Showing 61 - 80 results of 362 for search '"access control"', query time: 0.07s Refine Results
  1. 61
  2. 62

    A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing by Canling Wang, Wei Wu, Fulong Chen, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao

    Published 2024-01-01
    “…Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. …”
    Get full text
    Article
  3. 63

    Multi-authority attribute-based access control system in mHealth with traceability by Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO

    Published 2018-06-01
    “…Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to enhance fine-grained access control over encrypted data.However,existing attribute-based mHealth systems either lack of efficient traceable approach,or support only single authority.A traceable multi-authority attribute-based access control mHealth scheme was proposed,which was constructed over composite order groups and supports any monotonic access structures described by linear secret sharing scheme (LSSS).The adaptive security was proved under subgroup decisional assumptions.The traceability was proved under k-strong Diffie-Hellman (k-SDH) assumption.The performance analysis indicates that the proposed scheme is efficient and available.…”
    Get full text
    Article
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78

    Task-based access control mode of peer-to-peer network based on fuzzy theory by Hao LIU, Lian-ming ZHANG, Zhi-gang CHEN

    Published 2017-02-01
    “…The opening and self-organization features of P2P network brings a series of security risks,andthe traditional access control model is not suitable for P2P network as it is a kind of distributed management system.Task-based access control mode of P2P network was proposed based on fuzzy theory.And the formalization description and analysis of the model was also proposed.The risk value of each transaction was calculated through hierarchy process analysis and fuzzy comprehensive evaluation.In this model,according to the risk value of each transaction,the dynamic management of ac-cess authority was realized by extending task-basedaccess control model.The results show that this model can restrain the success of noncooperative nodes transaction and raise the success of the whole P2P network system transaction,thus improving the security of P2P network system.…”
    Get full text
    Article
  19. 79
  20. 80

    Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital by Fauzan Natsir, Imam Riadi, Yudi Prayudi

    Published 2019-10-01
    “…Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). …”
    Get full text
    Article