Fig. 1From: User authentication and access control to blockchain-based forensic log dataOverview of the smart architectureBack to article page