Scrybe: A second-generation blockchain technology with lightweight mining for secure provenance and related applications

C Worley, L Yu, R Brooks, J Oakley, A Skjellum… - … Cybersecurity, Trust and …, 2020 - Springer
The recent popularity of cryptocurrencies has highlighted the versatility and applications of a
decentralized, public blockchain. Blockchain provides a data structure that can guarantee …

Scrybe: a blockchain ledger for clinical trials

RR Brooks, KC Wang, L Yu, J Oakley… - IEEE Blockchain in …, 2018 - blockchain.ieee.org
The recent popularity of cryptocurrencies has highlighted the versatility and applications of a
decentralized, public blockchain. Blockchains provide a data structure that can guarantee …

[PDF][PDF] Transparent Cloud Privacy: Data Provenance Expression in Blockchain.

G Hogan, M Helfert - CLOSER, 2019 - academia.edu
The development of Cloud processing and 'Big Data'have raised many concerns over the
use to which data is being put. These concerns have created new demands for …

Security analysis of a blockchain network

NB Bhat - 2020 - search.proquest.com
Blockchains have gained popularity due to their versatility and wide range of application.
Blockchains are a decentralized data structure guaranteeing integrity and non-repudiation of …

Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion

J Oakley, C Worley, L Yu, RR Brooks, İ Özçelik… - Digital threats: research …, 2023 - dl.acm.org
Clinical trials are a multi-billion-dollar industry. One of the biggest challenges facing the
clinical trial research community is satisfying Part 11 of Title 21 of the Code of Federal …

Maintaining Anonymity and Trust: Applications of Innovative Data Structures

O Hambolu - 2018 - search.proquest.com
With the rapid increase of data breaches, preserving user privacy and ensuring security are
essential properties of distributed systems. The work done in this dissertation provides …

[PDF][PDF] Estimation of security of objects of informatization on the basis of mathematical simulation as an alternative to certification testing

AM Sychov, NA Sukhorukova, DA Kholod - CEUR Workshop …, 2017 - ceur-ws.org
Constant perfection of methods of unauthorized access to information, as well as significant
damage to this kind of action resulted in a focused and systematic improvement of …

Developing a Data Provenance System with Version Control Using Blockchain

U Mukhopadhyay - 2021 - search.proquest.com
The origin and integrity of data is a concept that is of great importance. If the history of the
data is not preserved, there is no way to ascertain data integrity and whether it was modified; …

Traffic Analysis Resistant Infrastructure

J Oakley - 2020 - search.proquest.com
Network traffic analysis is using metadata to infer information from traffic flows. Network
traffic flows are the tuple of source IP, source port, destination IP, and destination port …

Design of New Access Control Approach for Provenance Based on Digital Consortium Decision Making via Secret Sharing

KP Kumar, CR Chowdary - Journal of Computational and …, 2020 - ingentaconnect.com
Access control is one of the important element in providing confidentiality to the secured
data. Access specifiers helps us understand degree of rights given to the users in utilizing …