Tytuł artykułu
Treść / Zawartość
Pełne teksty:
Identyfikatory
DOI
Warianty tytułu
Ochrona danych wrażliwych z wykorzystaniem blockchai
Języki publikacji
Abstrakty
The presented document is a scientific and technical proposal of the possibility of using blockchain in the process of protection of personal data on the Internet and inside IT systems. The key aspects of this proposal along with most pros and cons are discussed within this article. A brief discussion of prototype of proposed solution is also included.
Prezentowany artykuł podejmuje dyskusję nad naukowymi i technicznymi możliwościami wykorzystania sieci blockchain w procesie ochrony danych osobowych. W artykule przedstawiono kluczowe aspekty proponowanego pomysłu, jak również większość zalet i wad. Zawarto również krótkie omówienie możliwego prototypu proponowanego rozwiązania.
Słowa kluczowe
Rocznik
Tom
Strony
89--100
Opis fizyczny
Bibliogr. 17 poz.
Twórcy
autor
- student, Katowice School of Technology
autor
- Katowice School of Technology
autor
- Katowice School of Technology
Bibliografia
- [1] Stevens, G. (10 April 2012). “Data Security Breach Notification Laws”. Congressional Research Service 7-5700, R42475. Page 10. Available at: www.sgp.fas.org/crs/misc/R42475.pdf. Retrieved 8 June 2022.
- [2] McCallister E., Grance T., Scarfone K.: “Guide to Protecting the Confidentiality of Personally Identifiable Infor-mation (PII)”. National Institute of Standards and Technology, NIST Special Publication 800-122. Page B-1. Avail-able at: www.nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-122.pdf. Retrieved 8 June 2022.
- [3] “Personal Data”. General Data Protection Regulation (GDPR). Available at www.gdpr-info.eu/issues/personal-data/. Retrieved 21 May 2022.
- [4] Morris, David Z. (15 May 2016). “Leaderless, Blockchain-Based Venture Capital Fund Raises $100 Million, And Counting”. Fortune. Available at www.fortune.com/2016/05/15/leaderless-blockchain-vc-fund/. Retrieved 23 May 2022.
- [5] Wikipedia contributors. (7 June 2022). “Blockchain”. In Wikipedia, The Free Encyclopedia. Available at www.en.wikipedia.org/w/index.php?title=Blockchain&oldid=1091997775. Retrieved 12 June 2022.
- [6] Elrom, Elad (2019). The Blockchain Developer., Apress, www.doi.org/10.1007/978-1-4842-4847-8
- [7] Fries, Martin; P. Paal, Boris (2019). Smart Contracts (in German). Mohr Siebeck. ISBN 978-3-16-156911-1
- [8] Kuner, Christopher, Bygrave, Lee A., & Docksey, Christopher (2020). Background and Evolution of the EU General Data Protection Regulation (GDPR). The EU General Data Protection Regulation (GDPR), Oxford University Press, <www.doi.org/10.1093/oso/9780198826491.003.0001>
- [9] Kornblum, Jesse D. (2009). Implementing BitLocker Drive Encryption for forensic analysis. Digital Investigation, 5(3), 75-84, ISSN 1742-2876, Elsevier BV, <www.doi.org/10.1016/j.diin.2009.01.001>
- [10] Martin, Keith M. (2017). Public-Key Management. Oxford Scholarship Online, Oxford University Press, <www.doi.org/10.1093/oso/9780198788003.003.0011>
- [11] Besancon, Leo, Silva, Catarina Ferreira Da, Ghodous, Parisa, & Gelas, Jean-Patrick (2022). A Blockchain Ontology for DApps Development. IEEE Access, 10, 49905-49933, ISSN 2169-3536, Institute of Electrical and Electronics Engineers (IEEE), <www.doi.org/10.1109/access.2022.3173313>
- [12] Metcalfe, William (2020). Ethereum, Smart Contracts, DApps. Economics, Law, and Institutions in Asia Pacific, 77-93, ISSN 2199-8620, Springer Singapore, <www.doi.org/10.1007/978-981-15-3376-1_5>
- [13] Gallersdörfer, Ulrich, Ebel, Jonas, & Matthes, Florian (2022). Augmenting MetaMask to Support TLS-endorsed Smart Contracts. Lecture Notes in Computer Science, 227-244, ISSN 0302-9743, Springer International Publishing, <www.doi.org/10.1007/978-3-030-93944-1_15>
- [14] Lee, Wei-Meng (2019). Using the MetaMask Chrome Extension. Beginning Ethereum Smart Contracts Program-ming, 93-126, Apress, <www.doi.org/10.1007/978-1-4842-5086-0_5>
- [15] Kazerani, Ali, Rosati, Domenic, & Lesser, Brian (2017). Determining the usability of bitcoin for beginners using change tip and coinbase. Proceedings of the 35th ACM International Conference on the Design of Communication, ACM, <www.doi.org/10.1145/3121113.3121125>
- [16] Abts, Dietmar (2022). RESTful Web Services. Masterkurs Client/Server-Programmierung mit Java, 331-440, Springer Fachmedien Wiesbaden, <www.doi.org/10.1007/978-3-658-37200-2_12>
- [17] Pimparkhede, Kunal (2021). Client side and Server Side Load Balancing. International Journal for Research in Ap-plied Science and Engineering Technology, 9(11), 30-31, ISSN 2321-9653, International Journal for Research in Applied Science and Engineering Technology (IJRASET), <www.doi.org/10.22214/ijraset.2021.38748>
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2022-2023).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-620fa94d-7eaf-4b2e-9214-9723a5566a51