Scaling Blockchains Without Giving up Decentralization and Security.
Gianmaria Del MonteDiego PenninoMaurizio PizzoniaPublished in: CoRR (2020)
Keyphrases
- information security
- security level
- intrusion detection
- security systems
- security issues
- information assurance
- network security
- security requirements
- statistical databases
- security model
- security mechanisms
- functional requirements
- risk assessment
- security policies
- access control
- database
- computer systems
- case study
- role based access control
- neural network
- security properties
- high security
- data sets