Rodriguez et al., 2018 - Google Patents
Dynamic Security and Privacy Seal Model AnalysisRodriguez et al., 2018
View PDF- Document ID
- 7450174168462792555
- Author
- Rodriguez A
- AS B
- Menon M
- Ziegler S
- AS A
- DG E
- Bianchi S
- De Marini V
- Publication year
- Publication venue
- Cited on
External Links
Snippet
This document is prepared in the context of ANASTACIA Work Package 5–Dynamic Security and Privacy Seal, which is focused on the research and development of the dynamic security and privacy seal, combining security and privacy standards and real-time …
- 238000004458 analytical method 0 title description 28
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alouffi et al. | A systematic literature review on cloud computing security: threats and mitigation strategies | |
Brotsis et al. | On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance | |
Salim | Cyber safety: A systems thinking and systems theory approach to managing cyber security risks | |
Kakei et al. | Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric | |
Aslam et al. | FoNAC-an automated fog node audit and certification scheme | |
Liang et al. | Towards a reliable and accountable cyber supply chain in energy delivery system using blockchain | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Mansoor et al. | A review of blockchain approaches for kyc | |
Balamurugan et al. | A Survey on Privacy Preserving and Trust Building Techniques of Blockchain-Based Systems | |
CA3166439A1 (en) | Blockchain cybersecurity solutions | |
Al Ketbi et al. | Establishing a security control framework for blockchain technology | |
Akbarfam et al. | Deep Learning meets Blockchain for Automated and Secure Access Control | |
Rodriguez et al. | Dynamic Security and Privacy Seal Model Analysis | |
Hayagreevan et al. | Security of and by Generative AI platforms | |
Khan et al. | Software security: Concepts & practices | |
Stampernas | Blockchain technologies and smart contracts in the context of the Internet of Things | |
Sun et al. | On the Development of a Protection Profile Module for Encryption Key Management Components | |
Ishgair et al. | SoK: A Defense-Oriented Evaluation of Software Supply Chain Security | |
Reichert et al. | Software supply chain security: a systematic literature review | |
Williams et al. | Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1 | |
Bolourforoush et al. | Security Challenges of Digital Transformation in Smart Cities: Case of Banking Sector | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Mardjan et al. | Open Reference Architecture for Security and Privacy Documentation | |
Mnyawi | Application of blockchain technology in strengthening health information system security: a case study of Mount Meru referral hospital | |
Ndri | The Applications of Blockchain To Cybersecurity |