{"title":"区块链网络上的日志文件认证与存储","authors":"David Janos Feher, Barnabás Sándor","doi":"10.1109/SISY.2018.8524848","DOIUrl":null,"url":null,"abstract":"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"000243-000248"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Log File Authentication and Storage on Blockchain Network\",\"authors\":\"David Janos Feher, Barnabás Sándor\",\"doi\":\"10.1109/SISY.2018.8524848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.\",\"PeriodicalId\":6647,\"journal\":{\"name\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"volume\":\"1 1\",\"pages\":\"000243-000248\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SISY.2018.8524848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISY.2018.8524848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Log File Authentication and Storage on Blockchain Network
Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.