Singh et al., 2025 - Google Patents
Blockchain-Enabled Zero Trust Framework for Securing FinTech Ecosystems Against Insider Threats and Cyber AttacksSingh et al., 2025
View PDF- Document ID
- 6926254487001532187
- Author
- Singh A
- Pareek V
- Sharma A
- Publication year
- Publication venue
- arXiv preprint arXiv:2507.19976
External Links
Snippet
Fintech provides technological services to increase operational efficiency in financial institutions, but traditional perimeter-based defense mechanisms are insufficient against evolving cyber threats like insider attacks, malware intrusions, and Advanced Persistent …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Borky et al. | Protecting information with cybersecurity | |
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
Omotunde et al. | A comprehensive review of security measures in database systems: Assessing authentication, access control, and beyond | |
Kaul | Blockchain-Powered Cyber-Resilient Microservices: AI-Driven Intrusion Prevention with Zero-Trust Policy Enforcement | |
US20170331849A1 (en) | System for resource-centric threat modeling and identifying controls for securing technology resources | |
Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
Kholidy et al. | Secure the 5G and beyond networks with zero trust and access control systems for cloud native architectures | |
Ofili et al. | Edge Computing, 5G, and Cloud Security Convergence: Strengthening USA’s Critical Infrastructure Resilience | |
Hayat et al. | Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities | |
Akbarfam et al. | Dlacb: Deep learning based access control using blockchain | |
Pattnaik et al. | Security paradigms in cloud computing | |
Malomo et al. | A survey on recent advances in cloud computing security | |
Akello et al. | A literature survey of security issues in cloud, fog, and edge IT infrastructure | |
Aljohani | Zero-trust architecture: Implementing and evaluating security measures in modern enterprise networks | |
Tan et al. | Post-quantum adversarial modeling: A user’s perspective | |
Chaudhari et al. | A review on cloud security issues and solutions | |
Mampilly et al. | Blockchain in Cybersecurity | |
Singh et al. | Blockchain-Enabled Zero Trust Framework for Securing FinTech Ecosystems Against Insider Threats and Cyber Attacks | |
Jeyalakshmi et al. | Threat landscape and common security challenges in cloud environments | |
Shyam et al. | Achieving Cloud Security Solutions through Machine and Non-Machine Learning Techniques: A Survey. | |
Gunuganti | Identity Based-Zero Trust | |
Goyal et al. | Cloud Computing and Security | |
Mandru | Zero Knowledge Proof Techniques in PAM Authentication | |
Akpan et al. | Digital Asset and PII Protection Using Blockchain Technology’ | |
Trad | Entity Transformation Projects: Security Management Concept (SMC) |