Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem Konferenzband

Abstract

Companies are eager to invest in the emerging blockchain technology, but often fail to integrate this technology into real-world business applications that go beyond cryptocurrencies or pure demonstrators. The reason often lies in specific requirements related to data security and privacy. Current blockchain solutions are not able to meet these requirements, preventing a broad adoption of blockchain technology in business applications. To tackle this problem, we introduce UBI: A Universal Blockchain Integrator. UBI acts as a middleware between a company's legacy IT infrastructure and off-The-shelf blockchain solutions. UBI enriches the functionality of these solutions so that they meet specific security and privacy requirements. Its successful implementation shows the feasibility of the proposed solution. First evaluation results demonstrate its potential for real-world business applications.

Originalspracheenglisch
TitelICBC 2019 - IEEE International Conference on Blockchain and Cryptocurrency
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers
Seiten394-402
Seitenumfang9
ISBN (elektronisch)9781728113289
DOIs
PublikationsstatusVeröffentlicht - 1 Mai 2019
Veranstaltung1st IEEE International Conference on Blockchain and Cryptocurrency - Seoul, Südkorea
Dauer: 14 Mai 201917 Mai 2019

Konferenz

Konferenz1st IEEE International Conference on Blockchain and Cryptocurrency
KurztitelICBC 2019
LandSüdkorea
OrtSeoul
Zeitraum14/05/1917/05/19

ASJC Scopus subject areas

  • !!Business, Management and Accounting (miscellaneous)
  • !!Management of Technology and Innovation
  • !!Computer Networks and Communications
  • !!Information Systems and Management
  • !!Safety, Risk, Reliability and Quality

Fingerprint

Untersuchen Sie die Forschungsthemen von „Unleashing the Full Potential of Blockchain Technology for Security-Sensitive Business Applications“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren