OAuth 2.0 authorization using blockchain-based tokens.
Nikos FotiouIakovos PittarasVasilios A. SirisSpyros VoulgarisGeorge C. PolyzosPublished in: CoRR (2020)
Keyphrases
- access control
- security policies
- fine grained
- conflict resolution
- line segments
- security requirements
- dynamic access control
- hough transform
- role based access control
- trust management
- trust negotiation
- usage control
- feature extraction
- information technology
- high level
- website
- image processing
- computer vision
- artificial intelligence
- machine learning
- databases