{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T16:51:55Z","timestamp":1771779115552,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T00:00:00Z","timestamp":1581897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300090"],"award-info":[{"award-number":["61300090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC-Guangdong Joint Fund","award":["U1401257"],"award-info":[{"award-number":["U1401257"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and even controlling them. Several role-based access control (RBAC) mechanisms have been proposed to alleviate these problems, but the security has not been fully realized. In this work, however, we present an RBAC model based on blockchain technology to enhance user authentication before knowledge is accessed and utilized in a knowledge management system (KMS). Our blockchain-based system model and the smart contract ensure that transparency and knowledge resource immutability are achieved. We also present smart contract algorithms and discussions about the model. As an essential part of RBAC model applied to KMS environment, trust is ensured in the network. Evaluation results show that our system is efficient.<\/jats:p>","DOI":"10.3390\/info11020111","type":"journal-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T10:10:25Z","timestamp":1582020625000},"page":"111","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1548-4306","authenticated-orcid":false,"given":"Gabriel","family":"Nyame","sequence":"first","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7935-9950","authenticated-orcid":false,"given":"Kwame Opuni-Boachie","family":"Obour Agyekum","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]},{"given":"Emmanuel Boateng","family":"Sifah","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Nonaka, I., and Takeuchi, H. (1995). The Knowledge-Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford University Press.","DOI":"10.1093\/oso\/9780195092691.001.0001"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Nemetz, M. (2006). A meta-model for intellectual capital reporting. International Conference on Practical Aspects of Knowledge Management, Springer.","DOI":"10.1007\/11944935_19"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0024-6301(97)90252-1","article-title":"Knowledge management: A strategic agenda","volume":"30","author":"Quintas","year":"1997","journal-title":"Long Range Plan."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ogunseye, O.S., Folorunso, O., and Zhang, J. (2011). Preventing Social Engineering and Espionage in Collaborative Knowledge Management Systems (KMSs). Int. J. E-Adopt.","DOI":"10.4018\/jea.2011100104"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Chen, T.Y. (2009). A multiple-Layer knowledge management system framework considering user knowledge privileges. Int. J. Softw. Eng. Knowl. Eng.","DOI":"10.1142\/S0218194009004192"},{"key":"ref_6","unstructured":"Ferraiolo, D., Cugini, J., and Kuhn, D.R. (1995, January 11\u201315). Role based access control: Features and motivations. Proceedings of the 11th Annual Conference on Computer Security Applications, New Orleans, LA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","article-title":"RBAC-SC: Role-Based Access Control Using Smart Contract","volume":"6","author":"Cruz","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Barkley, J.F., and Kuhn, D.R. (1999). A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur.","DOI":"10.1145\/300830.300834"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Gupta, A., Kirkpatrick, M.S., and Bertino, E. (2013). A formal proximity model for RBAC systems. Comput. Secur.","DOI":"10.4108\/icst.collaboratecom.2012.250453"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Malik, A.K., and Dustdar, S. (2011, January 9\u201311). Sharing and Privacy-Aware RBAC in Online Social Networks. Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA.","DOI":"10.1109\/PASSAT\/SocialCom.2011.93"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Nonaka, I., Toyama, R., and Konno, N. (2000). SECI, Ba and Leadership: A Unified Model of Dynamic Knowledge Creation. Long Range Plan.","DOI":"10.4135\/9781446217573.n2"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1177\/1534484303257985","article-title":"Knowledge sharing Sharing in organizations: A conceptual framework","volume":"2","author":"Ipe","year":"2003","journal-title":"Hum. Resourc. Dev. Rev."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Panarello, A., Tapas, N., Merlino, G., Longo, F., and Puliafito, A. (2018). Blockchain and IoT Integration: A Systematic Survey. Sensors, 18.","DOI":"10.3390\/s18082575"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","article-title":"Can Blockchain Strengthen the Internet of Things?","volume":"19","author":"Kshetri","year":"2017","journal-title":"IT Prof."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.ijpe.2018.12.010","article-title":"Evaluation of design alternatives of End-Of-Life products using Internet of things","volume":"208","author":"Joshi","year":"2019","journal-title":"Int. J. Prod. Econ."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.ijinfomgt.2018.11.021","article-title":"Blockchain adoption challenges in supply chain: An empirical investigation of the main drivers in India and the USA","volume":"46","author":"Queiroz","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.ijpe.2019.02.002","article-title":"Making sense of blockchain technology: How will it transform supply chains?","volume":"211","author":"Wang","year":"2019","journal-title":"Int. J. Prod. Econ."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"Computer"},{"key":"ref_19","unstructured":"Xia, L., and Jing, J. (2006, January 6\u20139). An administrative model for role-based access control using hierarchical namespace. Proceedings of the Pacific Asia Conference on Information Systems (PACIS), Kuala Lumpur, Malaysia."},{"key":"ref_20","first-page":"42","article-title":"A permission model of Saas system based on RBAC","volume":"27","author":"Lilin","year":"2010","journal-title":"Comput. Appl. Softw."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, Q., Xu, M., and Zhang, X. (2008, January 17\u201320). Towards a group-based RBAC model and decentralized user-role administration. Proceedings of the 2008 28th International Conference on Distributed Computing Systems Workshops, Beijing, China.","DOI":"10.1109\/ICDCS.Workshops.2008.26"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"107","DOI":"10.2307\/3250961","article-title":"Knowledge management and knowledge management systems: Conceptual foundations and research issues","volume":"25","author":"Alavi","year":"2001","journal-title":"MIS Q."},{"key":"ref_23","first-page":"92","article-title":"Implementation of knowledge management systems and firm performance: An empirical investigation","volume":"45","author":"Feng","year":"2004","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"308","DOI":"10.2307\/259084","article-title":"Transnational Transfer of Strategic Organizational Practices: A Contextual Perspective","volume":"24","author":"Kostova","year":"1999","journal-title":"Acad. Manag. Rev."},{"key":"ref_25","unstructured":"St. Rose, V. (2015). An Empirical Study of the Characteristics of the Role Based Access Control (RBAC) Model in Securing Knowledge Management (KM) and Knowledge Management Systems (KMS). [Ph.D. Thesis, Colorado Technical University]. ProQuest LLC; ISBN 978-0-3558-2647-0."},{"key":"ref_26","first-page":"1051","article-title":"A framework of secure KMS with RBAC implementation","volume":"10","author":"Bakar","year":"2015","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"ref_27","unstructured":"Fill, H.-G., and Felix, H. (2020, February 17). Knowledge Blockchains: Applying Blockchain Technologies to Enterprise Modeling. Available online: https:\/\/scholarspace.manoa.hawaii.edu\/handle\/10125\/50398."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ieri.2014.09.081","article-title":"Extended Access Control and Recommendation Methods for Enterprise Knowledge Management System","volume":"10","author":"Wang","year":"2014","journal-title":"IERI Procedia"},{"key":"ref_29","unstructured":"Farrell, S., and Housley, R. (2020, February 17). An Internet Attribute Certificate Profile for Authorization. Available online: https:\/\/tools.ietf.org\/html\/rfc3281."},{"key":"ref_30","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. (2020, February 17). RFC 2693: SPKI Certificate Theory. Available online: https:\/\/tools.ietf.org\/html\/rfc2693."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/MC.2004.1266303","article-title":"Simplifying public key management","volume":"37","author":"Gutmann","year":"2004","journal-title":"Computer"},{"key":"ref_32","unstructured":"Charette, R. (2020, February 17). DigiNotar certificate authority breach crashes e-Government in The Netherlands. Available online: https:\/\/spectrum.ieee.org\/riskfactor\/telecom\/security\/diginotar-certificate-authority-breach-crashes-egovernment-in-the-netherlands."},{"key":"ref_33","unstructured":"Lewko, A., and Waters, B. (2011, January 15\u201319). Decentralizing attribute-based encryption. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia."},{"key":"ref_34","unstructured":"Okamoto, T., and Katsuyuki, T. (March, January 26). Decentralized attribute-based signatures. Proceedings of the International Workshop on Public Key Cryptography, Nara, Japan."},{"key":"ref_35","unstructured":"Nakamoto, S. (2020, February 17). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"Enrique Soler, and Manuel D\u00edaz. On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4945","DOI":"10.1007\/s11227-018-2308-7","article-title":"Chain-based big data access control infrastructure","volume":"74","author":"Sifah","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Merkle, R.C. (1980, January 14\u201316). Protocols for Public Key Cryptosystems. Proceedings of the 1980 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.1980.10006"},{"key":"ref_39","first-page":"50","article-title":"Responses to NIST\u2019s Proposal","volume":"35","author":"Vanstone","year":"1992","journal-title":"Commun. ACM"},{"key":"ref_40","unstructured":"National Institute of Standards and Technology (1994). Digital Signature Standard, FIPS Publication."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","article-title":"Uses of elliptic curves in cryptography","volume":"Volume 218","author":"Miller","year":"1986","journal-title":"Advances in Cryptology\u2014Crypto \u201985"},{"key":"ref_43","unstructured":"Wood, G. (2020, February 17). Ethereum: A Secure Decentralised Generalised Transaction Ledger. Available online: https:\/\/gavwood.com\/paper.pdf."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","article-title":"LSB: A Lightweight Scalable Blockchain for IoT security and anonymity","volume":"134","author":"Dorri","year":"2019","journal-title":"J. Parall. Distribut. Comput."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/11\/2\/111\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:58:30Z","timestamp":1760173110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/11\/2\/111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,17]]},"references-count":44,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2020,2]]}},"alternative-id":["info11020111"],"URL":"https:\/\/doi.org\/10.3390\/info11020111","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,17]]}}}