Page 339 - 《软件学报》2021年第5期
P. 339
张建标 等:一种基于区块链的域间访问控制模型 1563
[2] Wang JJ. Breaking out of information islands to achieve digital resource sharing. Journal of Academic Libraries, 2004,22(3):16−18
(in Chinese with English abstract).
[3] Yuan Y, Wang FY. Blockchain: The state of the art and future trends. Acta Automatica Sinica, 2016,42(4):481−494 (in Chinese
with English abstract).
[4] Feng DG, Zhang M, Zhang Y, Xu Z. Study on cloud computing security. Ruan Jian Xue Bao/Journal of Software, 2011,22(1):
71−83 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/3958.htm [doi: 10.3724/SP.J.1001.2011.03958]
[5] Fang L, Yin LH, Guo YC, Fang BX. A survey of key technologies in attribute-based access control scheme. Chinese Journal of
Computers, 2017,40(7):1680−1698 (in Chinese with English abstract).
[6] Li XF, Feng DG, Chen CW, Fang ZH. Model for attribute based access control. Journal on Communications, 2008,29(4):90−98 (in
Chinese with English abstract).
[7] Sandhu R. The future of access control: Attributes, automation and adaptation. In: Proc. of the IEEE Int’l Conf. on Information
Reuse and Integration. 2013. xxiii−xxiv. [doi: 10.1109/IRI.2013.6642437]
[8] Wang XM, Fu H, Zhang LC. Research progress on attribute-based access control. Acta Electronica Sinica, 2010,38(7):1660−1667
(in Chinese with English abstract).
[9] Yuan E, Tong J. Attributed based access control (ABAC) for Web services. In: Proc. of the 2005 IEEE Int’l Conf. on Web Services
(ICWS 2005). IEEE, 2005. 561−569. [doi: 10.1109/ICWS.2005.25]
[10] Li NH, Mitchell JC. Datalog with constraints: A foundation for trust-management languages. In: Proc. of the 5th Int’l Symp. on
Practical Aspects of Declarative Languages (PADL 2003). New Orleans, 2003. 28−73.
[11] Liu AD, Du XH, Wang N, Li SZ. A blockchain-based access control mechanism for big data. Ruan Jian Xue Bao/Journal of
Software, 2019,30(9):2636−2654 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5771.htm [doi: 10.13328/j.
cnki.jos.005771]
[12] Chen GK, Yin XL, Liu WL. Access control model applicability for big data. Authentication and Confidentiality, 2016,7(7):3−5 (in
Chinese with English abstract).
[13] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008. https://bitcoin.org/bitcoin.pdf
[14] Han X, Yuan Y, Wang FY. Security problems on blockchain: The state of the art and future trends. Acta Automatica Sinica, 2019,
45(1):206−225 (in Chinese with English abstract).
[15] Eyal I, Gencer AE, Sirer EG, et al. Bitcoin-NG: A scalable blockchain protocol. In: Proc. of the 13th USENIX Conf. on Networked
Systems Design and Implementation. USENIX Association Berkeley, 2015. 45−59.
[16] Vukolić M. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In: Proc. of the Int’l Workshop on Open
Problems in Network Security. Springer Int’l Publishing, 2016. 112−125.
[17] Swan M. Blockchain: Blueprint for a New Economy. Sebastopol: O’Reilly Media, Inc., 2015.
[18] Ouyang LW, Wang S, Yuan Y, Ni XC, Wang FY. Blockchain-enabled smart contracts: Architecture, applications andfuture trends.
Acta Automatica Sinica, 2019,45(3):445−457. (in Chinese with English abstract). https://doi.org/10.16383/j.aas.c180586
[19] Christidis K, Devetsikiotis M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access, 2016, 4: 2292-2303.
[20] Jiang ZT, Xie Z, Wang Q, Zhang WH. A cross-domain access control model for cloud computing environments. Microelectronics
& Computer, 2017,34(3):65−69 (in Chinese with English abstract).
[21] Zhang S, Sun JL, Xu B, Huang C, Kavs AJ. RBAC based access control model for services compositions cross multiple enterprises.
Journal of Zhejiang University (Engineering Science), 2012,46(11):2035−2043 (in Chinese with English abstract).
[22] Joshi JBD, Bhatti R, Bertino E, et al. Access-control language for multidomain environments. IEEE Internet Computing, 2004,8(6):
40−50.
[23] Zyskind G, Nathan O, Pentland AS. Decentralizing privacy: Using blockchain to protect personal data. In: Proc. of the 2015 IEEE
Security and Privacy Workshops (SPW). IEEE Computer Society, 2015. 180−184.
[24] Ding D, Cao J, Li C, Fan K, Li H. A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 2019,7:
38431−38441. [doi: 10.1109/ACCESS.2019.2905846]
[25] Alansari S, Paci F, Sassone V. A distributed access control system for cloud federations. In: Proc. of the 2017 IEEE 37th Int’l Conf.
on Distributed Computing Systems (ICDCS). IEEE, 2017. 2131−2136. [doi: 10.1109/ICDCS.2017.241]
[26] Alansari S, Paci F, Margheri A, Sassone V. Privacy-preserving access control in cloud federations. In: Proc. of the 2017 IEEE 10th
Int’l Conf. on Cloud Computing (CLOUD). IEEE, 2017. 757−760. [doi: 10.1109/CLOUD.2017.108]
[27] Ekblaw A, Azaria A, Halamka JD, et al. A case study for blockchain in healthcare: MedRec prototype f rototype for electronic
health records and medical research data. Technical Report, 5-56-ONC, Massachusetts Institute of Technology, 2016.