2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031109
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Security Bounty Management on Blockchain and IPFS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Figure 1 shows the knowledge engineering-based proposed system. The proposed knowledge system consists of four components: users, domain experts, knowledge engineers, inference agents, or intelligent agents [26][27][28]. Knowledge engineering phases are considered to design and deploy the proposed blockchain-based distributed application (DApp) for official health documents generation and maintenance.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Figure 1 shows the knowledge engineering-based proposed system. The proposed knowledge system consists of four components: users, domain experts, knowledge engineers, inference agents, or intelligent agents [26][27][28]. Knowledge engineering phases are considered to design and deploy the proposed blockchain-based distributed application (DApp) for official health documents generation and maintenance.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…IPFS was further used to enable a variety of other applications and use cases, which we cannot discuss in detail for the sake of brevity. Instead, we provide a brief list of other use cases/studies (in no particular order) which have built on top of IPFS: alternative storage schemes for IPFS [8], verifiable voting systems [44], collaborative document editing with version control [38], land record management [36], digital right management [1,37,46], content retrieval marketplaces [3], training of federated learning models [31], exchange of decentralised transfer learning models [54], software integrity and delivery frameworks [48], bug bounty system [19], biological data migration [58], among others.…”
Section: Research Studiesmentioning
confidence: 99%
“…An independent hash value is generated by the file content to identify the file, and only one file with the same content exists in IPFS to save storage space. IPFS is widely used in electronic medical records, 48,49 IoT architecture, 50 data backup, 51 and reward management 52 . Here, we store the training data and model parameters of the deep learning model in IPFS.…”
Section: Distributed Deep Learning Based On Blockchainmentioning
confidence: 99%
“…IPFS is widely used in electronic medical records, 48,49 IoT architecture, 50 data backup, 51 and reward management. 52 Here, we store the training data and model parameters of the deep learning model in IPFS. The data are scattered in IPFS, and distributed storage is used to generate the corresponding IPFS hash.…”
Section: Framework Designmentioning
confidence: 99%