“AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS” (2025) Information systems and technologies security, 2(8), pp. 56–59. doi:10.17721/ISTS.2024.8.56-59.