What is it about?

This includes discussions on Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), hybrid models combining these approaches, and their application in securing transactions and user roles. Additionally, we've highlighted challenges, proposed solutions, and referenced numerous academic sources discussing different aspects of access control in diverse environments such as sensor networks, healthcare systems, and cloud computing.

Featured Image

Why is it important?

Effective access control mechanisms are crucial for securing sensitive information, ensuring compliance with regulations, enhancing operational efficiency, and fostering trust by preventing unauthorized access and mitigating cybersecurity risks. They provide flexibility, scalability, and adaptability to evolving technologies, thereby supporting dynamic business needs while safeguarding data integrity and maintaining accountability through detailed access logs and auditing capabilities.

Perspectives

The perspective of the paper revolves around advancing access control mechanisms within blockchain technology. It explores the integration of Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) to enhance security, manage permissions effectively, and address the complexities of modern systems. The paper advocates for a hybrid approach that combines the strengths of both models to achieve comprehensive security solutions, aiming to balance robust protection of sensitive data with practical usability in diverse operational environments.

Abhishek Dadhich
Poornima University

Read the Original

This page is a summary of: Structured Literature Review on Access Controls Mechanism in Block Chain Consensus Algorithm: State of Art and Future Direction, November 2023, ACM (Association for Computing Machinery),
DOI: 10.1145/3647444.3647941.
You can read the full text:

Read

Contributors

The following have contributed to this page