A Smart Contract-Based Access Control Framework For Smart Healthcare Systems
Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. Howeve...
Saved in:
Published in | Computer journal Vol. 67; no. 2; pp. 407 - 422 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Oxford University Press
17.02.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 0010-4620 1460-2067 |
DOI | 10.1093/comjnl/bxac183 |
Cover
Loading…
Abstract | Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency. |
---|---|
AbstractList | Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less tailored for IoT due to the constrained nature of smart objects. Usually, a powerful third party is used to handle the access control logic. However, this third party is lacking in transparency and could harm user privacy. Therefore, providing a distributed access control solution, while considering transparency and privacy-preserving awareness in IoT smart systems, is of paramount importance. The described issue can be addressed using the emergent Blockchain technology that provides a promising choice to build a new generation of decentralized and transparent access control solutions. This paper proposes a smart contract-based access control framework for IoT smart healthcare systems, which is based on smart contracts to provide a distributed and trustworthy access control, combined with the GTRBAC model to express fine-grained access control policies while considering temporal authorization constraints. To prove the feasibility and validity of the proposed framework, this paper also provides a detailed technical description and an initial implementation and execution. An experimental evaluation shows that security properties’ analyses on smart contracts achieved the best possible evaluation with no vulnerabilities found, and the cost of access control operations increases linearly as the number of policy constraints increases. Besides, a comparative analysis reveals that the proposed approach can achieve good results with low gas costs and latency. |
Author | Tari, Zahir Kallel, Slim Abid, Amal Jmaiel, Mohamed Cheikhrouhou, Saoussen |
Author_xml | – sequence: 1 givenname: Amal surname: Abid fullname: Abid, Amal email: amal.abid@redcad.org – sequence: 2 givenname: Saoussen surname: Cheikhrouhou fullname: Cheikhrouhou, Saoussen – sequence: 3 givenname: Slim surname: Kallel fullname: Kallel, Slim – sequence: 4 givenname: Zahir surname: Tari fullname: Tari, Zahir – sequence: 5 givenname: Mohamed surname: Jmaiel fullname: Jmaiel, Mohamed |
BookMark | eNqFkDtPw0AMgE-oSLSFlTkrQ1rfXchjLBWhSJUYCnPkOI5ISXLV3SHovyeQTkiIyZatz49vJia96VmIawkLCZlekun2fbssP5Fkqs_EVEYxhAriZCKmABLCKFZwIWbO7QFAQRZPxXYV7Dq0Plib3lskH96h4ypYEbFzY9W0QW6x4w9j34Lc2BOxYWz9K6HlYHd0njt3Kc5rbB1fneJcvOT3z-tNuH16eFyvtiGpRPtQ1zrGjBl0JCNVSVYywUylBFRlAAkAp2UCt1xLrrOSaOhhLctKDnmMSs_FYpxL1jhnuS4OthluOhYSim8XxeiiOLkYgOgXQI1H3_z83LR_YzcjZt4P_634Asted8s |
CitedBy_id | crossref_primary_10_1109_ACCESS_2024_3432662 crossref_primary_10_1093_comjnl_bxae046 crossref_primary_10_3390_a18020059 crossref_primary_10_1093_comjnl_bxae097 crossref_primary_10_22531_muglajsci_1280985 crossref_primary_10_3390_iot6010009 |
Cites_doi | 10.1109/35.312842 10.1007/978-1-4842-3081-7_6 10.1109/TKDE.2005.1 10.15439/2022F194 10.1109/2.485845 10.3390/s20061793 10.1016/j.future.2013.05.010 10.1049/iet-sen.2018.5034 10.1016/j.comnet.2014.11.008 10.1145/3384419.3430605 10.1109/JIOT.2020.3033434 10.1002/sec.1748 10.1109/ACCESS.2018.2812844 10.1145/3180457.3180458 10.1145/359340.359342 10.1109/MC.2015.33 10.1109/TII.2014.2300753 10.1109/JIOT.2021.3058946 10.1016/j.comnet.2012.12.018 10.1016/j.is.2020.101622 10.1142/S0218488502001648 10.1109/JIOT.2018.2847705 10.12785/amis/080416 10.1145/1065545.1065547 10.1109/JIOT.2016.2569094 10.1109/ACCESS.2019.2917555 10.4324/9780203081327 |
ContentType | Journal Article |
Copyright | The British Computer Society 2022. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2022 |
Copyright_xml | – notice: The British Computer Society 2022. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2022 |
DBID | AAYXX CITATION |
DOI | 10.1093/comjnl/bxac183 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1460-2067 |
EndPage | 422 |
ExternalDocumentID | 10_1093_comjnl_bxac183 10.1093/comjnl/bxac183 |
GroupedDBID | -E4 -~X .2P .DC .I3 0R~ 123 18M 1OL 1TH 29F 3R3 4.4 41~ 48X 5VS 5WA 6J9 6TJ 70D 85S 9M8 AAIJN AAJKP AAJQQ AAMVS AAOGV AAPQZ AAPXW AARHZ AAUAY AAUQX AAVAP AAYOK ABAZT ABDFA ABDTM ABEFU ABEJV ABEUO ABGNP ABIXL ABNKS ABPTD ABQLI ABSMQ ABVGC ABVLG ABXVV ABZBJ ACBEA ACFRR ACGFS ACGOD ACIWK ACNCT ACUFI ACUTJ ACUXJ ACVCV ACYTK ADEYI ADEZT ADGZP ADHKW ADHZD ADIPN ADMLS ADOCK ADQBN ADRDM ADRTK ADVEK ADYJX ADYVW ADZXQ AECKG AEGPL AEGXH AEJOX AEKKA AEKSI AEMDU AENEX AENZO AEPUE AETBJ AEWNT AFFZL AFIYH AFOFC AGINJ AGKEF AGMDO AGORE AGSYK AHGBF AHXPO AI. AIDUJ AIJHB AJBYB AJEEA AJEUX AJNCP ALMA_UNASSIGNED_HOLDINGS ALTZX ALUQC ALXQX ANAKG APIBT APJGH APWMN ASAOO ATDFG ATGXG AXUDD AZVOD BAYMD BCRHZ BEFXN BEYMZ BFFAM BGNUA BHONS BKEBE BPEOZ BQUQU BTQHN CAG CDBKE COF CS3 CXTWN CZ4 DAKXR DFGAJ DILTD DU5 D~K EBS EE~ EJD F9B FA8 FLIZI FLUFQ FOEOM GAUVT GJXCC H13 H5~ HAR HW0 HZ~ H~9 IOX J21 JAVBF JXSIZ KBUDW KOP KSI KSN M-Z MBTAY ML0 MVM N9A NGC NMDNZ NOMLY NU- O0~ O9- OCL ODMLO OJQWA OJZSN OWPYF O~Y P2P PAFKI PEELM PQQKQ Q1. Q5Y R44 RD5 RNI ROL ROX ROZ RUSNO RW1 RXO RZO SC5 TAE TJP TN5 VH1 VOH WH7 WHG X7H XJT XOL XSW YAYTL YKOAZ YXANX ZKX ZY4 ~91 AAYXX CITATION |
ID | FETCH-LOGICAL-c273t-3f36a9ee034142d1e217a928c0cd900700e8b705ef1ef9bcc928af1bd1bcc6a23 |
ISSN | 0010-4620 |
IngestDate | Thu Apr 24 23:10:36 EDT 2025 Tue Jul 01 02:55:10 EDT 2025 Mon Jun 30 08:34:54 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Keywords | BPMN GTRBAC Smart Contract Blockchain Smart Healthcare Temporal Constraints Access Control Security IoT |
Language | English |
License | This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model) https://academic.oup.com/journals/pages/open_access/funder_policies/chorus/standard_publication_model |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c273t-3f36a9ee034142d1e217a928c0cd900700e8b705ef1ef9bcc928af1bd1bcc6a23 |
PageCount | 16 |
ParticipantIDs | crossref_primary_10_1093_comjnl_bxac183 crossref_citationtrail_10_1093_comjnl_bxac183 oup_primary_10_1093_comjnl_bxac183 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-02-17 |
PublicationDateYYYYMMDD | 2024-02-17 |
PublicationDate_xml | – month: 02 year: 2024 text: 2024-02-17 day: 17 |
PublicationDecade | 2020 |
PublicationTitle | Computer journal |
PublicationYear | 2024 |
Publisher | Oxford University Press |
Publisher_xml | – name: Oxford University Press |
References | Roman (2024021913301447200_ref13) 2013; 57 Dukkipati (2024021913301447200_ref53) 2018 Abid (2024021913301447200_ref33) 2019 Abid (2024021913301447200_ref20) 2022 Marchesi (2024021913301447200_ref46) 2020 Rivest (2024021913301447200_ref36) 1978; 21 Yutaka (2024021913301447200_ref24) 2019 Zhang (2024021913301447200_ref25) 2020; 8 Dhillon (2024021913301447200_ref48) 2017 HIPAA (2024021913301447200_ref3) Zhang (2024021913301447200_ref23) 2018; 6 Sandhu (2024021913301447200_ref9) 1994; 32 Wood (2024021913301447200_ref16) 2014; 151 Joshi (2024021913301447200_ref31) 2005; 17 Mars (2024021913301447200_ref45) 2021 Nguyen (2024021913301447200_ref29) 2019; 7 Abid (2024021913301447200_ref44) 2022 Abid (2024021913301447200_ref39) 2021 Wang (2024021913301447200_ref19) 2019; 13 Benet (2024021913301447200_ref34) 2014 Nakamoto (2024021913301447200_ref15) 2008 Intelligence, P. S (2024021913301447200_ref2) Cruz (2024021913301447200_ref21) 2018; 6 D’Orazio (2024021913301447200_ref5) 2016; 4 Maesa (2024021913301447200_ref51) 2017 Dorri (2024021913301447200_ref50) 2017 Nakamura (2024021913301447200_ref28) 2020; 20 Sicari (2024021913301447200_ref6) 2015; 76 Ye (2024021913301447200_ref12) 2014 Daemen (2024021913301447200_ref35) 1999 Smari (2024021913301447200_ref10) 2014; 31 Ouaddah (2024021913301447200_ref26) 2016; 9 Egala (2024021913301447200_ref30) 2021; 8 Jeston (2024021913301447200_ref32) 2014 Sandhu (2024021913301447200_ref7) 1996; 29 Xu (2024021913301447200_ref27) 2018; 7 Abid (2024021913301447200_ref17) 2022; 52 López-Pintado (2024021913301447200_ref38) 2019; 49 Truffle (2024021913301447200_ref42) Hu (2024021913301447200_ref11) 2015; 48 López-Pintado (2024021913301447200_ref22) 2020; 104 Yuan (2024021913301447200_ref8) 2005 Skarmeta (2024021913301447200_ref14) 2014 Pinno (2024021913301447200_ref52) 2017 Graja (2024021913301447200_ref4) 2019; 13 Da Xu (2024021913301447200_ref1) 2014; 10 Luu (2024021913301447200_ref47) 2016 Bhatti (2024021913301447200_ref40) 2005; 8 Sweeney (2024021913301447200_ref37) 2002; 10 Abid (2024021913301447200_ref18) 2020 Abid (2024021913301447200_ref43) 2022 Web3 (2024021913301447200_ref41) De Moura (2024021913301447200_ref49) 2008 |
References_xml | – volume-title: Sc-gtrbac repo, dryad, dataset year: 2022 ident: 2024021913301447200_ref43 – volume: 32 start-page: 40 year: 1994 ident: 2024021913301447200_ref9 article-title: Access control: principle and practice publication-title: IEEE Communications Magazine doi: 10.1109/35.312842 – start-page: 1 volume-title: Proceedings of the IEEE Global Communications Conference (GLOBECOM) year: 2019 ident: 2024021913301447200_ref24 – start-page: 67 volume-title: Blockchain Enabled Applications year: 2017 ident: 2024021913301447200_ref48 doi: 10.1007/978-1-4842-3081-7_6 – start-page: 67 volume-title: Proceedings of the IEEE World Forum on Internet of Things (WF-IoT) year: 2014 ident: 2024021913301447200_ref14 – volume: 17 start-page: 4 year: 2005 ident: 2024021913301447200_ref31 article-title: A generalized temporal role-based access control model publication-title: IEEE Transactions on Knowledge and Data Engineering doi: 10.1109/TKDE.2005.1 – start-page: 685 volume-title: Proceedings of the Conference on Computer Science and Intelligence Systems (FedCSIS) year: 2022 ident: 2024021913301447200_ref20 doi: 10.15439/2022F194 – volume: 29 start-page: 38 year: 1996 ident: 2024021913301447200_ref7 article-title: Role-based access control models publication-title: Computer doi: 10.1109/2.485845 – start-page: 618 volume-title: Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops) year: 2017 ident: 2024021913301447200_ref50 – volume: 20 start-page: 1793 year: 2020 ident: 2024021913301447200_ref28 article-title: Exploiting smart contracts for capability-based access control in the internet of things publication-title: Sensors doi: 10.3390/s20061793 – start-page: 1 volume-title: Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing(TACC) year: 2021 ident: 2024021913301447200_ref39 – start-page: 9 volume-title: Proceedings of the IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE) year: 2020 ident: 2024021913301447200_ref46 – volume: 31 start-page: 147 year: 2014 ident: 2024021913301447200_ref10 article-title: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system publication-title: Future Generation Computer Systems doi: 10.1016/j.future.2013.05.010 – volume-title: Truffle development environment to compile and deploy smart contracts ident: 2024021913301447200_ref42 – volume: 7 start-page: 39 year: 2018 ident: 2024021913301447200_ref27 article-title: Blendcac: a smart contract enabled decentralized capability-based access control mechanism for the iot publication-title: Comput. Secur. – start-page: 325 volume-title: Proceedings of the International Conference on Risks and Security of Internet and Systems year: 2019 ident: 2024021913301447200_ref33 – volume-title: Electronic health record (ehr) market size ident: 2024021913301447200_ref2 – volume: 13 start-page: 36 year: 2019 ident: 2024021913301447200_ref4 article-title: Modelling and verifying time-aware processes for cyber-physical environments publication-title: IET softw doi: 10.1049/iet-sen.2018.5034 – volume: 76 start-page: 146 year: 2015 ident: 2024021913301447200_ref6 article-title: Security, privacy and trust in internet of things: the road ahead publication-title: Computer Networks doi: 10.1016/j.comnet.2014.11.008 – start-page: 764 volume-title: Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys) year: 2020 ident: 2024021913301447200_ref18 doi: 10.1145/3384419.3430605 – start-page: 206 volume-title: Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems year: 2017 ident: 2024021913301447200_ref51 – volume: 8 start-page: 6372 year: 2020 ident: 2024021913301447200_ref25 article-title: Attribute-based access control for smart cities: a smart-contract-driven framework publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3033434 – volume: 9 start-page: 5943 year: 2016 ident: 2024021913301447200_ref26 article-title: Fairaccess: a new blockchain-based access control framework for the internet of things publication-title: Security and Communication Networks doi: 10.1002/sec.1748 – volume: 6 start-page: 12240 year: 2018 ident: 2024021913301447200_ref21 article-title: Rbac-sc: role-based access control using smart contract publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2812844 – start-page: 61 volume-title: Proceedings of the ACM Workshop on Attribute-Based Access Control (ABAC) year: 2018 ident: 2024021913301447200_ref53 doi: 10.1145/3180457.3180458 – volume-title: Aes proposal: Rijndael year: 1999 ident: 2024021913301447200_ref35 – volume: 52 start-page: 841 year: 2022 ident: 2024021913301447200_ref17 article-title: Novidchain: Blockchain-based privacy-preserving platform for covid-19 test/vaccine certificates publication-title: Software: Practice and Experience – volume: 21 start-page: 120 year: 1978 ident: 2024021913301447200_ref36 article-title: A method for obtaining digital signatures and public-key cryptosystems publication-title: Communications of the ACM doi: 10.1145/359340.359342 – volume: 48 start-page: 85 year: 2015 ident: 2024021913301447200_ref11 article-title: Attribute-based access control publication-title: Computer doi: 10.1109/MC.2015.33 – volume: 10 start-page: 2233 year: 2014 ident: 2024021913301447200_ref1 article-title: Internet of things in industries: a survey publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2014.2300753 – volume: 8 start-page: 11717 year: 2021 ident: 2024021913301447200_ref30 article-title: Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3058946 – volume: 49 start-page: 1162 year: 2019 ident: 2024021913301447200_ref38 article-title: Caterpillar: a business process execution engine on the ethereum blockchain publication-title: Software: Practice and Experience – start-page: 1 volume-title: Proceedings of the IEEE Global Communications Conference (GLOBECOM) year: 2017 ident: 2024021913301447200_ref52 – volume: 57 start-page: 2266 year: 2013 ident: 2024021913301447200_ref13 article-title: On the features and challenges of security and privacy in distributed internet of things publication-title: Computer Networks doi: 10.1016/j.comnet.2012.12.018 – volume: 104 start-page: 101622 year: 2020 ident: 2024021913301447200_ref22 article-title: Controlled flexibility in blockchain-based collaborative business processes publication-title: Information Systems doi: 10.1016/j.is.2020.101622 – volume: 10 start-page: 557 year: 2002 ident: 2024021913301447200_ref37 article-title: K-anonymity: a model for protecting privacy publication-title: International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems doi: 10.1142/S0218488502001648 – volume: 6 start-page: 1594 year: 2018 ident: 2024021913301447200_ref23 article-title: Smart contract-based access control for the internet of things publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2018.2847705 – volume: 151 start-page: 1 year: 2014 ident: 2024021913301447200_ref16 article-title: Ethereum: a secure decentralised generalised transaction ledger publication-title: Ethereum project – volume-title: Web3 javascript api to interact with ethereum nodes ident: 2024021913301447200_ref41 – volume-title: Hipaa journal-hipaa compliance news-hipaa breach news ident: 2024021913301447200_ref3 – volume-title: Applied Mathematics & Information Sciences year: 2014 ident: 2024021913301447200_ref12 article-title: An efficient authentication and access control scheme for perception layer of internet of things doi: 10.12785/amis/080416 – volume: 13 year: 2019 ident: 2024021913301447200_ref19 article-title: Survey on blockchain for internet of things publication-title: Computer Communications – volume: 8 start-page: 187 year: 2005 ident: 2024021913301447200_ref40 article-title: X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control publication-title: ACM Transactions on Information and System Security (TISSEC) doi: 10.1145/1065545.1065547 – start-page: 156 volume-title: Proceedings of the Annual Computers, Software, and Applications Conference (COMPSAC) year: 2021 ident: 2024021913301447200_ref45 – volume: 4 start-page: 524 year: 2016 ident: 2024021913301447200_ref5 article-title: Data exfiltration from internet of things devices: ios devices as case studies publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2016.2569094 – year: 2014 ident: 2024021913301447200_ref34 article-title: Ipfs-content addressed, versioned, p2p file system – volume-title: Sc-gtrbac repo, github year: 2022 ident: 2024021913301447200_ref44 – start-page: 337 volume-title: Proceedings of the the International conference on Tools and Algorithms for the Construction and Analysis of Systems year: 2008 ident: 2024021913301447200_ref49 – volume-title: Proceedings of the IEEE International Conference on Web Services (ICWS) year: 2005 ident: 2024021913301447200_ref8 – year: 2008 ident: 2024021913301447200_ref15 article-title: Bitcoin: a peer-to-peer electronic cash system publication-title: Cryptography Mailing list – volume: 7 start-page: 66792 year: 2019 ident: 2024021913301447200_ref29 article-title: Blockchain for secure ehrs sharing of mobile cloud based e-health systems publication-title: IEEE access doi: 10.1109/ACCESS.2019.2917555 – volume-title: Business process management: practical guidelines to successful implementations year: 2014 ident: 2024021913301447200_ref32 doi: 10.4324/9780203081327 – start-page: 254 volume-title: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) year: 2016 ident: 2024021913301447200_ref47 |
SSID | ssj0002096 |
Score | 2.4148786 |
Snippet | Security faces huge challenges in Internet of Things (IoT) environments. In particular, conventional access control standards and models tend to be less... |
SourceID | crossref oup |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 407 |
Title | A Smart Contract-Based Access Control Framework For Smart Healthcare Systems |
Volume | 67 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bT8IwFG4UX3zxbrynMSY-kOnalcIeESXE2wuaGF_I2nUBFTAwEuOv93TtLijGy8uylLbZ9n2cnp6eC0JH0peg1IbUIUFNW6vgPycIVU412U4InwiReFvc8tY9u3yoPOTHBUl0SSxO5PvMuJL_oAptgKuOkv0Dstmk0AD3gC9cAWG4_grjerndh2YdthfraCfnDNakUFeA0PKrYb3Qm6n_Vbk5HNkRrdztq5izPE1ZYEs9lItPkZwR9YwZup-3Nbqq96yL_XSHE2NiHk7G4zzA7EoXa0nszO2XXj83FJgI98eg2xsVLQ-UaWdlE2iZSlOQ4YxTc66ijABl3HV0SviihOXVApNoQVwyU_HWrrzMRCh_Eeom4RXA9DSAx22Kt0ASU_1mOn_2p3Ut8zY05-xex8zQsePn0QKFrQUtoYX6-c11O1u_qZtUdcveLkv16Z2aGU7tDFOqjA6PLGgmdytoyW4pcN3wYxXNqcEaWk4xxFZ6r6PrOk7Ax9N0wYYu2NIFZ3TBQBc7IqcLtnTZQPfNi7tGy7HFNBwJGmrseJHHA18pF9QWRkOiYC8a-LQmXRn6OumTq2qi6lZURFTkCynhtyAiIiRwzwPqbaLSYDhQWwhzxWQI0EVRNWLK82pcUV5Rrh_Cbj1wyTZy0u_SkTbTvC548tKZjcQ2Os76v5ocK9_2PITP_EOnnV9Pt4sWc17voVI8mqh90DFjcWBJ8QEgm4Is |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Smart+Contract-Based+Access+Control+Framework+For+Smart+Healthcare+Systems&rft.jtitle=Computer+journal&rft.au=Abid%2C+Amal&rft.au=Cheikhrouhou%2C+Saoussen&rft.au=Kallel%2C+Slim&rft.au=Tari%2C+Zahir&rft.date=2024-02-17&rft.issn=0010-4620&rft.eissn=1460-2067&rft.volume=67&rft.issue=2&rft.spage=407&rft.epage=422&rft_id=info:doi/10.1093%2Fcomjnl%2Fbxac183&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_comjnl_bxac183 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-4620&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-4620&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-4620&client=summon |