Using Blockchain for IOT Access Control and Authentication Management

Author(s):  
Abdallah Zoubir Ourad ◽  
Boutheyna Belgacem ◽  
Khaled Salah
2013 ◽  
Vol 756-759 ◽  
pp. 710-714
Author(s):  
Xu Yin ◽  
Hai Bei Zheng

Access control through restricting users to access to resources, prevents invasion of illegal users and legal users access to unauthorized resources to ensure integrity and privacy of workflow data, which is the key of workflow security mechanism. According to the identity authentication and access authority control, the paper analyzes the safety management entrusted mechanism of Acegi which is Spring security framework, makes full use of its characteristics of depended injection (DI), and realizes statement and configuration of all kinds of safety components such as authentication management and access decision management.


2012 ◽  
Vol 232 ◽  
pp. 701-705
Author(s):  
Yi Li ◽  
Dong Liu ◽  
Bo Wang ◽  
Xin Ming Li

The concept of authentication network is proposed to solve the security problems of complex network. The basic idea of authentication network is to ensure that everything of network must be authenticated. The technologies about authentication node, including the trusted root and trusted chain are studied. The security technologies about authentication networks, including trusted transmission, distributed and tree authentication management, multistage and multilayer access control strategy are also researched. At last, the security abilities of authentication network are analyzed.


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

2012 ◽  
Vol 1 (7) ◽  
pp. 78-79
Author(s):  
Anitha Chepuru ◽  
◽  
Dr.K.Venugopal Rao ◽  
Amardeep Matta
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document