Contract-based Access Control Method for NFT Use Rights |
Jeong, Yoonsung
(Dept. of Computer Science, Sogang University)
Ko, Deokyoon (Noncelab Inc.) Seo, Jungwon (Dept. of Computer Science, Sogang University) Park, Sooyong (Dept. of Computer Science, Sogang University) Kim, Seong-Jin (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT)) Kim, Bum-Soo (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT)) Kim, Do-Young (Dept. of Future & Smart Construction Research, Korea Institute of Civil Engineering and Building Technology(KICT)) |
1 | N. M. M. Alhag and Y. A. Mohamed, "An Enhancement of Data Encryption Standards Algorithm (DES)", 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE). IEEE, pp.1-6, August 2018. https://doi.org/10.1109/ICCCEEE.2018.8515843. DOI |
2 | Q. Zheng, Y. Li, and P. Chen, "An Innovative IPFS-Based Storage Model for Blockchain", 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE, pp.704-708, December 2018. https://doi.org/10.1109/WI.2018. 000-8. DOI |
3 | M. A. Al-Shabi, "A Survey on Symmetric and Asymmetric Cryptography Algorithms in Information Security", International Journal of Scientific and Research Publications (IJSRP), 9(3), 576-589, March 2019. https://doi.org/10. 29322/IJSRP.9.03.2019.p8779. DOI |
4 | F. Thouvenin and A. Tamo-Larrieux, "Data Ownership and Data Access Rights: Meaningful Tools for Promoting the European Digital Single Market?", Big Data and Global Trade Law, M. Burri, Ed. Cambridge: Cambridge University Press, pp.316-339, July 2021. http://dx.doi.org/ 10.1017/9781108919234.020. DOI |
5 | F. Mallouli, A. Hellal, N. S. Saeed, F. A. Alzahrani, "A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms", 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). IEEE, pp.173-176, June 2019. https://doi.org/10.1109/CSCloud/EdgeCom.2019.00022. DOI |
6 | Y. Yusfrizal, A. Meizar, H. Kurniawan, and F. Agustin, "Key Management using Combination of Diffie-Hellman Key Exchange with AES Encryption", 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, pp.1-6, August 2018. https://doi.org/10.1109/CITSM.2018.8674278. DOI |
7 | M. U. Aftab, Z. Qin, Zakria, S. Ali, Pirah, and J. Khan, "The Evaluation and Comparative Analysis of Role based Access Control and Attribute based Access Control Model", 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). IEEE, December 2018. https://doi.org/ 10.1109/ICCWAMTIP.2018.8632578. DOI |
8 | EIP 20: Token Standard [Internet], https://eips.ethereum.org/EIPS/eip-20 (Checked on 20th September 2022) |
9 | J. Seo, D. Ko, S. Park, S. Kim, B. Kim, and D. Kim, "Design and Implementation of a Blockchain System for Storing BIM Files in a Distributed Network Environment", Journal of the Korea Society of Computer and Information, vol.26, no.12, pp.159-168, December 2021. https://doi.org/ 10.9708/jksci.2021.26.12.159. DOI |
10 | B. Vitalik, "A Next-Generation Smart Contract and Decentralized Application Platform", White Paper, 3(37), 2-1, December 2014. https://nft2x.com/wp-content/uploads/20 21/03/EthereumWP.pdf. |
11 | A. Menezes and D. Stebila, "The Advanced Encryption Standard: 20 Years Later", IEEE Security & Privacy, 19(6), 98-102, October 2021. https://doi.org/10.1109/MSEC.2021. 3107078. DOI |
12 | A. S. E. Pradeep, T. W. Yiu, and R. Amor, "Leveraging Blockchain Technology in a BIM Workflow: A Literature Review", International Conference on Smart Infrastructure and Construction 2019 (ICSIC) Driving Data-informed Decision-making, ICE Publishing, pp.371-380, July 2019. https://doi.org/10.1680/icsic.64669.371. DOI |
13 | N. O. Nawari and S. Ravindran, "Blockchain Technology and BIM Process: Review and Potential Applications", J. Inf. Technol. Constr, 24(12), pp.209-238, May 2019. https://www.academia.edu/40578593/Blockchain_technology_and_BIM_process_Review_and_potential_applications. |
14 | J. P. Cruz, Y. Kaji, and N. Yanai, "RBAC-SC: Role-based Access Control using Smart Contract", IEEE Access, 6, 12240-12251, March 2018. https://doi.org/10.1109/ACCESS. 2018.2812844. DOI |
15 | ARIA (Academy Research Institute Agency) [Internet], https://seed.kisa.or.kr/kisa/algorithm/EgovAriaInfo.do (Checked on 29th September 2022). |
16 | N. O. Nawari and S. Ravindran, "Blockchain and Building Information Modeling (BIM): Review and Applications in Post-Disaster Recovery", Buildings, 9(6), 149, June 2019. https://doi.org/10.3390/buildings9060149. DOI |
17 | H. Guo, E. Meamari, and C. C. Shen, "Multi-Authority Attribute-based Access Control with Smart Contract", Proceedings of the 2019 International Conference on Blockchain Technology, pp.6-11, March 2019. https://doi. org/10.1145/3320154.3320164. DOI |
18 | S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", Decentralized Business Review, 21260, October 2008. https://www.debr.io/article/21260.pdf. |
19 | E. Lee, "The Bored Ape Business Model: Decentralized Collaboration via Blockchain and NFTs", Available at SSRN 3963881, November 2021. http://dx.doi.org/10.2139/ ssrn.3963881. DOI |
20 | T. A. Xu and J. Xu, "A Short Survey on Business Models of Decentralized Finance (DeFi) Protocols", arXiv Preprint arXiv:2202.07742, February 2022. https://doi.org/10.48550/arXiv.2202.07742. DOI |
21 | D. Mohammad and M. Joo, "Protecting BIM Design Intellectual Property with Blockchain: Review and Framework", Proc. of the Conference CIB W78, vol.2021, pp.11-15, October 2021. https://www.researchgate.net/ publication/355195615_Protecting_BIM_Design_Intellectual_Property_with_Blockchain_Review_and_Framework. |
22 | S. W. Choi, S. M. Lee, J. E. Koh, H. J. Kim, and J. S. Kim, "A Study on the Elements of Business Model Innovation of Non-Fungible Token Blockchain Game: Based on 'PlayDapp' Case, An in-game Digital Asset Distribution Platform", Journal of Korea Game Society, 21(2), 123-137, April 2021. https://doi.org/10.7583/JKGS.2021.21.2.123. DOI |
23 | S. Ding, J. Cao, C. Li, K. Fan, and H. Li, "A Novel Attribute-based Access Control Scheme using Blockchain for IoT", IEEE Access 7, 38431-38441, March 2019. https://doi.org/10.1109/ACCESS.2019.2905846. DOI |
24 | Y. Zhang, M. Yutaka, M. Sasabe, and S. Kasahara, "Attribute-based Access Control for Smart Cities: A Smart-Contract-Driven Framework", IEEE Internet of Things Journal, 8(8), 6372-6384, October 2020. https://doi.org/10.1109/JIOT.2020.3033434. DOI |
25 | M. Nadini, L. Alessandretti, F. D. Giacinto, M. Martino, L. M. Aiello, and A. Baronchelli, "Mapping the NFT Revolution: Market Trends, Trade Networks, and Visual Features", Scientific Reports, 11(1), 1-11, October 2021. https://doi.org/10.1038/s415 98-021-00053-8. DOI |
26 | EIP-721: Non-Fungible Token Standard [Internet], https://eips. ethereum.org/EIPS/eip-721 (Checked on 20th September 2022). |
27 | B. Liu, S. Sun, and P. Szalachowski, "SMACS: Smart Contract Access Control Service", 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.221-232, July 2020. https://doi.org/10.1109/DSN4806 3.2020.00039. DOI |
28 | D. Avrilionis and T. Hardjono, "From Trade-only to Zero-Value NFTs: The Asset Proxy NFT Paradigm in Web3", arXiv Preprint arXiv:2205.04899, May 2022. https://doi.org/10.48550/arXiv.2205.04899. DOI |
29 | M. B. Yassein, S. Aljawarneh, and E. Qawasmeh, "Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms", 2017 International Conference on Engineering and Technology (ICET). IEEE, pp.1-7, August 2017. https://doi.org/10.1109/ICEngTechnol.2017. 8308215. DOI |
30 | EIP-1155: Multi Token Standard [Internet], https://eips.ethereum.org/EIPS/eip-1155 (Checked on 26th September 2022). |
31 | R. Xu, Y. Chen, E. Blasch, and G. Chen, "BlendCAC: A Smart Contract-enabled Decentralized Capability-based Access Control Mechanism for the IoT", Computers, 7(3), 39, July 2018. https://doi.org/10.3390/computers7030039. DOI |
![]() |