首页 > 最新文献

CompSciRN: Other Cybersecurity最新文献

英文 中文
A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence 对欧盟人工智能高级别专家组政策建议的批判性看法
Pub Date : 2019-10-28 DOI: 10.31228/osf.io/dvx4f
Michael Veale
The European Commission recently published the policy recommendations of its “High-Level Expert Group on Artificial Intelligence”: a heavily anticipated document, particularly in the context of the stated ambition of the new Commission President to regulate in that area. This article argues that these recommendations have significant deficits in a range of areas. It analyses a selection of the Group’s proposals in context of the governance of artificial intelligence more broadly, focusing on issues of framing, representation and expertise, and on the lack of acknowledgement of key issues of power and infrastructure underpinning modern information economies and practices of optimisation.
欧盟委员会最近公布了其“人工智能高级别专家组”的政策建议:这是一份备受期待的文件,特别是在新任委员会主席明确表示要在该领域进行监管的背景下。本文认为,这些建议在一系列领域存在重大缺陷。它在更广泛的人工智能治理背景下分析了该集团的一些建议,重点关注框架、代表性和专业知识的问题,以及对支持现代信息经济和优化实践的权力和基础设施的关键问题缺乏认识。
{"title":"A Critical Take on the Policy Recommendations of the EU High-Level Expert Group on Artificial Intelligence","authors":"Michael Veale","doi":"10.31228/osf.io/dvx4f","DOIUrl":"https://doi.org/10.31228/osf.io/dvx4f","url":null,"abstract":"The European Commission recently published the policy recommendations of its “High-Level Expert Group on Artificial Intelligence”: a heavily anticipated document, particularly in the context of the stated ambition of the new Commission President to regulate in that area. This article argues that these recommendations have significant deficits in a range of areas. It analyses a selection of the Group’s proposals in context of the governance of artificial intelligence more broadly, focusing on issues of framing, representation and expertise, and on the lack of acknowledgement of key issues of power and infrastructure underpinning modern information economies and practices of optimisation.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A Study on Blockchain Technology 区块链技术研究
Pub Date : 2019-10-15 DOI: 10.2139/ssrn.3477373
Satarupa Saha, Bappaditya Jana, Jayanta Poray
The Blockchain is the newest and perspective technology in modern economy. A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. It provides provenance, immutability and finality for the transfer of value within a business network. - It enables value exchange in real time, reducing costs and errors. Based on a network consensus approach, whereby trust between the parties involved in a transaction is provided by cryptography. This paper aims to show brief overview of Blockchain Technology, applications and have discussed limitations in the perspective of future research on security in fanatical transaction.
bb0是现代经济中最新的、最有前途的技术。区块链本质上是所有交易或数字事件的记录或公共分类账的分布式数据库,这些交易或数字事件已在参与各方之间执行并共享。它为业务网络内的价值转移提供了来源、不变性和最终性。-实现实时价值交换,减少成本和错误。基于网络共识方法,通过密码学提供交易各方之间的信任。本文旨在简要概述区块链技术及其应用,并从未来狂热交易安全研究的角度讨论其局限性。
{"title":"A Study on Blockchain Technology","authors":"Satarupa Saha, Bappaditya Jana, Jayanta Poray","doi":"10.2139/ssrn.3477373","DOIUrl":"https://doi.org/10.2139/ssrn.3477373","url":null,"abstract":"The Blockchain is the newest and perspective technology in modern economy. A blockchain is essentially a distributed database of records or public ledger of all transactions or digital events that have been executed and shared among participating parties. It provides provenance, immutability and finality for the transfer of value within a business network. - It enables value exchange in real time, reducing costs and errors. Based on a network consensus approach, whereby trust between the parties involved in a transaction is provided by cryptography. This paper aims to show brief overview of Blockchain Technology, applications and have discussed limitations in the perspective of future research on security in fanatical transaction.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Introduction to Blockchain Technology From a Legal Perspective and Its Tensions With the GDPR 从法律角度介绍区块链技术及其与GDPR的紧张关系
Pub Date : 2019-09-30 DOI: 10.2139/ssrn.3545331
Diogo Duarte
In this paper, we provide a brief overview of blockchain technology from a legal perspective and its legal tensions with the General Data Protection Regulation (GDPR). The purpose of our study is to provide a first approach to help legal professionals, researchers, and students to better understand what is the blockchain technology and how it works, and what are its implications on data protection requirements, particularly in the allocation of responsibilities and in the data subject’s rights. This study primarily focusses on the decentralized and immutable features of blockchain technology and the complexities and uncertainties it creates with respect to the centralized way in which the GDPR operates. Consequently, we also present a few solutions that can be implemented into the design of blockchain-based applications to achieve some of the GDPR’s objectives.
在本文中,我们从法律角度简要概述了区块链技术及其与通用数据保护条例(GDPR)的法律关系。我们研究的目的是提供第一种方法,帮助法律专业人士、研究人员和学生更好地了解区块链技术是什么,它是如何工作的,以及它对数据保护要求的影响,特别是在责任分配和数据主体权利方面。本研究主要关注区块链技术的去中心化和不可变特征,以及它与GDPR操作的中心化方式相关的复杂性和不确定性。因此,我们还提出了一些可以实施到基于区块链的应用程序设计中的解决方案,以实现GDPR的一些目标。
{"title":"An Introduction to Blockchain Technology From a Legal Perspective and Its Tensions With the GDPR","authors":"Diogo Duarte","doi":"10.2139/ssrn.3545331","DOIUrl":"https://doi.org/10.2139/ssrn.3545331","url":null,"abstract":"In this paper, we provide a brief overview of blockchain technology from a legal perspective and its legal tensions with the General Data Protection Regulation (GDPR). The purpose of our study is to provide a first approach to help legal professionals, researchers, and students to better understand what is the blockchain technology and how it works, and what are its implications on data protection requirements, particularly in the allocation of responsibilities and in the data subject’s rights. This study primarily focusses on the decentralized and immutable features of blockchain technology and the complexities and uncertainties it creates with respect to the centralized way in which the GDPR operates. Consequently, we also present a few solutions that can be implemented into the design of blockchain-based applications to achieve some of the GDPR’s objectives.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Collaborative Enforcement Mechanism for Spectrum Sharing Using Blockchain and Smart Contracts: An Application for the 1695-1710MHz Band 使用区块链和智能合约的频谱共享协同执行机制:1695-1710MHz频段的应用
Pub Date : 2019-07-26 DOI: 10.2139/ssrn.3427469
Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose
Traditionally, spectrum allocation has been governed by centralized schemes (e.g., command-and-control). Nonetheless, other mechanisms, such as collaborative enforcement, have proven to be successful in a variety of scenarios. In Collaborative enforcement (i.e., collective action), the stakeholders agree on decision-making arrangements (i.e., access, allocation and control of the resources) while being involved in monitoring the adherence to the rules as a shared effort. Blockchain is a distributed ledger of records/transactions (i.e., database) that brings many benefits such as decentralization, transparency, immutability, etc. One of the most notable characteristics of blockchain-based platforms is their definition as trustless environments, as there is no central entity in charge of controlling the network interactions. Instead, trust is a group effort, achieved through repeated interactions, consensus algorithms, and cryptographic tools; therefore, converting blockchain systems into prominent examples of collaborative governance regimes. In this paper, our goal is to analyze a particular application of blockchain and smart contracts for the 1695-1710MHz sharing scenario. In this way, we provide a theoretical analysis of the feasibility and the required characteristics to implement such a system. In addition, through the implementation of a Proof of Concept, we evaluate how the implementation of a blockchain-based organization can be the motor to build a collaborative governance scheme in the spectrum sharing arrangement of the 1695-1710MHz band.
传统上,频谱分配是由集中方案(例如,命令与控制)管理的。尽管如此,其他机制,如协作执行,已被证明在各种情况下是成功的。在协作执行(即集体行动)中,利益相关者就决策安排(即资源的访问、分配和控制)达成一致,同时作为共同努力参与对规则遵守情况的监测。区块链是一种记录/交易的分布式分类账(即数据库),它带来了许多好处,如去中心化、透明度、不可变性等。基于区块链的平台最显著的特征之一是它们被定义为无信任环境,因为没有中央实体负责控制网络交互。相反,信任是一种群体努力,通过反复互动、共识算法和加密工具实现;因此,将区块链系统转化为协作治理机制的突出例子。在本文中,我们的目标是分析1695-1710MHz共享场景下区块链和智能合约的特定应用。在此基础上,从理论上分析了实现该系统的可行性和所需的特性。此外,通过实施概念验证,我们评估了基于区块链的组织的实施如何成为在1695-1710MHz频段的频谱共享安排中建立协作治理方案的马达。
{"title":"A Collaborative Enforcement Mechanism for Spectrum Sharing Using Blockchain and Smart Contracts: An Application for the 1695-1710MHz Band","authors":"Pedro J. Bustamante, Marcela M. Gomez, M. Weiss, T. Znati, Debarun Das, J. Stephanie Rose","doi":"10.2139/ssrn.3427469","DOIUrl":"https://doi.org/10.2139/ssrn.3427469","url":null,"abstract":"Traditionally, spectrum allocation has been governed by centralized schemes (e.g., command-and-control). Nonetheless, other mechanisms, such as collaborative enforcement, have proven to be successful in a variety of scenarios. In Collaborative enforcement (i.e., collective action), the stakeholders agree on decision-making arrangements (i.e., access, allocation and control of the resources) while being involved in monitoring the adherence to the rules as a shared effort. \u0000 \u0000Blockchain is a distributed ledger of records/transactions (i.e., database) that brings many benefits such as decentralization, transparency, immutability, etc. One of the most notable characteristics of blockchain-based platforms is their definition as trustless environments, as there is no central entity in charge of controlling the network interactions. Instead, trust is a group effort, achieved through repeated interactions, consensus algorithms, and cryptographic tools; therefore, converting blockchain systems into prominent examples of collaborative governance regimes. \u0000 \u0000In this paper, our goal is to analyze a particular application of blockchain and smart contracts for the 1695-1710MHz sharing scenario. In this way, we provide a theoretical analysis of the feasibility and the required characteristics to implement such a system. In addition, through the implementation of a Proof of Concept, we evaluate how the implementation of a blockchain-based organization can be the motor to build a collaborative governance scheme in the spectrum sharing arrangement of the 1695-1710MHz band.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126413578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision-Making with Technology 科技决策
Pub Date : 2019-05-25 DOI: 10.2139/ssrn.3393984
Sourav Mukherjee
In every organization decision-making is an integral part of the management process. Technology is booming and in decision-making, it is taking key responsibilities. Every company deals with a huge amount of data from various sources daily and operating with the volume of data is absolutely astounding compared to what the organizations used to do decades ago. In today’s world, business intelligence tools are very important components of any successful business strategy. These tools allow users to modernize the effort needed to search for, combine and query data to obtain the information required for good decisions. In this article, we will discuss the technology trends in decision-making, the capabilities of technology in managerial decision-making and the cognitive ability of decision-making. We will also discuss supervised and unsupervised learning of machine learning techniques, how artificial neural nets (ANNs) use supervised learning to predict outcomes in decision-making with real-world examples.
在任何组织中,决策都是管理过程的一个组成部分。技术正在蓬勃发展,在决策方面,它承担着关键的责任。每个公司每天都要处理来自各种来源的大量数据,与几十年前的组织相比,处理大量数据绝对是令人震惊的。在当今世界,商业智能工具是任何成功商业战略的重要组成部分。这些工具使用户能够现代化搜索、组合和查询数据所需的工作,从而获得良好决策所需的信息。在本文中,我们将讨论决策中的技术趋势,技术在管理决策中的能力和决策的认知能力。我们还将讨论机器学习技术的监督学习和无监督学习,人工神经网络(ann)如何使用监督学习来预测现实世界示例的决策结果。
{"title":"Decision-Making with Technology","authors":"Sourav Mukherjee","doi":"10.2139/ssrn.3393984","DOIUrl":"https://doi.org/10.2139/ssrn.3393984","url":null,"abstract":"In every organization decision-making is an integral part of the management process. Technology is booming and in decision-making, it is taking key responsibilities. Every company deals with a huge amount of data from various sources daily and operating with the volume of data is absolutely astounding compared to what the organizations used to do decades ago. In today’s world, business intelligence tools are very important components of any successful business strategy. These tools allow users to modernize the effort needed to search for, combine and query data to obtain the information required for good decisions. In this article, we will discuss the technology trends in decision-making, the capabilities of technology in managerial decision-making and the cognitive ability of decision-making. We will also discuss supervised and unsupervised learning of machine learning techniques, how artificial neural nets (ANNs) use supervised learning to predict outcomes in decision-making with real-world examples.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Ledger Technology: Secuirty Threats in Cryptography 分布式账本技术:密码学中的安全威胁
Pub Date : 2019-05-24 DOI: 10.2139/ssrn.3393539
Farhan Anwar Ghumman
DLT has become an important topic of the world in recent years. Today Distributed Ledger Technology is growing famous among transactions and storing data between organizations. It has given an economic boom to many businesses and industries. DL technology brings a revolutionary change in maintaining secure transactions and storing data on a network of machines. The data stored use crypto technology to make it secure. Although this technology brings a revolutionary change and more convenient services, the security issues of crypto technology is also a very important discussion which we need to concern. This paper discusses the security threats, deficiencies and weaknesses of Crypto Technology. Security issues is discussed which might occurred in systems, networks, transaction etc.
近年来,分布式账本技术已成为世界范围内的一个重要话题。今天,分布式账本技术在组织之间的交易和存储数据中越来越出名。它给许多企业和行业带来了经济繁荣。DL技术在维护安全交易和在机器网络上存储数据方面带来了革命性的变化。存储的数据使用加密技术使其安全。虽然这项技术带来了革命性的变化和更便捷的服务,但加密技术的安全问题也是我们需要关注的一个非常重要的讨论。本文讨论了加密技术的安全威胁、不足和弱点。讨论了系统、网络、事务等可能发生的安全问题。
{"title":"Distributed Ledger Technology: Secuirty Threats in Cryptography","authors":"Farhan Anwar Ghumman","doi":"10.2139/ssrn.3393539","DOIUrl":"https://doi.org/10.2139/ssrn.3393539","url":null,"abstract":"DLT has become an important topic of the world in recent years. Today Distributed Ledger Technology is growing famous among transactions and storing data between organizations. It has given an economic boom to many businesses and industries. DL technology brings a revolutionary change in maintaining secure transactions and storing data on a network of machines. The data stored use crypto technology to make it secure. Although this technology brings a revolutionary change and more convenient services, the security issues of crypto technology is also a very important discussion which we need to concern. This paper discusses the security threats, deficiencies and weaknesses of Crypto Technology. Security issues is discussed which might occurred in systems, networks, transaction etc.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131216824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regulating Bitcoin: A Tax Case Study 监管比特币:税收案例研究
Pub Date : 2019-05-20 DOI: 10.2139/ssrn.3402260
Margaret Ryznar
This chapter adapts the Coffee bonding theory to the modern context of bitcoin, using tax as a case study. As the theory predicts, tax authorities may be able to increase the legitimacy of bitcoin by improving tax compliance and reducing tax evasion. Thus, while the Coffee theory arose two decades ago to explain the cross-listing of foreign company shares, it has implications for the modern context of bitcoin.
本章以税收为例,将咖啡结合理论应用于比特币的现代背景。正如该理论预测的那样,税务机关或许能够通过提高税收合规性和减少逃税来提高比特币的合法性。因此,虽然咖啡理论在20年前出现,用于解释外国公司股票的交叉上市,但它对比特币的现代背景有影响。
{"title":"Regulating Bitcoin: A Tax Case Study","authors":"Margaret Ryznar","doi":"10.2139/ssrn.3402260","DOIUrl":"https://doi.org/10.2139/ssrn.3402260","url":null,"abstract":"This chapter adapts the Coffee bonding theory to the modern context of bitcoin, using tax as a case study. As the theory predicts, tax authorities may be able to increase the legitimacy of bitcoin by improving tax compliance and reducing tax evasion. Thus, while the Coffee theory arose two decades ago to explain the cross-listing of foreign company shares, it has implications for the modern context of bitcoin.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and Smart-Contract: A Pioneering Approach of Inter-Firms Relationships? The Case of Franchise Networks 区块链和智能合约:企业间关系的开创性方法?特许经营网络案例
Pub Date : 2019-04-26 DOI: 10.2139/ssrn.3378477
R. Baron, Magali Chaudey
This paper is interested in the analysis of Blockchains and Smart-contracts applied to inter-firms relationships, in particular the franchise networks. After defining the Blockchain technology and the Smart-contract as a particular type of contract stored in blockchains, we question the theory of contracts and its conception(s) of transactions, information asymmetries, firm or inter-firm relations. To better understand the challenges of blockchain for franchise networks and identify opportunities for implementation in these networks, we present some relevant applications of this technology. We identify different ways where blockchain technology could improve the network management and therefore their performance: the supply-chain, the brand-name protection, security and transparency in the payment of fees and royalties, access to reliable information via an oracle.
本文对应用于公司间关系的区块链和智能合约的分析感兴趣,特别是特许经营网络。在将区块链技术和智能合约定义为存储在区块链中的特定类型的合约之后,我们质疑合约理论及其交易、信息不对称、企业或企业间关系的概念。为了更好地理解区块链对特许经营网络的挑战,并确定在这些网络中实施的机会,我们介绍了该技术的一些相关应用。我们确定了区块链技术可以改善网络管理的不同方式,从而改善其性能:供应链、品牌保护、费用和版税支付的安全性和透明度,以及通过oracle获取可靠信息的途径。
{"title":"Blockchain and Smart-Contract: A Pioneering Approach of Inter-Firms Relationships? The Case of Franchise Networks","authors":"R. Baron, Magali Chaudey","doi":"10.2139/ssrn.3378477","DOIUrl":"https://doi.org/10.2139/ssrn.3378477","url":null,"abstract":"This paper is interested in the analysis of Blockchains and Smart-contracts applied to inter-firms relationships, in particular the franchise networks. After defining the Blockchain technology and the Smart-contract as a particular type of contract stored in blockchains, we question the theory of contracts and its conception(s) of transactions, information asymmetries, firm or inter-firm relations. To better understand the challenges of blockchain for franchise networks and identify opportunities for implementation in these networks, we present some relevant applications of this technology. We identify different ways where blockchain technology could improve the network management and therefore their performance: the supply-chain, the brand-name protection, security and transparency in the payment of fees and royalties, access to reliable information via an oracle.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122809543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Data Security in Mobile Cloud Computing 移动云计算中的数据安全
Pub Date : 2019-03-14 DOI: 10.2139/ssrn.3352362
Rashmi P. Sarode, S. Bhalla
Mobile Cloud Computing (MCC) is a rapid growing technology these days as number of mobile users are increasing day by day. Data privacy and security due to the use of mobile devices is an aspect of major concern. MCC can offer infrastructure, computational power, software and platform services to any ordinary smartphone. There are several issues regarding the security of MCC such as network security, web application security, data access, authentication, authorization, data confidentiality, and data breach. Mobile devices do not have enough storage and CPU speed so data storage capacity in these devices is less. To achieve a secure MCC environment, security threats have to be studied and analyzed accordingly. We propose an algorithm to enhance the security of the mobile cloud which will ensure data integrity and confidentiality. This mechanism uses AES and RSA to provide better security. We also discuss the security threats in MCC environments and propose solutions for these.
随着移动用户数量的日益增加,移动云计算(MCC)是一项快速发展的技术。由于使用移动设备而导致的数据隐私和安全是一个主要关注的方面。MCC可以为任何普通智能手机提供基础设施、计算能力、软件和平台服务。MCC的安全性涉及网络安全、web应用程序安全、数据访问、身份验证、授权、数据机密性和数据泄露等问题。移动设备没有足够的存储空间和CPU速度,因此这些设备中的数据存储容量较小。为了实现安全的MCC环境,必须对安全威胁进行相应的研究和分析。我们提出了一种算法来增强移动云的安全性,保证数据的完整性和保密性。该机制使用AES和RSA提供更好的安全性。我们还讨论了MCC环境中的安全威胁,并针对这些威胁提出了解决方案。
{"title":"Data Security in Mobile Cloud Computing","authors":"Rashmi P. Sarode, S. Bhalla","doi":"10.2139/ssrn.3352362","DOIUrl":"https://doi.org/10.2139/ssrn.3352362","url":null,"abstract":"Mobile Cloud Computing (MCC) is a rapid growing technology these days as number of mobile users are increasing day by day. Data privacy and security due to the use of mobile devices is an aspect of major concern. MCC can offer infrastructure, computational power, software and platform services to any ordinary smartphone. There are several issues regarding the security of MCC such as network security, web application security, data access, authentication, authorization, data confidentiality, and data breach. Mobile devices do not have enough storage and CPU speed so data storage capacity in these devices is less. To achieve a secure MCC environment, security threats have to be studied and analyzed accordingly. We propose an algorithm to enhance the security of the mobile cloud which will ensure data integrity and confidentiality. This mechanism uses AES and RSA to provide better security. We also discuss the security threats in MCC environments and propose solutions for these.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121652664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
[H]ERC The Human Protocol: A MultiLayered Interoperable Supply Chain Management Software With Decentralized, Incentivized, Gamified Internal Controls [H]李建平。基于供应链管理的企业内部控制机制研究
Pub Date : 2018-10-29 DOI: 10.2139/ssrn.3442334
Hercules Core Team
Hercules Supply Chain Blockchain Protocol discussed at length by the Hercules Core team. This academic format was edited by Mike McRoberts Founder of McS LLC and reviewed by Lyle Paczkowski Senior Technology Strategist at Sprint Global.
Hercules供应链区块链协议由Hercules核心团队详细讨论。这一学术格式由McS LLC的创始人迈克·麦克罗伯茨编辑,并由Sprint Global的高级技术策略师莱尔·帕兹科夫斯基审阅。
{"title":"[H]ERC The Human Protocol: A MultiLayered Interoperable Supply Chain Management Software With Decentralized, Incentivized, Gamified Internal Controls","authors":"Hercules Core Team","doi":"10.2139/ssrn.3442334","DOIUrl":"https://doi.org/10.2139/ssrn.3442334","url":null,"abstract":"Hercules Supply Chain Blockchain Protocol discussed at length by the Hercules Core team. This academic format was edited by Mike McRoberts Founder of McS LLC and reviewed by Lyle Paczkowski Senior Technology Strategist at Sprint Global.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123969511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
CompSciRN: Other Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1