Mohsin et al., 2019 - Google Patents
Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directionsMohsin et al., 2019
View PDF- Document ID
- 1662181238816638437
- Author
- Mohsin A
- Zaidan A
- Zaidan B
- Albahri O
- Albahri A
- Alsalem M
- Mohammed K
- Publication year
- Publication venue
- Computer Standards & Interfaces
External Links
Snippet
As the first and last line of defence in many cases, authentication is a crucial part of a system. With authentication, any unauthorised access to the system can be prevented. This work maps the research landscape through two means. The first is a comprehensive …
- 238000005516 engineering process 0 abstract description 114
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohsin et al. | Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions | |
| Hussien et al. | A systematic review for enabling of develop a blockchain technology in healthcare application: taxonomy, substantially analysis, motivations, challenges, recommendations and future direction | |
| Alzoubi et al. | A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues | |
| Wu et al. | A comprehensive survey of blockchain: From theory to IoT applications and beyond | |
| Lemieux | Trusting records: is Blockchain technology the answer? | |
| Chaudhry et al. | Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm | |
| Wang et al. | Decentralized data outsourcing auditing protocol based on blockchain | |
| Yang et al. | An access control model based on blockchain master-sidechain collaboration | |
| Tawfik et al. | Blockchain-based access control and privacy preservation in healthcare: a comprehensive survey | |
| How et al. | Blockchain-enabled searchable encryption in clouds: a review | |
| Singh et al. | Blockchain-enabled verification of medical records using soul-bound tokens and cloud computing | |
| Kashif et al. | Differential privacy preserving based framework using blockchain for internet-of-things | |
| Chhabra et al. | Navigating the maze: Exploring blockchain privacy and its information retrieval | |
| Han et al. | A hybrid blockchain-based solution for secure sharing of electronic medical record data | |
| Bergman et al. | Revealing and concealing bitcoin identities: A survey of techniques | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| Gupta et al. | A comparative study on blockchain-based distributed public key infrastructure for IoT applications | |
| Spathoulas et al. | Can blockchain technology enhance security and privacy in the Internet of Things? | |
| Sharma et al. | A survey on privacy preserving methods of electronic medical record using blockchain | |
| Vijayakumar et al. | Enhancing cloud storage security through blockchain-enabled data deduplication and auditing with a fair payment | |
| Broshka et al. | Evaluating the importance of ssi-blockchain digital identity framework for cross-border healthcare patient record management | |
| Noh et al. | PyRos: A State Channel‐Based Access Control System for a Public Blockchain Network | |
| Mounnan et al. | Decentralized access control infrastructure using blockchain for big data | |
| Broshka et al. | Evaluating the importance of SSI-blockchain digital identity | |
| Banik et al. | Blockchain-Based Vehicle Information Management System |