Research Article
A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems
Table 3
The mapping rules of access permission.
| Permission | One month | Three months | Five months | Seven months | Only read | Read write | Read write delete |
| Numbers | 3 | 4 | 5 | 7 | 11 | 13 | 17 |
|
|