Skip to main content
. 2021 Jan 22;23(1):e13556. doi: 10.2196/13556

Figure 4.

Figure 4

The fine-grained access control implemented by the chaincode. N: no; Y: yes.