A review of distributed access control for blockchain systems towards securing the internet of things
I Butun, P Österberg - IEEE Access, 2020 - ieeexplore.ieee.org
As the Internet of Things (IoT) paradigm gets more attention from academia and industry,
implementation tools of IoT will be explored more and more. One example is the applicability …
implementation tools of IoT will be explored more and more. One example is the applicability …
Cryptocurrency networks: A new P2P paradigm
S Delgado-Segura, C Pérez-Solà… - Mobile Information …, 2018 - Wiley Online Library
P2P networks are the mechanism used by cryptocurrencies to disseminate system
information while keeping the whole system as much decentralized as possible …
information while keeping the whole system as much decentralized as possible …
Blockchain based resource governance for decentralized web environments
Decentralization initiatives such as Solid, Digi. me, and ActivityPub aim to give data owners
more control over their data and to level the playing field by enabling small companies and …
more control over their data and to level the playing field by enabling small companies and …
A trust based approach for protecting user data in social networks
B Ali, W Villegas, M Maheswaran - … of the 2007 conference of the center …, 2007 - dl.acm.org
Social networks are graphs that represent relations among people, institutions, and their
activities. We introduce a novel social access control (SAC) strategy inspired by multi-level …
activities. We introduce a novel social access control (SAC) strategy inspired by multi-level …
A trust and context based access control model for distributed systems
F Feng, C Lin, D Peng, J Li - 2008 10th IEEE International …, 2008 - ieeexplore.ieee.org
In order to overcome the limitations in traditional access control models such as identity-
based access control and meet the access requirements in distributed systems, we propose …
based access control and meet the access requirements in distributed systems, we propose …
TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
Access control is one of the major security concerns for wireless sensor networks. However,
applying conventional access control models that rely on the central Certificate Authority and …
applying conventional access control models that rely on the central Certificate Authority and …
Developing a trust evaluation method between co-workers in virtual project team for enabling resource sharing and collaboration
TY Chen, YM Chen, HC Chu - Computers in Industry, 2008 - Elsevier
An increasing number of companies, especially those with knowledge-intensive R&D
programs, have turned to virtual project teams (VPTs) in recent years to generate the …
programs, have turned to virtual project teams (VPTs) in recent years to generate the …
Modeling of collaboration archetypes in digital market places
With everyone collecting and generating value out of data, this paper focus on distributed
data trading platforms, digital market places (DMPs). The DMPs can handle the intricacies of …
data trading platforms, digital market places (DMPs). The DMPs can handle the intricacies of …
Extending the reflexion method for consolidating software variants into product lines
P Frenzel, R Koschke, APJ Breu… - … working conference on …, 2007 - ieeexplore.ieee.org
Software variants emerge from ad-hoc copying in-the-large with adaptations to a specific
context. As the number of variants increases, maintaining such software variants becomes …
context. As the number of variants increases, maintaining such software variants becomes …
P2P and P2P botnet traffic classification in two stages
W Ye, K Cho - Soft Computing, 2017 - Springer
Nowadays accurate P2P traffic classification has become increasingly significant for network
management. In addition, it is important to distinguish P2P botnet traffic from normal P2P …
management. In addition, it is important to distinguish P2P botnet traffic from normal P2P …