[go: up one dir, main page]

CHERIF et al., 2024 - Google Patents

CQRS and Blockchain with Zero-Knowledge Proofs for Secure Multi-Agent Decision-Making.

CHERIF et al., 2024

View PDF
Document ID
1544913391167705200
Author
CHERIF A
YOUSSFI M
EN-NAIMANI Z
TADLAOUI A
SOULAMI M
BOUATTANE O
Publication year
Publication venue
International Journal of Advanced Computer Science & Applications

External Links

Snippet

Autonomous decision-making in decentralized multi-agent systems (MAS) poses significant challenges related to security, scalability, and privacy. This paper introduces an innovative architecture that integrates Decentralized Identifiers (DIDs), Zero-Knowledge Proofs (ZKPs) …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Similar Documents

Publication Publication Date Title
Zou et al. Integrated blockchain and cloud computing systems: A systematic survey, solutions, and challenges
Pohrmen et al. Blockchain‐based security aspects in heterogeneous Internet‐of‐Things networks: a survey
Fernández-Caramés et al. A Review on the Use of Blockchain for the Internet of Things
Yan et al. A homomorphic encryption and privacy protection method based on blockchain and edge computing
Battah et al. A trust and reputation system for IoT service interactions
Cui et al. IoT data management and lineage traceability: A blockchain-based solution
Tan et al. Blockchain-Based data security and sharing for Resource-Constrained devices in manufacturing IoT
Spathoulas et al. Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Otta et al. Cloud identity and access management solution with blockchain
CHERIF et al. CQRS and Blockchain with Zero-Knowledge Proofs for Secure Multi-Agent Decision-Making.
Huang et al. A novel zero-trust identity framework for agentic ai: Decentralized authentication and fine-grained access control
Dornala et al. An Enhanced Data Quality Management System in Cloud Computing
Cao et al. A decentralized authentication scheme for smart factory based on blockchain
Dunnett et al. A blockchain-based framework for scalable and trustless delegation of cyber threat intelligence
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
Mnyawi et al. Blockchain-based data storage security architecture for e-health care systems: A case of government of Tanzania Hospital management information system
Cherif et al. Ensuring security and data integrity in Multi Micro-Agent System Middleware with Blockchain Technology
Li Optimized blockchain deployment and application for trusted industrial internet of things
Chen et al. A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Zhang et al. Zkfhed: A Verifiable and Scalable Blockchain-Enhanced Federated Learning System
Nykänen Managing Production Network Security with OPC UA
Feng et al. Efficient Cross-Chain Interoperability: Decentralized Execution and State Sharding Approach
Xia et al. A Scalable and Memory-Efficient Architecture for Blockchain-Based IoT Privacy and Security
Dordevic Data Sovereignty Provision in Cloud-and-Blockchain-Integrated IoT Data Trading,”