Hashemi et al., 2017 - Google Patents
Decentralized user-centric access control using pubsub over blockchainHashemi et al., 2017
View PDF- Document ID
- 3303502076731375760
- Author
- Hashemi S
- Faghri F
- Campbell R
- Publication year
- Publication venue
- arXiv preprint arXiv:1710.00110
External Links
Snippet
We present a mechanism that puts users in the center of control and empowers them to dictate the access to their collections of data. Revisiting the fundamental mechanisms in security for providing protection, our solution uses capabilities, access lists, and access …
- 239000003814 drug 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharma et al. | Blockchain technology for cloud storage: A systematic literature review | |
US11113410B2 (en) | User controlled, decentralized, distributed, and secure content distribution | |
US11741083B2 (en) | Cross-shard private atomic commit | |
Hashemi et al. | World of empowered IoT users | |
US11943237B2 (en) | Malicious peer identification for database block sequence | |
US11949691B2 (en) | Malicious peer identification | |
US11641364B2 (en) | Cross-domain state synchronization | |
KR102726544B1 (en) | Cross-Network Identity Provisioning | |
KR20220044306A (en) | Partially-aligned blockchain | |
US11275859B2 (en) | Preservation of privacy in large datasets | |
Hashemi et al. | Decentralized user-centric access control using pubsub over blockchain | |
US20210297271A1 (en) | Subscription service for networks | |
US20210256145A1 (en) | Preservation of privacy in large datasets | |
Ghorbel et al. | Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain | |
US20230208640A1 (en) | Selective audit process for privacy-preserving blockchain | |
US20220182237A1 (en) | Entangled token structure for blockchain networks | |
US11228424B2 (en) | Blu-ray copy service | |
WO2022057451A1 (en) | Threshold encryption for broadcast content | |
US20210224404A1 (en) | Privacy-preserving document sharing | |
WO2023046409A1 (en) | Digital asset platform with hsm verification | |
US20220398567A1 (en) | Provable trade secrets on blockchain networks | |
US11310311B2 (en) | Media obfuscation | |
CN114830594A (en) | Anonymization of partners | |
US20210224405A1 (en) | Privacy-preserving document sharing | |
Tharani et al. | A blockchain-based database management system |