Access Control Management of Information System based on Homomorphism and Blockchain Technology
Abstract
References
Index Terms
- Access Control Management of Information System based on Homomorphism and Blockchain Technology
Recommendations
Research on data access scheme based on attribute-based encryption in blockchain environment
ICCBN '23: Proceedings of the 2023 11th International Conference on Communications and Broadband NetworkingAccess control on shared data can limit illegal access and improve data privacy and security. Attribute-based encryption is one of the key technologies to realize fine-grained access control of data. Traditional access control schemes usually rely on ...
Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment
AbstractWith the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal. However, most of ...
Dynamic encryption method of personal privacy information in social network based on blockchain technology
In order to overcome the problems of low encryption accuracy, long encryption time and poor encryption effect in traditional methods, a dynamic encryption method of personal privacy information in social networks based on blockchain technology is ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 18Total Downloads
- Downloads (Last 12 months)15
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format