Fig. 29From: User authentication and access control to blockchain-based forensic log dataClass diagram that shows system functionalityBack to article page