The impacts of artificial intelligence techniques in augmentation of cybersecurity: a comprehensive review

B Naik, A Mehta, H Yagnik, M Shah - Complex & Intelligent Systems, 2022 - Springer
Given the prevailing state of cybersecurity, it is reasonable to understand why cybersecurity
experts are seriously considering artificial intelligence as a potential field that can aid …

Cyberbiosecurity challenges of pathogen genome databases

BA Vinatzer, LS Heath, HMJ Almohri… - … in bioengineering and …, 2019 - frontiersin.org
Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA
fingerprinting methods, and single gene methods to methods relying on whole genomes …

Digital asset management with distributed permission over blockchain and attribute-based access control

Y Zhu, Y Qin, Z Zhou, X Song, G Liu… - … on services computing …, 2018 - ieeexplore.ieee.org
Digital asset management (DAM) has increasing benefits in booming global Internet
economy, but it is still a great challenge for providing an effective way to manage, store …

[HTML][HTML] AccessChain: An access control framework to protect data access in blockchain enabled supply chain

A Sarfaraz, RK Chakrabortty, DL Essam - Future Generation Computer …, 2023 - Elsevier
In recent years, supply chains have evolved into huge ecosystems, demanding trust,
provenance, and data privacy. Since blockchain technology (BCT) allows for the …

TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization

Y Zhu, Y Qin, G Gan, Y Shuai… - 2018 IEEE 42nd annual …, 2018 - ieeexplore.ieee.org
In this paper we focus on a new generation of secure resource sharing platform in a
decentralized blockchain environment with flexible and diverse permission management, as …

Token-based access control

G Gan, E Chen, Z Zhou, Y Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
Traditional centralized access control has some shortcomings in robustness, trustworthiness
and circulation. Blockchains have the advantages of fault tolerance and trust. Smart …

Distributed consent protecting data across systems and services

J Simons - US Patent 10,749,676, 2020 - Google Patents
Non-limiting examples of the present disclosure relate to generation and implementation of
a new security protocol that is used to secure common data access transactions across …

Epics: A framework for enforcing security policies in composite web services

R Ranchal, B Bhargava, P Angin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With advances in cloud computing and the emergence of service marketplaces, the
popularity of composite services marks a paradigm shift from single-domain monolithic …

Network access control based on distributed ledger

P Mahanta, B Kaur - US Patent 10,868,673, 2020 - Google Patents
BACKGROUND 10 (VM) 112, with multiple such VMs 112 operating on a single hardware
computing system. In addition, the applications of Cloud computing systems provide users …

Scalable blockchain based smart contract execution

Z Gao, L Xu, L Chen, N Shah, Y Lu… - 2017 IEEE 23Rd …, 2017 - ieeexplore.ieee.org
Blockchain, or distributed ledger, provides a way to build various decentralized systems
without relying on any single trusted party. This is especially attractive for smart contracts …