1 |
Copyright, https://en.wikipedia.org/wiki/Copyright (accessed January 08, 2020).
|
2 |
Research on New Copyright Services Using Blockchain Technology, http://www.copyright.or.kr/information-materials/publication/research-report/view.do?brdctsno=42013 (accessed January 01, 2020).
|
3 |
S. Bae, "Improved CRT-based Image Watermaking in DCT Domain for Copyright Protection," Journal of Korea Multimedia Society, Vol. 16, No. 10, pp. 1163-1170, 2013.
DOI
|
4 |
A. Poikola, K. Kuikkaniemi, and H. Honko, "Mydata a Nordic Model for Human-centered Personal Data Management and Processing," Finnish Ministry of Transport and Communications, http://urn.fi/URN:ISBN:978-952- 243-455-5 (accessed January 01, 2020).
|
5 |
Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," Proceeding of 2017 IEEE International Congress on Big Data, pp. 557-564, 2017.
|
6 |
L.S. Sankar, M. Sindhu, and M. Sethumadhavan, "Survey of Consensus Protocols on Blockchain Applications," Proceeding of 4th International Conference on Advanced Computing and Communication Systems, pp. 1-5, 2017.
|
7 |
A.M. Antonopolous, The Blockchain, Mastering Bitcoin, 2ed, O'Reilly Media, Inc., Sebastopol, California, 2017.
|
8 |
V. Buterin, A Next-generation Smart Contract and Decentralized Application Platform, Ethereum White Paper, 2014.
|
9 |
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy Attribute-based Encryption," Proceeding of IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
|
10 |
Y. Zhang, J. Li, and H. Yan, "Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure," IEEE Access, Vol. 7, pp. 47982-47990, 2019.
DOI
|
11 |
My Data Docs, https://github.com/HIIT/ mydata-service-linking.pdf (accessed January 01, 2020).
|
12 |
My Data Authz Docs, https://github.com/HIIT/mydata-stack/raw/gh-pages/mydatadata-authz.pdf (accessed January 01, 2020).
|
13 |
A. Savelyev, "Copyright in the Blockchain Era: Promises and Challenges," Computer Law and Security Review, Vol. 34, No. 3 pp. 550-561, 2018.
DOI
|
14 |
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance," Proceeding of the Third Symposium on Operating Systems Design and Implementation, pp. 173-186, 1999.
|
15 |
Z. Liu, Z.L. Jiang, X. Wang, and S.M. Yiu, "Practical Attribute-based Encryption: Outsourcing Decryption, Attribute Revocation and Policy Updating," Journal of Network and Computer Applications, Vol. 108, pp. 112-123, 2018.
DOI
|
16 |
D.L.K Chuen and R.H. Deng, Blockchain - From Public to Private, Handbook of Blockchain Digital Finance and Inclusion, Volume 2, pp. 145-177, Academic Press, Cambridge, Massachusetts, 2017.
|
17 |
B. Faber, G.C. Michelet, N. Weidmann, R.R. Mukkamala, and R. Vatrapu, "BPDIMS: A Blockchain-based Personal Data and Identity Management System," Proceeding of the 52nd Hawaii International Conference on System Sciences, pp. 1-10, 2019.
|