Cavalcante et al., 2024 - Google Patents
Confidentialchain: Enhancing the Security of a Notarization System Based on BlockchainCavalcante et al., 2024
- Document ID
- 4302526861326126989
- Author
- Cavalcante M
- Xexéo J
- Dos Santos A
- Publication year
- Publication venue
- 2024 6th International Conference on Blockchain Computing and Applications (BCCA)
External Links
Snippet
Blockchain platforms offer traceability, integrity, immutability and availability by native construction, providing resources for auditors to attest the security and temporal traceability of data stored in the blocks. However, permissioned blockchain platforms do not provide …
- 230000002708 enhancing effect 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11936774B2 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
JP7602539B2 (en) | Quantum Safe Networking | |
Ali et al. | SeDaSC: secure data sharing in clouds | |
US20180034810A1 (en) | A system and methods for protecting keys in computerized devices operating versus a server | |
CN107911216A (en) | A kind of block chain transaction method for secret protection and system | |
CN116340331A (en) | Large instrument experimental result evidence-storing method and system based on blockchain | |
Gangadharaiah et al. | Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain | |
US20240430102A1 (en) | Systems and methods for enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements | |
Biswas et al. | Secure login: A blockchain based web application for identity access management system | |
Dar et al. | Blockchain based secure data exchange between cloud networks and smart hand-held devices for use in smart cities | |
Kaaniche et al. | Id-based user-centric data usage auditing scheme for distributed environments | |
EP4231583A1 (en) | Methods and arrangements for establishing digital identity | |
Cavalcante et al. | Confidentialchain: Enhancing the Security of a Notarization System Based on Blockchain | |
Shah et al. | Third party public auditing scheme for security in cloud storage | |
TW202101267A (en) | Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer | |
Saeed et al. | Survey on Transaction Verification Model based on Blockchain Architecture | |
CN118713833A (en) | Quantum-resistant security enhancements for the Open Identity Connection Protocol | |
Kandepet | An overview of public key infrastructure | |
CN118886059A (en) | A privacy protection method and system for government approval data based on alliance chain and homomorphic encryption | |
CN118694618A (en) | A method to enhance the quantum security of the central authentication service protocol | |
CN118631457A (en) | Quantum-resistant security enhancement method for security assertion labeling protocol | |
Fusaru et al. | Encryption algorithms for databases |