Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security 2018
DOI: 10.5220/0006688601050113
|View full text |Cite
|
Sign up to set email alerts
|

A Decision Framework for Blockchain Platforms for IoT and Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(33 citation statements)
references
References 7 publications
0
33
0
Order By: Relevance
“…Moreover, their proposed method assists the decision-makers with the configuration of selected blockchain platforms. Pahl et al [20] introduce a BDT-based framework to guide decision-makers on whether to use blockchain technology or not. Furthermore, they categorize blockchain platforms into three categories (public permissionless, public permissioned, and private) and compare them against each other based on a set of decision criteria.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, their proposed method assists the decision-makers with the configuration of selected blockchain platforms. Pahl et al [20] introduce a BDT-based framework to guide decision-makers on whether to use blockchain technology or not. Furthermore, they categorize blockchain platforms into three categories (public permissionless, public permissioned, and private) and compare them against each other based on a set of decision criteria.…”
Section: Related Workmentioning
confidence: 99%
“…Our application of blockchain techniques in localized clusters of edge devices is novel, addressing security (origin, identity, non‐repudiation) in such autonomous distributed clusters . Our blockchain‐based pattern realizes the identity, provenance and contract processing requirements by using permissioned blockchains .…”
Section: Background and Related Workmentioning
confidence: 99%
“…Our application of blockchain techniques in localized clusters of edge devices is novel, addressing security (origin, identity, non-repudiation) in such autonomous distributed clusters. 11 Our blockchain-based pattern realizes the identity, provenance and contract processing requirements by using permissioned blockchains. 12 The semantic pattern presented here aims at formalizing a structure-oriented architecture pattern through an ontology as the formal foundation of the key constructs that allows to prove security properties of the blockchain solution.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This, in turn, enables the digital world to directly affect our physical space through sensing and automation. While this integration presents several opportunities for improved services, it also exposes us to threats and attacks that prevail in the digital space [6]. By way of an example is Ambient Assisted Living (AAL) environment -a technical system built to support the elderly and infirmed to improve their safety and enhance day-to-day living [7].…”
Section: Introductionmentioning
confidence: 99%