2021
DOI: 10.1002/ett.4227
|View full text |Cite
|
Sign up to set email alerts
|

Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment

Abstract: Closed circuit television (CCTV) is installed on roads or in facilities for the purpose of filming videos to be used for crime prevention or as evidence for accidents in the future, and the number of CCTVs installed annually is increasing sharply. The videos collected by the devices can be submitted as legal evidence for accidents, which could happen in the future, but the damage to their integrity may cause the loss of reliability. Blockchain, which guarantees the integrity of data by sharing data as a distri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Recently, Kim et al [3] have demonstrated RBAC usage in video surveillance using smart contracts, whereas Shaobo et al [4] used RBAC to ensure fine-grained access to electronic health records. Additionally, Gurucharansing et al [5] demonstrated the use of RBAC in specifying large-scale application access control policies.…”
Section: Applications Of Rbacmentioning
confidence: 99%
“…Recently, Kim et al [3] have demonstrated RBAC usage in video surveillance using smart contracts, whereas Shaobo et al [4] used RBAC to ensure fine-grained access to electronic health records. Additionally, Gurucharansing et al [5] demonstrated the use of RBAC in specifying large-scale application access control policies.…”
Section: Applications Of Rbacmentioning
confidence: 99%
“…With reference to the defined video surveillance camera identifier system (Du et al, 2019;Kim & Lee et al, 2020;Kim & Park, 2021;Rashwan et al, 2016), this experiment selected some of the more representative static and dynamic identifiers for this experimental device feature portrayal, as shown in Table 6. The operating system types involved in this experiment include Linux, Windows, Android and IOS.…”
Section: Experimental Data Setmentioning
confidence: 99%
“…Once the hardware information is leaked, the security of the system is no longer guaranteed. A role-based access control video surveillance mechanism was proposed in [ 23 ], which used a blockchain to guarantee the integrity of shared data and prevent indiscriminate access. However, a blockchain has the defects of heavy computing and a low efficiency.…”
Section: Related Workmentioning
confidence: 99%