Nothing Special   »   [go: up one dir, main page]

Cavalcante et al., 2024 - Google Patents

Confidentialchain: Enhancing the Security of a Notarization System Based on Blockchain

Cavalcante et al., 2024

Document ID
4302526861326126989
Author
Cavalcante M
Xexéo J
Dos Santos A
Publication year
Publication venue
2024 6th International Conference on Blockchain Computing and Applications (BCCA)

External Links

Snippet

Blockchain platforms offer traceability, integrity, immutability and availability by native construction, providing resources for auditors to attest the security and temporal traceability of data stored in the blocks. However, permissioned blockchain platforms do not provide …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US11936774B2 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
JP7602539B2 (en) Quantum Safe Networking
Ali et al. SeDaSC: secure data sharing in clouds
US20180034810A1 (en) A system and methods for protecting keys in computerized devices operating versus a server
CN107911216A (en) A kind of block chain transaction method for secret protection and system
CN116340331A (en) Large instrument experimental result evidence-storing method and system based on blockchain
Gangadharaiah et al. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain
US20240430102A1 (en) Systems and methods for enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
Biswas et al. Secure login: A blockchain based web application for identity access management system
Dar et al. Blockchain based secure data exchange between cloud networks and smart hand-held devices for use in smart cities
Kaaniche et al. Id-based user-centric data usage auditing scheme for distributed environments
EP4231583A1 (en) Methods and arrangements for establishing digital identity
Cavalcante et al. Confidentialchain: Enhancing the Security of a Notarization System Based on Blockchain
Shah et al. Third party public auditing scheme for security in cloud storage
TW202101267A (en) Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer
Saeed et al. Survey on Transaction Verification Model based on Blockchain Architecture
CN118713833A (en) Quantum-resistant security enhancements for the Open Identity Connection Protocol
Kandepet An overview of public key infrastructure
CN118886059A (en) A privacy protection method and system for government approval data based on alliance chain and homomorphic encryption
CN118694618A (en) A method to enhance the quantum security of the central authentication service protocol
CN118631457A (en) Quantum-resistant security enhancement method for security assertion labeling protocol
Fusaru et al. Encryption algorithms for databases