic user-role assignment," International Journal of Communication Networks and Distributed Systems, vol. 28, no. 1, pp. 76-102, 2022.
C. Lin, D. He, X. Huang, K. -K. R. Choo, and A. V. Vasilakos, "BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0," Journal of Network and Computer Applications, vol. 116, no. 15, pp. 42-52, Aug. 2018.
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST Model for Role-based Access Control: Towards a Unified Standard," in Fifth ACM Workshop on Role-based Access Control, Berlin, Germany, pp. 47-63, Jul. 2000.
C. Dukkipati, Y. Zhang, and L. C. Cheng, "Decentralized, Blockchain based Access Control Framework for the Heterogeneous Internet of Things," in Proceedings of the Third ACM Workshop on Attribute-Based Access Control, Tempe: AZ, USA, pp. 61-69, Mar. 2018.
O. -C. Ri, Y. -J. Kim, and Y. -J. Jong, "Blockchain-based RBAC Model with Separation of Duties constraint in Cloud Environment," arXiv preprint, arXiv:2203.00351., Mar. 2022.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.