Nov. 23, 2023, 2:19 a.m. | Md Jobair Hossain Faruk, Bilash Saha, Jim Basney

cs.CR updates on arXiv.org arxiv.org

Managing and exchanging sensitive information securely is a paramount concern
for the scientific and cybersecurity community. The increasing reliance on
computing workflows and digital data transactions requires ensuring that
sensitive information is protected from unauthorized access, tampering, or
misuse. This research paper presents a comparative analysis of three novel
approaches for authenticating and securing access to scientific data:
SciTokens, Verifiable Credentials, and Smart Contracts. The aim of this study
is to investigate the strengths and weaknesses of each approach from …

access analysis authentication community computing contracts credentials cybersecurity cybersecurity community data digital digital data information novel paramount scientific secure access sensitive sensitive information smart smart contracts tampering transactions unauthorized access verifiable credentials workflows

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States