当前位置: X-MOL 学术IEEE Softw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Blockchain Technologies in Practice
IEEE Software ( IF 3.3 ) Pub Date : 2020-06-19 , DOI: 10.1109/ms.2020.2986253
Christof Ebert 1 , Panos Louridas 2 , Tiago M. Fernandez-Carames 3 , Paula Fraga-Lamas 3
Affiliation  

Suppose that you are developing a critical application that handles sensitive data. Access to the data should be limited, and data should be changed only under specific circumstances. Moreover, at any point in time you may be asked to provide an audit trail for the entire history of any piece of data, for example, the entire history of changes for a specific record. How will you make sure that you can provide the history as it happened, certain that it has not been tampered with in any way?

中文翻译:


区块链技术的实践



假设您正在开发一个处理敏感数据的关键应用程序。对数据的访问应受到限制,并且仅在特定情况下才应更改数据。此外,在任何时间点,您都可能被要求提供任何数据的整个历史记录的审计跟踪,例如特定记录的整个更改历史记录。您如何确保能够提供发生时的历史记录,并确保它没有被以任何方式篡改?
更新日期:2020-06-19
down
wechat
bug