Page 339 - 《软件学报》2021年第5期
P. 339

张建标  等:一种基于区块链的域间访问控制模型                                                         1563


                 [2]    Wang JJ. Breaking out of information islands to achieve digital resource sharing. Journal of Academic Libraries, 2004,22(3):16−18
                     (in Chinese with English abstract).
                 [3]    Yuan Y, Wang FY. Blockchain: The state of the art and future trends. Acta Automatica Sinica, 2016,42(4):481−494 (in Chinese
                     with English abstract).
                 [4]    Feng DG, Zhang M, Zhang Y, Xu Z.  Study  on cloud  computing  security. Ruan Jian Xue Bao/Journal  of  Software,  2011,22(1):
                     71−83 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3958.htm [doi: 10.3724/SP.J.1001.2011.03958]
                 [5]    Fang L, Yin LH, Guo YC, Fang BX. A survey of key technologies in attribute-based access control scheme. Chinese Journal of
                     Computers, 2017,40(7):1680−1698 (in Chinese with English abstract).
                 [6]    Li XF, Feng DG, Chen CW, Fang ZH. Model for attribute based access control. Journal on Communications, 2008,29(4):90−98 (in
                     Chinese with English abstract).
                 [7]    Sandhu R. The future of access control: Attributes, automation and adaptation. In: Proc. of the IEEE Int’l Conf. on Information
                     Reuse and Integration. 2013. xxiii−xxiv. [doi: 10.1109/IRI.2013.6642437]
                 [8]    Wang XM, Fu H, Zhang LC. Research progress on attribute-based access control. Acta Electronica Sinica, 2010,38(7):1660−1667
                     (in Chinese with English abstract).
                 [9]    Yuan E, Tong J. Attributed based access control (ABAC) for Web services. In: Proc. of the 2005 IEEE Int’l Conf. on Web Services
                     (ICWS 2005). IEEE, 2005. 561−569. [doi: 10.1109/ICWS.2005.25]
                [10]    Li NH, Mitchell JC. Datalog with constraints: A foundation for trust-management languages. In: Proc. of the 5th Int’l Symp. on
                     Practical Aspects of Declarative Languages (PADL 2003). New Orleans, 2003. 28−73.
                [11]    Liu AD, Du XH, Wang  N, Li  SZ. A  blockchain-based  access control mechanism  for  big  data. Ruan  Jian Xue Bao/Journal  of
                     Software, 2019,30(9):2636−2654 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5771.htm [doi: 10.13328/j.
                     cnki.jos.005771]
                [12]    Chen GK, Yin XL, Liu WL. Access control model applicability for big data. Authentication and Confidentiality, 2016,7(7):3−5 (in
                     Chinese with English abstract).
                [13]    Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf
                [14]    Han X, Yuan Y, Wang FY. Security problems on blockchain: The state of the art and future trends. Acta Automatica Sinica, 2019,
                     45(1):206−225 (in Chinese with English abstract).
                [15]    Eyal I, Gencer AE, Sirer EG, et al. Bitcoin-NG: A scalable blockchain protocol. In: Proc. of the 13th USENIX Conf. on Networked
                     Systems Design and Implementation. USENIX Association Berkeley, 2015. 45−59.
                [16]    Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In: Proc. of the Int’l Workshop on Open
                     Problems in Network Security. Springer Int’l Publishing, 2016. 112−125.
                [17]    Swan M. Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015.
                [18]    Ouyang LW, Wang S, Yuan Y, Ni XC, Wang FY. Blockchain-enabled smart contracts: Architecture, applications andfuture trends.
                     Acta Automatica Sinica, 2019,45(3):445−457. (in Chinese with English abstract). https://doi.org/10.16383/j.aas.c180586
                [19]    Christidis K, Devetsikiotis M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 2016, 4: 2292-2303.
                [20]    Jiang ZT, Xie Z, Wang Q, Zhang WH. A cross-domain access control model for cloud computing environments. Microelectronics
                     & Computer, 2017,34(3):65−69 (in Chinese with English abstract).
                [21]    Zhang S, Sun JL, Xu B, Huang C, Kavs AJ. RBAC based access control model for services compositions cross multiple enterprises.
                     Journal of Zhejiang University (Engineering Science), 2012,46(11):2035−2043 (in Chinese with English abstract).
                [22]    Joshi JBD, Bhatti R, Bertino E, et al. Access-control language for multidomain environments. IEEE Internet Computing, 2004,8(6):
                     40−50.
                [23]    Zyskind G, Nathan O, Pentland AS. Decentralizing privacy: Using blockchain to protect personal data. In: Proc. of the 2015 IEEE
                     Security and Privacy Workshops (SPW). IEEE Computer Society, 2015. 180−184.
                [24]    Ding D, Cao J, Li C, Fan K, Li H. A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 2019,7:
                     38431−38441. [doi: 10.1109/ACCESS.2019.2905846]
                [25]    Alansari S, Paci F, Sassone V. A distributed access control system for cloud federations. In: Proc. of the 2017 IEEE 37th Int’l Conf.
                     on Distributed Computing Systems (ICDCS). IEEE, 2017. 2131−2136. [doi: 10.1109/ICDCS.2017.241]
                [26]    Alansari S, Paci F, Margheri A, Sassone V. Privacy-preserving access control in cloud federations. In: Proc. of the 2017 IEEE 10th
                     Int’l Conf. on Cloud Computing (CLOUD). IEEE, 2017. 757−760. [doi: 10.1109/CLOUD.2017.108]
                [27]    Ekblaw A, Azaria A, Halamka JD, et al. A case study for blockchain in healthcare: MedRec prototype f rototype for electronic
                     health records and medical research data. Technical Report, 5-56-ONC, Massachusetts Institute of Technology, 2016.
   334   335   336   337   338   339   340   341   342   343   344