Blockchain Technologies in Practice

Abstract

Suppose that you are developing a critical application that handles sensitive data. Access to the data should be limited, and data should be changed only under specific circumstances. Moreover, at any point in time you may be asked to provide an audit trail for the entire history of any piece of data, for example, the entire history of changes for a specific record. How will you make sure that you can provide the history as it happened, certain that it has not been tampered with in any way? © 1984-2012 IEEE

    Similar works