On the Security of Permissioned Blockchain Solutions for IoT Applications.
Sotirios BrotsisNicholas KolokotronisKonstantinos LimniotisStavros ShiaelesPublished in: CoRR (2021)
Keyphrases
- security problems
- access control
- management system
- intrusion detection
- information security
- network security
- key management
- data sets
- security systems
- statistical databases
- security issues
- security requirements
- buffer overflow
- information assurance
- security patterns
- data security
- security mechanisms
- benchmark problems
- solution space
- data management
- data analysis
- optimal solution