Security Architectures in Digital Economy Systems
Abstract
Full Text:
PDF (Russian)References
BL and Big Data: Reviw TAdviser [Online] Available: https://www.tadviser.ru/index.php/BI.
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Protection of valuable information in public information space,” Communications of the ECMS. Proceedings of the 33th European Conference on Modelling and Simulation, vol. 33, no. 1, pp. 451–455, 2019.
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina. “Protection of valuable information in information technologies,” Problems of information security. Computer systems, no. 2, pp. 22-26. 2018.
Grusho, A., Ed. Primenko, and E. Timonina. Theoretical bases of computer security. Moscow: Academy. 2009.
Su, Tzong-An and Gultekin Özsoyoglu. “Data Dependencies and Inference Control in Multilevel Relational Database Systems,” in 1987 IEEE Symposium on Security and Privacy, pp. 202-202, 1987.
C. Stathakopoulou, C. Cachin, “Threshold Signatures for Blockchain Systems,” Zurich: IBM Research, 2017. Available: https://pdfs.semanticscholar.org/2300/3bfc73e8d2fde9a465f4054f55ad1f2e8113.pdf?_ga=2.94560920.504720217.1596215569-1669259798.1588171840.
Leemon Baird, “The Swirlds Hashgraph Consensus Algorithm: Fair, Fast, Byzantine Fault Tolerance,” 2016. Available: https://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf.
Merkle Tree. [Online]. Available: https://en.wikipedia.org/wiki/Merkle_tree.
Georg Becker, “Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis,” 2008. [Online]. Available: https://www.emsec.ruhr-uni-bochum.de/media/crypto/attachments/files/2011/04/becker_1.pdf.
Rajeev Sobti, G.Geetha, “Cryptographic Hash Functions: A Review”, International Journal of Computer Science Issues, vol. 9, issue 2, no 2, pp. 461-479, 2012. Available: https://www.researchgate.net/publication/267422045_Cryptographic_Hash_Functions_A_Review.
Anton Churyumov, “Byteball: A Decentralized System for Storage and Transfer of Value,” [Online]. Available: https://obyte.org/Byteball.pdf.
Bjorn Hauge,” SWIFTNet, VisaNet and Blockchain: The Future of Clearing,” 2018, [Online]. Available: https://medium.com/datadriveninvestor/swiftnet-visanet-and-blockchain-the-future-of-clearing-f42de3ced34c.
VISA, [Online]. Available: https://usa.visa.com/partner-with-us/payment-technology/visa-b2b-connect.html.
Dr. Leemon Baird, Mance Harmon, and Paul Madsen, “Hedera: A Public Hashgraph. Network & Governing Council. The trust layer of the internet,” 2019. [Online]. Available: https://www.hedera.com/hh-whitepaper-v1.4-181017.pdf.
Eric Harris-Braun, Nicolas Luck, Arthur Brock, “Holochain. Scalable agent-centric distributed computing,” DRAFT (ALPHA 1) - 2/15/2018. [Online]. Available: https://whitepaperdatabase.com/wp-content/uploads/2018/08/holochain-HOT-whitepaper.pdf.
Directed Acyclic Graphs (DAGs). [Online]. Available: https://ericsink.com/vcbe/html/directed_acyclic_graphs.html.
Tai-Yuan Chen, Wei-Ning Huang, Po-Chun Kuo, Hao Chung and Tzu-Wei Chao, “A Highly Scalable, Decentralized DAG-Based Consensus Algorithm,” DEXON Foundation, Taiwan, [Online]. Available: https://eprint.iacr.org/2018/1112.pdf.
Department of Defense Trusted Computer System Evaluation Criteria, DoD, 1985. Available: https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/dod85.pdf.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность IT Congress 2024
ISSN: 2307-8162