Skip to main content

Showing 1–3 of 3 results for author: Ueyama, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.16404  [pdf, other

    cs.CR cs.ET

    A Survey of Blockchain-Based Privacy Applications: An Analysis of Consent Management and Self-Sovereign Identity Approaches

    Authors: Rodrigo Dutra Garcia, Gowri Ramachandran, Kealan Dunnett, Raja Jurdak, Caetano Ranieri, Bhaskar Krishnamachari, Jo Ueyama

    Abstract: Modern distributed applications in healthcare, supply chain, and the Internet of Things handle a large amount of data in a diverse application setting with multiple stakeholders. Such applications leverage advanced artificial intelligence (AI) and machine learning algorithms to automate business processes. The proliferation of modern AI technologies increases the data demand. However, real-world n… ▽ More

    Submitted 25 November, 2024; originally announced November 2024.

  2. arXiv:2112.13956  [pdf, other

    cs.CR

    A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription

    Authors: Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Raja Jurdak, Jo Ueyama

    Abstract: Real-world applications in healthcare and supply chain domains produce, exchange, and share data in a multi-stakeholder environment. Data owners want to control their data and privacy in such settings. On the other hand, data consumers demand methods to understand when, how, and who produced the data. These requirements necessitate data governance frameworks that guarantee data provenance, privacy… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

  3. arXiv:1906.09546  [pdf, ps, other

    cs.NI cs.CR

    Experimental Security Analysis of Controller Software in SDNs: A Review

    Authors: Tiago V. Ortiz, Bruno Kimura, Jó Ueyama, Valério Rosset

    Abstract: The software defined networking paradigm relies on the programmability of the network to automatically perform management and reconfiguration tasks. The result of adopting this programmability feature is twofold: first by designing new solutions and, second, by concurrently making room for the exploitation of new security threats. As a malfunction in the controller software may lead to a collapse… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.