What is it about?
This includes discussions on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), hybrid models combining these approaches, and their application in securing transactions and user roles. Additionally, we've highlighted challenges, proposed solutions, and referenced numerous academic sources discussing different aspects of access control in diverse environments such as sensor networks, healthcare systems, and cloud computing.
Featured Image
Why is it important?
Effective access control mechanisms are crucial for securing sensitive information, ensuring compliance with regulations, enhancing operational efficiency, and fostering trust by preventing unauthorized access and mitigating cybersecurity risks. They provide flexibility, scalability, and adaptability to evolving technologies, thereby supporting dynamic business needs while safeguarding data integrity and maintaining accountability through detailed access logs and auditing capabilities.
Perspectives
Read the Original
This page is a summary of: Structured Literature Review on Access Controls Mechanism in Block Chain Consensus Algorithm: State of Art and Future Direction, November 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3647444.3647941.
You can read the full text:
Contributors
The following have contributed to this page