A Smart Contract-Based Access Control Framework For Smart Healthcare Systems

Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. Howeve...

Full description

Saved in:
Bibliographic Details
Published inComputer journal Vol. 67; no. 2; pp. 407 - 422
Main Authors Abid, Amal, Cheikhrouhou, Saoussen, Kallel, Slim, Tari, Zahir, Jmaiel, Mohamed
Format Journal Article
LanguageEnglish
Published Oxford University Press 17.02.2024
Subjects
Online AccessGet full text
ISSN0010-4620
1460-2067
DOI10.1093/comjnl/bxac183

Cover

Loading…
Abstract Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency.
AbstractList Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency.
Author Tari, Zahir
Kallel, Slim
Abid, Amal
Jmaiel, Mohamed
Cheikhrouhou, Saoussen
Author_xml – sequence: 1
  givenname: Amal
  surname: Abid
  fullname: Abid, Amal
  email: amal.abid@redcad.org
– sequence: 2
  givenname: Saoussen
  surname: Cheikhrouhou
  fullname: Cheikhrouhou, Saoussen
– sequence: 3
  givenname: Slim
  surname: Kallel
  fullname: Kallel, Slim
– sequence: 4
  givenname: Zahir
  surname: Tari
  fullname: Tari, Zahir
– sequence: 5
  givenname: Mohamed
  surname: Jmaiel
  fullname: Jmaiel, Mohamed
BookMark eNqFkDtPw0AMgE-oSLSFlTkrQ1rfXchjLBWhSJUYCnPkOI5ISXLV3SHovyeQTkiIyZatz49vJia96VmIawkLCZlekun2fbssP5Fkqs_EVEYxhAriZCKmABLCKFZwIWbO7QFAQRZPxXYV7Dq0Plib3lskH96h4ypYEbFzY9W0QW6x4w9j34Lc2BOxYWz9K6HlYHd0njt3Kc5rbB1fneJcvOT3z-tNuH16eFyvtiGpRPtQ1zrGjBl0JCNVSVYywUylBFRlAAkAp2UCt1xLrrOSaOhhLctKDnmMSs_FYpxL1jhnuS4OthluOhYSim8XxeiiOLkYgOgXQI1H3_z83LR_YzcjZt4P_634Asted8s
CitedBy_id crossref_primary_10_1109_ACCESS_2024_3432662
crossref_primary_10_1093_comjnl_bxae046
crossref_primary_10_3390_a18020059
crossref_primary_10_1093_comjnl_bxae097
crossref_primary_10_22531_muglajsci_1280985
crossref_primary_10_3390_iot6010009
Cites_doi 10.1109/35.312842
10.1007/978-1-4842-3081-7_6
10.1109/TKDE.2005.1
10.15439/2022F194
10.1109/2.485845
10.3390/s20061793
10.1016/j.future.2013.05.010
10.1049/iet-sen.2018.5034
10.1016/j.comnet.2014.11.008
10.1145/3384419.3430605
10.1109/JIOT.2020.3033434
10.1002/sec.1748
10.1109/ACCESS.2018.2812844
10.1145/3180457.3180458
10.1145/359340.359342
10.1109/MC.2015.33
10.1109/TII.2014.2300753
10.1109/JIOT.2021.3058946
10.1016/j.comnet.2012.12.018
10.1016/j.is.2020.101622
10.1142/S0218488502001648
10.1109/JIOT.2018.2847705
10.12785/amis/080416
10.1145/1065545.1065547
10.1109/JIOT.2016.2569094
10.1109/ACCESS.2019.2917555
10.4324/9780203081327
ContentType Journal Article
Copyright The British Computer Society 2022. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2022
Copyright_xml – notice: The British Computer Society 2022. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2022
DBID AAYXX
CITATION
DOI 10.1093/comjnl/bxac183
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1460-2067
EndPage 422
ExternalDocumentID 10_1093_comjnl_bxac183
10.1093/comjnl/bxac183
GroupedDBID -E4
-~X
.2P
.DC
.I3
0R~
123
18M
1OL
1TH
29F
3R3
4.4
41~
48X
5VS
5WA
6J9
6TJ
70D
85S
9M8
AAIJN
AAJKP
AAJQQ
AAMVS
AAOGV
AAPQZ
AAPXW
AARHZ
AAUAY
AAUQX
AAVAP
AAYOK
ABAZT
ABDFA
ABDTM
ABEFU
ABEJV
ABEUO
ABGNP
ABIXL
ABNKS
ABPTD
ABQLI
ABSMQ
ABVGC
ABVLG
ABXVV
ABZBJ
ACBEA
ACFRR
ACGFS
ACGOD
ACIWK
ACNCT
ACUFI
ACUTJ
ACUXJ
ACVCV
ACYTK
ADEYI
ADEZT
ADGZP
ADHKW
ADHZD
ADIPN
ADMLS
ADOCK
ADQBN
ADRDM
ADRTK
ADVEK
ADYJX
ADYVW
ADZXQ
AECKG
AEGPL
AEGXH
AEJOX
AEKKA
AEKSI
AEMDU
AENEX
AENZO
AEPUE
AETBJ
AEWNT
AFFZL
AFIYH
AFOFC
AGINJ
AGKEF
AGMDO
AGORE
AGSYK
AHGBF
AHXPO
AI.
AIDUJ
AIJHB
AJBYB
AJEEA
AJEUX
AJNCP
ALMA_UNASSIGNED_HOLDINGS
ALTZX
ALUQC
ALXQX
ANAKG
APIBT
APJGH
APWMN
ASAOO
ATDFG
ATGXG
AXUDD
AZVOD
BAYMD
BCRHZ
BEFXN
BEYMZ
BFFAM
BGNUA
BHONS
BKEBE
BPEOZ
BQUQU
BTQHN
CAG
CDBKE
COF
CS3
CXTWN
CZ4
DAKXR
DFGAJ
DILTD
DU5
D~K
EBS
EE~
EJD
F9B
FA8
FLIZI
FLUFQ
FOEOM
GAUVT
GJXCC
H13
H5~
HAR
HW0
HZ~
H~9
IOX
J21
JAVBF
JXSIZ
KBUDW
KOP
KSI
KSN
M-Z
MBTAY
ML0
MVM
N9A
NGC
NMDNZ
NOMLY
NU-
O0~
O9-
OCL
ODMLO
OJQWA
OJZSN
OWPYF
O~Y
P2P
PAFKI
PEELM
PQQKQ
Q1.
Q5Y
R44
RD5
RNI
ROL
ROX
ROZ
RUSNO
RW1
RXO
RZO
SC5
TAE
TJP
TN5
VH1
VOH
WH7
WHG
X7H
XJT
XOL
XSW
YAYTL
YKOAZ
YXANX
ZKX
ZY4
~91
AAYXX
CITATION
ID FETCH-LOGICAL-c273t-3f36a9ee034142d1e217a928c0cd900700e8b705ef1ef9bcc928af1bd1bcc6a23
ISSN 0010-4620
IngestDate Thu Apr 24 23:10:36 EDT 2025
Tue Jul 01 02:55:10 EDT 2025
Mon Jun 30 08:34:54 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords BPMN
GTRBAC
Smart Contract
Blockchain
Smart Healthcare
Temporal Constraints
Access Control
Security
IoT
Language English
License This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model)
https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c273t-3f36a9ee034142d1e217a928c0cd900700e8b705ef1ef9bcc928af1bd1bcc6a23
PageCount 16
ParticipantIDs crossref_primary_10_1093_comjnl_bxac183
crossref_citationtrail_10_1093_comjnl_bxac183
oup_primary_10_1093_comjnl_bxac183
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-02-17
PublicationDateYYYYMMDD 2024-02-17
PublicationDate_xml – month: 02
  year: 2024
  text: 2024-02-17
  day: 17
PublicationDecade 2020
PublicationTitle Computer journal
PublicationYear 2024
Publisher Oxford University Press
Publisher_xml – name: Oxford University Press
References Roman (2024021913301447200_ref13) 2013; 57
Dukkipati (2024021913301447200_ref53) 2018
Abid (2024021913301447200_ref33) 2019
Abid (2024021913301447200_ref20) 2022
Marchesi (2024021913301447200_ref46) 2020
Rivest (2024021913301447200_ref36) 1978; 21
Yutaka (2024021913301447200_ref24) 2019
Zhang (2024021913301447200_ref25) 2020; 8
Dhillon (2024021913301447200_ref48) 2017
HIPAA (2024021913301447200_ref3)
Zhang (2024021913301447200_ref23) 2018; 6
Sandhu (2024021913301447200_ref9) 1994; 32
Wood (2024021913301447200_ref16) 2014; 151
Joshi (2024021913301447200_ref31) 2005; 17
Mars (2024021913301447200_ref45) 2021
Nguyen (2024021913301447200_ref29) 2019; 7
Abid (2024021913301447200_ref44) 2022
Abid (2024021913301447200_ref39) 2021
Wang (2024021913301447200_ref19) 2019; 13
Benet (2024021913301447200_ref34) 2014
Nakamoto (2024021913301447200_ref15) 2008
Intelligence, P. S (2024021913301447200_ref2)
Cruz (2024021913301447200_ref21) 2018; 6
D’Orazio (2024021913301447200_ref5) 2016; 4
Maesa (2024021913301447200_ref51) 2017
Dorri (2024021913301447200_ref50) 2017
Nakamura (2024021913301447200_ref28) 2020; 20
Sicari (2024021913301447200_ref6) 2015; 76
Ye (2024021913301447200_ref12) 2014
Daemen (2024021913301447200_ref35) 1999
Smari (2024021913301447200_ref10) 2014; 31
Ouaddah (2024021913301447200_ref26) 2016; 9
Egala (2024021913301447200_ref30) 2021; 8
Jeston (2024021913301447200_ref32) 2014
Sandhu (2024021913301447200_ref7) 1996; 29
Xu (2024021913301447200_ref27) 2018; 7
Abid (2024021913301447200_ref17) 2022; 52
López-Pintado (2024021913301447200_ref38) 2019; 49
Truffle (2024021913301447200_ref42)
Hu (2024021913301447200_ref11) 2015; 48
López-Pintado (2024021913301447200_ref22) 2020; 104
Yuan (2024021913301447200_ref8) 2005
Skarmeta (2024021913301447200_ref14) 2014
Pinno (2024021913301447200_ref52) 2017
Graja (2024021913301447200_ref4) 2019; 13
Da Xu (2024021913301447200_ref1) 2014; 10
Luu (2024021913301447200_ref47) 2016
Bhatti (2024021913301447200_ref40) 2005; 8
Sweeney (2024021913301447200_ref37) 2002; 10
Abid (2024021913301447200_ref18) 2020
Abid (2024021913301447200_ref43) 2022
Web3 (2024021913301447200_ref41)
De Moura (2024021913301447200_ref49) 2008
References_xml – volume-title: Sc-gtrbac repo, dryad, dataset
  year: 2022
  ident: 2024021913301447200_ref43
– volume: 32
  start-page: 40
  year: 1994
  ident: 2024021913301447200_ref9
  article-title: Access control: principle and practice
  publication-title: IEEE Communications Magazine
  doi: 10.1109/35.312842
– start-page: 1
  volume-title: Proceedings of the IEEE Global Communications Conference (GLOBECOM)
  year: 2019
  ident: 2024021913301447200_ref24
– start-page: 67
  volume-title: Blockchain Enabled Applications
  year: 2017
  ident: 2024021913301447200_ref48
  doi: 10.1007/978-1-4842-3081-7_6
– start-page: 67
  volume-title: Proceedings of the IEEE World Forum on Internet of Things (WF-IoT)
  year: 2014
  ident: 2024021913301447200_ref14
– volume: 17
  start-page: 4
  year: 2005
  ident: 2024021913301447200_ref31
  article-title: A generalized temporal role-based access control model
  publication-title: IEEE Transactions on Knowledge and Data Engineering
  doi: 10.1109/TKDE.2005.1
– start-page: 685
  volume-title: Proceedings of the Conference on Computer Science and Intelligence Systems (FedCSIS)
  year: 2022
  ident: 2024021913301447200_ref20
  doi: 10.15439/2022F194
– volume: 29
  start-page: 38
  year: 1996
  ident: 2024021913301447200_ref7
  article-title: Role-based access control models
  publication-title: Computer
  doi: 10.1109/2.485845
– start-page: 618
  volume-title: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops)
  year: 2017
  ident: 2024021913301447200_ref50
– volume: 20
  start-page: 1793
  year: 2020
  ident: 2024021913301447200_ref28
  article-title: Exploiting smart contracts for capability-based access control in the internet of things
  publication-title: Sensors
  doi: 10.3390/s20061793
– start-page: 1
  volume-title: Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing(TACC)
  year: 2021
  ident: 2024021913301447200_ref39
– start-page: 9
  volume-title: Proceedings of the IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)
  year: 2020
  ident: 2024021913301447200_ref46
– volume: 31
  start-page: 147
  year: 2014
  ident: 2024021913301447200_ref10
  article-title: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system
  publication-title: Future Generation Computer Systems
  doi: 10.1016/j.future.2013.05.010
– volume-title: Truffle development environment to compile and deploy smart contracts
  ident: 2024021913301447200_ref42
– volume: 7
  start-page: 39
  year: 2018
  ident: 2024021913301447200_ref27
  article-title: Blendcac: a smart contract enabled decentralized capability-based access control mechanism for the iot
  publication-title: Comput. Secur.
– start-page: 325
  volume-title: Proceedings of the International Conference on Risks and Security of Internet and Systems
  year: 2019
  ident: 2024021913301447200_ref33
– volume-title: Electronic health record (ehr) market size
  ident: 2024021913301447200_ref2
– volume: 13
  start-page: 36
  year: 2019
  ident: 2024021913301447200_ref4
  article-title: Modelling and verifying time-aware processes for cyber-physical environments
  publication-title: IET softw
  doi: 10.1049/iet-sen.2018.5034
– volume: 76
  start-page: 146
  year: 2015
  ident: 2024021913301447200_ref6
  article-title: Security, privacy and trust in internet of things: the road ahead
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2014.11.008
– start-page: 764
  volume-title: Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys)
  year: 2020
  ident: 2024021913301447200_ref18
  doi: 10.1145/3384419.3430605
– start-page: 206
  volume-title: Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems
  year: 2017
  ident: 2024021913301447200_ref51
– volume: 8
  start-page: 6372
  year: 2020
  ident: 2024021913301447200_ref25
  article-title: Attribute-based access control for smart cities: a smart-contract-driven framework
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3033434
– volume: 9
  start-page: 5943
  year: 2016
  ident: 2024021913301447200_ref26
  article-title: Fairaccess: a new blockchain-based access control framework for the internet of things
  publication-title: Security and Communication Networks
  doi: 10.1002/sec.1748
– volume: 6
  start-page: 12240
  year: 2018
  ident: 2024021913301447200_ref21
  article-title: Rbac-sc: role-based access control using smart contract
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2812844
– start-page: 61
  volume-title: Proceedings of the ACM Workshop on Attribute-Based Access Control (ABAC)
  year: 2018
  ident: 2024021913301447200_ref53
  doi: 10.1145/3180457.3180458
– volume-title: Aes proposal: Rijndael
  year: 1999
  ident: 2024021913301447200_ref35
– volume: 52
  start-page: 841
  year: 2022
  ident: 2024021913301447200_ref17
  article-title: Novidchain: Blockchain-based privacy-preserving platform for covid-19 test/vaccine certificates
  publication-title: Software: Practice and Experience
– volume: 21
  start-page: 120
  year: 1978
  ident: 2024021913301447200_ref36
  article-title: A method for obtaining digital signatures and public-key cryptosystems
  publication-title: Communications of the ACM
  doi: 10.1145/359340.359342
– volume: 48
  start-page: 85
  year: 2015
  ident: 2024021913301447200_ref11
  article-title: Attribute-based access control
  publication-title: Computer
  doi: 10.1109/MC.2015.33
– volume: 10
  start-page: 2233
  year: 2014
  ident: 2024021913301447200_ref1
  article-title: Internet of things in industries: a survey
  publication-title: IEEE Transactions on Industrial Informatics
  doi: 10.1109/TII.2014.2300753
– volume: 8
  start-page: 11717
  year: 2021
  ident: 2024021913301447200_ref30
  article-title: Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3058946
– volume: 49
  start-page: 1162
  year: 2019
  ident: 2024021913301447200_ref38
  article-title: Caterpillar: a business process execution engine on the ethereum blockchain
  publication-title: Software: Practice and Experience
– start-page: 1
  volume-title: Proceedings of the IEEE Global Communications Conference (GLOBECOM)
  year: 2017
  ident: 2024021913301447200_ref52
– volume: 57
  start-page: 2266
  year: 2013
  ident: 2024021913301447200_ref13
  article-title: On the features and challenges of security and privacy in distributed internet of things
  publication-title: Computer Networks
  doi: 10.1016/j.comnet.2012.12.018
– volume: 104
  start-page: 101622
  year: 2020
  ident: 2024021913301447200_ref22
  article-title: Controlled flexibility in blockchain-based collaborative business processes
  publication-title: Information Systems
  doi: 10.1016/j.is.2020.101622
– volume: 10
  start-page: 557
  year: 2002
  ident: 2024021913301447200_ref37
  article-title: K-anonymity: a model for protecting privacy
  publication-title: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
  doi: 10.1142/S0218488502001648
– volume: 6
  start-page: 1594
  year: 2018
  ident: 2024021913301447200_ref23
  article-title: Smart contract-based access control for the internet of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2847705
– volume: 151
  start-page: 1
  year: 2014
  ident: 2024021913301447200_ref16
  article-title: Ethereum: a secure decentralised generalised transaction ledger
  publication-title: Ethereum project
– volume-title: Web3 javascript api to interact with ethereum nodes
  ident: 2024021913301447200_ref41
– volume-title: Hipaa journal-hipaa compliance news-hipaa breach news
  ident: 2024021913301447200_ref3
– volume-title: Applied Mathematics & Information Sciences
  year: 2014
  ident: 2024021913301447200_ref12
  article-title: An efficient authentication and access control scheme for perception layer of internet of things
  doi: 10.12785/amis/080416
– volume: 13
  year: 2019
  ident: 2024021913301447200_ref19
  article-title: Survey on blockchain for internet of things
  publication-title: Computer Communications
– volume: 8
  start-page: 187
  year: 2005
  ident: 2024021913301447200_ref40
  article-title: X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control
  publication-title: ACM Transactions on Information and System Security (TISSEC)
  doi: 10.1145/1065545.1065547
– start-page: 156
  volume-title: Proceedings of the Annual Computers, Software, and Applications Conference (COMPSAC)
  year: 2021
  ident: 2024021913301447200_ref45
– volume: 4
  start-page: 524
  year: 2016
  ident: 2024021913301447200_ref5
  article-title: Data exfiltration from internet of things devices: ios devices as case studies
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2016.2569094
– year: 2014
  ident: 2024021913301447200_ref34
  article-title: Ipfs-content addressed, versioned, p2p file system
– volume-title: Sc-gtrbac repo, github
  year: 2022
  ident: 2024021913301447200_ref44
– start-page: 337
  volume-title: Proceedings of the the International conference on Tools and Algorithms for the Construction and Analysis of Systems
  year: 2008
  ident: 2024021913301447200_ref49
– volume-title: Proceedings of the IEEE International Conference on Web Services (ICWS)
  year: 2005
  ident: 2024021913301447200_ref8
– year: 2008
  ident: 2024021913301447200_ref15
  article-title: Bitcoin: a peer-to-peer electronic cash system
  publication-title: Cryptography Mailing list
– volume: 7
  start-page: 66792
  year: 2019
  ident: 2024021913301447200_ref29
  article-title: Blockchain for secure ehrs sharing of mobile cloud based e-health systems
  publication-title: IEEE access
  doi: 10.1109/ACCESS.2019.2917555
– volume-title: Business process management: practical guidelines to successful implementations
  year: 2014
  ident: 2024021913301447200_ref32
  doi: 10.4324/9780203081327
– start-page: 254
  volume-title: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS)
  year: 2016
  ident: 2024021913301447200_ref47
SSID ssj0002096
Score 2.4148786
Snippet Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less...
SourceID crossref
oup
SourceType Enrichment Source
Index Database
Publisher
StartPage 407
Title A Smart Contract-Based Access Control Framework For Smart Healthcare Systems
Volume 67
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bT8IwFG4UX3zxbrynMSY-kOnalcIeESXE2wuaGF_I2nUBFTAwEuOv93TtLijGy8uylLbZ9n2cnp6eC0JH0peg1IbUIUFNW6vgPycIVU412U4InwiReFvc8tY9u3yoPOTHBUl0SSxO5PvMuJL_oAptgKuOkv0Dstmk0AD3gC9cAWG4_grjerndh2YdthfraCfnDNakUFeA0PKrYb3Qm6n_Vbk5HNkRrdztq5izPE1ZYEs9lItPkZwR9YwZup-3Nbqq96yL_XSHE2NiHk7G4zzA7EoXa0nszO2XXj83FJgI98eg2xsVLQ-UaWdlE2iZSlOQ4YxTc66ijABl3HV0SviihOXVApNoQVwyU_HWrrzMRCh_Eeom4RXA9DSAx22Kt0ASU_1mOn_2p3Ut8zY05-xex8zQsePn0QKFrQUtoYX6-c11O1u_qZtUdcveLkv16Z2aGU7tDFOqjA6PLGgmdytoyW4pcN3wYxXNqcEaWk4xxFZ6r6PrOk7Ax9N0wYYu2NIFZ3TBQBc7IqcLtnTZQPfNi7tGy7HFNBwJGmrseJHHA18pF9QWRkOiYC8a-LQmXRn6OumTq2qi6lZURFTkCynhtyAiIiRwzwPqbaLSYDhQWwhzxWQI0EVRNWLK82pcUV5Rrh_Cbj1wyTZy0u_SkTbTvC548tKZjcQ2Os76v5ocK9_2PITP_EOnnV9Pt4sWc17voVI8mqh90DFjcWBJ8QEgm4Is
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Smart+Contract-Based+Access+Control+Framework+For+Smart+Healthcare+Systems&rft.jtitle=Computer+journal&rft.au=Abid%2C+Amal&rft.au=Cheikhrouhou%2C+Saoussen&rft.au=Kallel%2C+Slim&rft.au=Tari%2C+Zahir&rft.date=2024-02-17&rft.issn=0010-4620&rft.eissn=1460-2067&rft.volume=67&rft.issue=2&rft.spage=407&rft.epage=422&rft_id=info:doi/10.1093%2Fcomjnl%2Fbxac183&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_comjnl_bxac183
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-4620&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-4620&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-4620&client=summon