CORE
🇺🇦
make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Blockchain Technologies in Practice
Authors
C. Ebert Louridas, P. Fernandez-Carames, T.M. Fraga-Lamas, P.
Publication date
1 January 2020
Publisher
Abstract
Suppose that you are developing a critical application that handles sensitive data. Access to the data should be limited, and data should be changed only under specific circumstances. Moreover, at any point in time you may be asked to provide an audit trail for the entire history of any piece of data, for example, the entire history of changes for a specific record. How will you make sure that you can provide the history as it happened, certain that it has not been tampered with in any way? © 1984-2012 IEEE
Similar works
Full text
Available Versions
Pergamos : Unified Institutional Repository / Digital Library Platform of the National and Kapodistrian University of Athens
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:lib.uoa.gr:uoadl:3071270
Last time updated on 10/02/2023