This work is licensed under the Creative Commons Attribution 4.0 International License.
Lin, C., He, D., Huang, X., Choo, K. K. R., & Vasilakos, A. V. (2018). BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. Journal of network and computer applications, 116, 42-52.Search in Google Scholar
Cram, W. A., Proudfoot, J. G., & D’arcy, J. (2017). Organizational information security policies: a review and research framework. European Journal of Information Systems, 26(6), 605-641.Search in Google Scholar
Groomer, S. M., & Murthy, U. S. (2018). Continuous auditing of database applications: An embedded audit module approach. In Continuous Auditing: Theory and Application (pp. 105-124). Emerald Publishing Limited.Search in Google Scholar
Ouaddah, A., Mousannif, H., Abou Elkalam, A., & Ouahman, A. A. (2017). Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, 237-262.Search in Google Scholar
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696.Search in Google Scholar
Taft, R., Sharif, I., Matei, A., VanBenschoten, N., Lewis, J., Grieger, T., ... & Mattis, P. (2020, June). Cockroachdb: The resilient geo-distributed sql database. In Proceedings of the 2020 ACM SIGMOD international conference on management of data (pp. 1493-1509).Search in Google Scholar
Xu, R., Chen, Y., Blasch, E., & Chen, G. (2018). Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot. Computers, 7(3), 39.Search in Google Scholar
Upadhyay, D., & Sampalli, S. (2020). SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. Computers & Security, 89, 101666.Search in Google Scholar
Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., & Rashid, A. (2018). Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, 18-54.Search in Google Scholar
Meng, N., Nagy, S., Yao, D., Zhuang, W., & Argoty, G. A. (2018, May). Secure coding practices in java: Challenges and vulnerabilities. In Proceedings of the 40th International Conference on Software Engineering (pp. 372-383).Search in Google Scholar
Giles, D. M., Sinyuk, A., Sorokin, M. G., Schafer, J. S., Smirnov, A., Slutsker, I., ... & Lyapustin, A. I. (2019). Advancements in the Aerosol Robotic Network (AERONET) Version 3 database–automated near-real-time quality control algorithm with improved cloud screening for Sun photometer aerosol optical depth (AOD) measurements. Atmospheric Measurement Techniques, 12(1), 169-209.Search in Google Scholar
Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access, 10, 6605-6621.Search in Google Scholar
Dinh, T. T. A., Liu, R., Zhang, M., Chen, G., Ooi, B. C., & Wang, J. (2018). Untangling blockchain: A data processing view of blockchain systems. IEEE transactions on knowledge and data engineering, 30(7), 1366-1385.Search in Google Scholar
Priebe, C., Vaswani, K., & Costa, M. (2018, May). EnclaveDB: A secure database using SGX. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 264-278). IEEE.Search in Google Scholar
Xu, R., Chen, Y., Blasch, E., & Chen, G. (2018, July). Blendcac: A blockchain-enabled decentralized capability-based access control for iots. In 2018 IEEE International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 1027-1034). IEEE.Search in Google Scholar
Vasarhelyi, M. A., & Halper, F. B. (2018). The continuous audit of online Systems1. In Continuous Auditing (pp. 87-104). Emerald Publishing Limited.Search in Google Scholar
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385-392.Search in Google Scholar
Staples, M., Chen, S., Falamaki, S., Ponomarev, A., Rimba, P., Tran, A. B., ... & Zhu, J. (2017). Risks and opportunities for systems using blockchain and smart contracts. Data61. CSIRO), Sydney.Search in Google Scholar
Haiping Si,Weixia Li,Nan Su,Tingting Li,Yanling Li,Chuanhu Zhang... & Changxia Sun. (2024). A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem. Computer Communications68-80.Search in Google Scholar
Chuanjia Yao,Rong Jiang,Bin Wu,Pinghui Li & Chenguang Wang. (2024). A cross domain access control model for medical consortium based on DBSCAN and penalty function. BMC Medical Informatics and Decision Making(1),260-260.Search in Google Scholar
Hideki Sano & Jeanne Redaud. (2024). Observers for hyperbolic systems with multiple delays in the nonlocal boundary condition and its application to secure image encryption. Systems & Control Letters105855-105855.Search in Google Scholar
Wei Wang,Rong Liu & Silin Cheng. (2024). Privacy protection of communication networks using fully homomorphic encryption based on network slicing and attributes. Scientific Reports(1),19391-19391.Search in Google Scholar