Skip to main content

Showing 1–3 of 3 results for author: Gorog, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.03692  [pdf

    cs.CR cs.DC

    Blockchain Synchronous Trust Consensus Model

    Authors: Christopher Gorog, Terrance E. Boult

    Abstract: This work introduces a novel approach for the governance of a blockchain containing social constructs and technical viability for widescale applications for the next generation of distributed ledgers. Functional requirements for this new blockchain distributed ledger (BDL) were garnered from an analysis of the needs for large-scale applications. Applied research was employed as part of this endeav… ▽ More

    Submitted 7 December, 2021; originally announced December 2021.

    Comments: Publication TBD

  2. arXiv:2103.14783  [pdf

    cs.CR

    A Synergistic Approach to Digital Privacy

    Authors: Christopher Gorog

    Abstract: This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems & applications security, organizational & global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies.… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

    Comments: This paper has been produced at the request of the IEEE Future Directions Committee as a response to a call for expertise on evolving privacy empowering technology

  3. arXiv:2008.10705  [pdf, other

    cs.CR

    Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform

    Authors: Shammya Shananda Saha, Christopher Gorog, Adam Moser, Anna Scaglione, Nathan G. Johnson

    Abstract: This applied research paper introduces a novel framework for integrating hardware security and blockchain functionality with grid-edge devices to establish a distributed cyber-security mechanism that verifies the provenance of messages to and from the devices. Expanding the idea of Two Factor Authentication and Hardware Root of Trust, this work describes the development of a Cryptographic Trust Ce… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

    Comments: 2021 North American Power Symposium