[1] 房梁, 殷丽华, 郭云川, 等. 基于属性的访问控制关键技术研究综述[J]. 计算机学报,2017,40(7):1680-1698.(FANG L,YIN L H,GUO Y C,et al. A survey of key technologies in attribute-based access control scheme[J]. Chinese Journal of Computers,2017,40(7):1680-1698.) [2] CRUZ J P,KAJI Y,YANAI N. RBAC-SC:role-based access control using smart contract[J]. IEEE Access,2018,6:12240-12251. [3] ALANSARI S,PACI F,SASSONE V. A distributed access control system for cloud federations[C]//Proceedings of the IEEE 37th International Conference on Distributed Computing Systems. Piscataway:IEEE,2017:2131-2136. [4] ALANSARI S,PACI F,MARGHERI A,et al. Privacy-preserving access control in cloud federations[C]//Proceedings of the IEEE 10th International Conference on Cloud Computing. Piscataway:IEEE,2017:757-760. [5] DI FRANCESCO MAESA D,MORI P,RICCI L. Blockchain based access control[C]//Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems, LNCS 10320. Cham:Springer,2017:206-220. [6] HASHEMI S H,FAGHRI F,CAMPBELL R H. Decentralized user-centric access control using PubSub over blockchain[EB/OL].[2019-05-23]. https://arxiv.org/pdf/1710.00110.pdf. [7] OUADDAH A,ELKALAM A A,OUAHMAN A A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT[M]//ROCHA Á,SERRHINI M,FELGUEIRAS C. Europe and MENA Cooperation Advances in Information and Communication Technologies,AISC 520. Cham:Springer,2017:523-533. [8] OUADDAH A, ABOU ELKALAM A, AIT OUAHMAN A. FairAccess:a new blockchain-based access control framework for the Internet of things[J]. Security and Communication Networks, 2016,9(18):5943-5964. [9] JEMEL M, SERHROUCHNI A. Decentralized access control mechanism with temporal dimension based on blockchain[C]//Proceedings of the IEEE 14th International Conference on e-Business Engineering. Piscataway:IEEE,2017:177-182. [10] OUTCHAKOUCHT A,ES-SAMALI H,LEROY J P. Dynamic access control policy based on blockchain and machine learning for the Internet of things[J]. International Journal of Advanced Computer Science and Applications,2017,8(7):417-424. [11] SHAFAGH H,BURKHALTER L,HITHNAWI A,et al. Towards blockchain-based auditable storage and sharing of IoT data[C]//Proceedings of the 2017 Cloud Computing Security Workshop. New York:ACM,2017:45-50. [12] 梅颖. 基于区块链的物联网访问控制简化模型构建[J]. 中国传媒大学学报(自然科学版),2017,24(5):7-12.(MEI Y. Simplification model construction of Internet access control based on block chain[J]. Journal of Communication University of China, 2017,24(5):7-12.) [13] ZYSKIND G,NATHAN O,PENTLAND A S. Decentralizing privacy:using blockchain to protect personal data[C]//Proceedings of the 2015 IEEE Security and Privacy Workshops. Piscataway:IEEE,2015:180-184. [14] RIFI N,RACHKIDI E,AGOULMINE N,et al. Towards using blockchain technology for IoT data access protection[C]//Proceedings of the IEEE 17th International Conference on Ubiquitous Wireless Broadband. Piscataway:IEEE,2017:1-5. [15] DUKKIPATI C,ZHANG Y,CHENG L C. Decentralized,blockchain based access control framework for the heterogeneous Internet of things[C]//Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control. New York:ACM,2018:61-69. [16] ZHANG Y,KASAHARA S,SHEN Y,et al. Smart contract-based access control for the Internet of things[J]. IEEE Internet of Things Journal,2019,6(2):1594-1605. [17] RAMACHANDRAN A,KANTARCIOGLU M. Using blockchain and smart contracts for secure data provenance management[EB/OL].[2019-05-23]. https://arxiv.org/pdf/1709.10000.pdf. [18] ALI G,AHMAD N,CAO Y,et al. Blockchain based permission delegation and Access Control in Internet of Things(BACI)[J]. Computers and Security,2019,86:318-334. [19] DORRI A,KANHERE S S,JURDAK R,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]//Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway:IEEE, 2017:618-623. [20] LIN C,HE D,HUANG X,et al. BSeIn:a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications,2018,116:42-52. [21] NOVO O. Blockchain meets IoT:an architecture for scalable access management in IoT[J]. IEEE Internet of Things Journal, 2018,5(2):1184-1195. [22] ALPHAND O,AMORETTI M,CLAEYS T,et al. IoTChain:a blockchain security architecture for the Internet of things[C]//Proceedings of the 2018 IEEE Wireless Communications and Networking Conference. Piscataway:IEEE,2018:1-6. [23] MA M,SHI G,LI F. Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario[J]. IEEE Access,2019,7:34045-34059. [24] LI N H,TRIPUNITARA M V. Security analysis in role-based access control[J]. ACM Transactions on Information and System Security(TISSEC). ACM,2006,9(4):391-420. [25] HAO Y, LI Y, DONG X, et al. Performance analysis of consensus algorithm in private blockchain[C]//Proceedings of the 2018 IEEE Intelligent Vehicles Symposium. Piscataway:IEEE, 2018:280-285. |