Login / Signup
A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control.
Jinshan Shi
Ru Li
Wenhan Hou
Published in:
IEEE Access (2020)
Keyphrases
</>
unauthorized access
access control
security policies
security vulnerabilities
role based access control
access control systems
access control policies
access rights
data security
distributed systems
network security
intrusion detection system
conflict resolution
database
data sets
information systems