Searched for: +
(1 - 3 of 3)
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Yin, Y. (author), Zuiderwijk-van Eijk, A.M.G. (author), Van Ossenbruggen, Jacco (author), Jeffery, Keith (author), Luthfi, A. (author), Janssen, M.F.W.H.A. (author)
Governments and publicly-funded research institutions increasingly open up data collected and created through research. One way to share and use data obtained through research is through Virtual Research Environments (VREs). Insights obtained through open data use in VREs can subsequently provide input for policy making. However, this process...
conference paper 2018