{"title":"On the Implementation of Access Control in Ethereum Blockchain","authors":"Insaf Achour, S. Ayed, H. Idoudi","doi":"10.1109/3ICT53449.2021.9581591","DOIUrl":null,"url":null,"abstract":"Access control is a main component in Blockchain systems. It is usually implemented in smart contracts and defines the security policy, in other words, it determines who can access a protected resource in the network. In this paper, we present a review of the major implementations of access control in Ethereum platform. The latter is based on RBAC model (Role-Based Access Control). Implementations require to take into account the whole RBAC process, that is, user role assignment and permission assignment. Three implementations currently exist and are described and compared in this work according to several features: RBAC-SC, Smart policies and OpenZepplin contracts.","PeriodicalId":133021,"journal":{"name":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/3ICT53449.2021.9581591","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Access control is a main component in Blockchain systems. It is usually implemented in smart contracts and defines the security policy, in other words, it determines who can access a protected resource in the network. In this paper, we present a review of the major implementations of access control in Ethereum platform. The latter is based on RBAC model (Role-Based Access Control). Implementations require to take into account the whole RBAC process, that is, user role assignment and permission assignment. Three implementations currently exist and are described and compared in this work according to several features: RBAC-SC, Smart policies and OpenZepplin contracts.