Research on the Application of Digital Education Resource Data Security Sharing Based on Blockchain and Access Control
Abstract
References
Index Terms
- Research on the Application of Digital Education Resource Data Security Sharing Based on Blockchain and Access Control
Recommendations
Research on the Application of Blockchain in Educational Resources
AISS '21: Proceedings of the 3rd International Conference on Advanced Information Science and SystemIn recent years, the development of digital educational resources has advanced by leaps and bounds, but the problem of copyright protection of educational resources has become increasingly prominent. Based on the phenomenon that it is difficult to solve ...
Research on the Application of Blockchain Technology in Education and Teaching in Higher Vocational Colleges
ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering ConferenceWith the progress and development of science and technology, blockchain technology has shown great influence in many fields. Blockchain technology has been widely used in various fields of society, and the integrated development of higher vocational ...
Attribute-based Access Control of Data Sharing Based on Hyperledger Blockchain
ICBCT '20: Proceedings of the 2020 2nd International Conference on Blockchain TechnologyWhile public cloud service provides scholars a means to collaborate and share studies, depositing their data on a centralized semi-trusted cloud server managed by third party, raises security and privacy issues; secure decentralized storage can overcome ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 49Total Downloads
- Downloads (Last 12 months)18
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format