咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Securing Stock Transactions Us... 收藏

Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)

Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)

作     者:Kpinna Tiekoura Coulibaly Abdou Maïga Jerome Diako Moustapha Diaby Kpinna Tiekoura Coulibaly;Abdou Maïga;Jerome Diako;Moustapha Diaby

作者机构:LASTIC African Higher School of Information and Communication Technologies (ESATIC) Abidjan Ivory Coast UFRMI Felix Houphouet Boigny University (UFHB) Abidjan Ivory Coast 

出 版 物:《Open Journal of Applied Sciences》 (应用科学(英文))

年 卷 期:2023年第13卷第11期

页      面:2080-2093页

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Stock Market Transactions Action Smart Contracts Architecture Security Vulnerability Web Applications Blockchain and Finance Cryptography Authentication Data Integrity Transaction Confidentiality Trust Economy 

摘      要:This paper deals with the security of stock market transactions within financial markets, particularly that of the West African Economic and Monetary Union (UEMOA). The confidentiality and integrity of sensitive data in the stock market being crucial, the implementation of robust systems which guarantee trust between the different actors is essential. We therefore proposed, after analyzing the limits of several security approaches in the literature, an architecture based on blockchain technology making it possible to both identify and reduce the vulnerabilities linked to the design, implementation work or the use of web applications used for transactions. Our proposal makes it possible, thanks to two-factor authentication via the Blockchain, to strengthen the security of investors’ accounts and the automated recording of transactions in the Blockchain while guaranteeing the integrity of stock market operations. It also provides an application vulnerability report. To validate our approach, we compared our results to those of three other security tools, at the level of different metrics. Our approach achieved the best performance in each case.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分