Privacy Requirements in Cybersecurity Applications of Blockchain
Blockchain has promise as an approach to developing systems for a number of applications within cybersecurity. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Some of the key advantages of Blockchain for cybersecurity appl...
Main Authors: | Axon, L, Goldsmith, M, Creese, S |
---|---|
Format: | Book section |
Published: |
Elsevier
2018
|
Similar Items
-
PB-PKI: a privacy-aware blockchain-based PKI
by: Axon, L, et al.
Published: (2016) -
Practitioners’ views on cybersecurity control adoption and effectiveness
by: Axon, L, et al.
Published: (2021) -
At the Crossroads: Cybersecurity and Psychology
by: Nurse, J, et al.
Published: (2013) -
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements.
by: Agrafiotis, I, et al.
Published: (2010) -
Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements
by: Agrafiotis, I, et al.
Published: (2011)