scholarly journals RootLogChain: Registering Log-Events in a Blockchain for Audit Issues from the Creation of the Root

Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7669
Author(s):  
Juan Carlos López-Pimentel ◽  
Luis Alberto Morales-Rosales ◽  
Raúl Monroy

Logging system activities are required to provide credibility and confidence in the systems used by an organization. Logs in computer systems must be secured from the root user so that they are true and fair. This paper introduces RootLogChain, a blockchain-based audit mechanism that is built upon a security protocol to create both a root user in a blockchain network and the first log; from there, all root events are stored as logs within a standard blockchain mechanism. RootLogChain provides security constructs so as to be deployed in a distributed context over a hostile environment, such as the internet. We have developed a prototype based on a microservice architecture, validating it by executing different stress proofs in two scenarios: one with compliant agents and the other without. In such scenarios, several compliant and non-compliant agents try to become a root and register the events within the blockchain. Non-compliant agents simulate eavesdropper entities that do not follow the rules of the protocol. Our experiments show that the mechanism guarantees the creation of one and only one root user, integrity, and authenticity of the transactions; it also stores all events generated by the root within a blockchain. In addition, for audit issues, the traceability of the transaction logs can be consulted by the root.

Author(s):  
Nina Lundberg ◽  
Ole Hanseth

This chapter explores some of the consequences of strategies used to develop electronic standards in healthcare, especially the consequences of electronic standards for communication work. The two standardization strategies explored are the prototype strategy used to develop intranet applications and the specification strategy used to develop Picture Archiving and Communication Systems (PACS) in healthcare. It was found that computer systems based on different electronic standards intervene in work in different ways, and that they do not always intervene in the ways they were initially intended. For example, the PACS based on the DICOM standard have primarily attained a local role, although its initial aim was to support universal image communication within healthcare. On the other hand the intranet application based on the Internet standards primarily not designed for this particular purpose has come to support communication of images and reports within the heterogeneous hospital network.


Author(s):  
Abhijit Roy

With the advent of the Internet a little over a decade ago, technology has enabled communities to move beyond the physical face-to-face contacts to the virtual realm of the World Wide Web. With the advent of highways in the 1950s and 1960s, communities were created in suburbia. The Internet, on the other hand, over the last fifteen years, has enabled the creation of a myriad of virtual communities that have limitless boundaries around the entire globe.


2021 ◽  
Author(s):  
Cleyton M. O. Rodrigues ◽  
Bruno J. T. Fernandes ◽  
Leandro H. S. Silva ◽  
David J. Barrientos ◽  
Allana L. S. Rocha ◽  
...  

Electronic Legal Proceedings are a worldwide legal phenomena, allowing the use of computerized systems for the creation and monitoring of procedural acts in the most diverse legal bodies. On one hand, it allows greater transparency in the conduct of procedural acts, on the other, it has contributed to the bottleneck of open but unresolved lawsuits each year. Nowadays, Information Retrieval to automate the processing of these procedural objects is at the forefront of computer systems for Law. In this study, we present MISLA2, a system to retrieve orders and preliminaries from judicial labour sentences through ontological models built from previous cases. Instead of tied and difficult-to-maintain domain specification models, we demonstrate how light ontologies, in conjunction with regular expressions for extracting significant portions of the text, can achieve the desired results. In addition, empirical experiments carried out with real labour lawsuits evidence that results are quite promising.


Author(s):  
Hind Mohammed Abdul Jabbar Ali

Connecting to the  electronic information network (internet) became the most characteristic that distinguish this era However , the long hours which young men daily spend on the internet On the other hand ,there are many people who are waiting for the chance to talk and convince them with their views This will lead the young people to be part in the project of the “cyber armies “that involved with states and terrorist organizations  This project has been able  to recruitment hundreds of people every day to work in its rank . It is very difficult to control these websites because we can see the terrorist presence in all its forms in the internet   In addition there are many incubation environments that feed in particular the young people minds                                                                                         Because they are suffering from the lack of social justice Also the unemployment, deprivation , social and political repression So , that terrorist organizations can attract young people through the internet by convincing them to their views and ideas . So these organizations will enable to be more  stronger.


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2018 ◽  
pp. 135-139
Author(s):  
A. N. Mironov ◽  
V. V. Lisitskiy

In the article on set-theoretic level, developed a conceptual model of the system of special types of technical support for difficult organizational-technical system. The purpose of conceptualizing the creation of a system of interrelated and stemming from one of the other views on certain objects, phenomena, processes associated with the system of special types of technical support. In the development of applied concepts and principles of the methodology of system approach. The empirical basis for the development of the conceptual model has served many fixed factors obtained in the warning system and require formalization and theoretical explanation. The novelty of the model lies in the account of the effect of environment directly on the alert system. Therefore, in the conceptual model of the system of special types of technical support included directly in the conceptual model of the system of special types and conceptual model of the environment. Part of the conceptual model of the environment is included in the conceptual model of the enemy of nature and co-systems.


Author(s):  
Vered Noam

In attempting to characterize Second Temple legends of the Hasmoneans, the concluding chapter identifies several distinct genres: fragments from Aramaic chronicles, priestly temple legends, Pharisaic legends, and theodicean legends explaining the fall of the Hasmonean dynasty. The chapter then examines, by generation, how Josephus on the one hand, and the rabbis on the other, reworked these embedded stories. The Josephan treatment aimed to reduce the hostility of the early traditions toward the Hasmoneans by imposing a contrasting accusatory framework that blames the Pharisees and justifies the Hasmonean ruler. The rabbinic treatment of the last three generations exemplifies the processes of rabbinization and the creation of archetypal figures. With respect to the first generation, the deliberate erasure of Judas Maccabeus’s name from the tradition of Nicanor’s defeat indicates that they chose to celebrate the Hasmonean victory but concealed its protagonists, the Maccabees, simply because no way was found to bring them into the rabbinic camp.


Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


Sign in / Sign up

Export Citation Format

Share Document