Fig. 28From: User authentication and access control to blockchain-based forensic log dataInteraction of user with ledgers in main serverBack to article page