Competent Methods to Shield the SCM from New Age Blockchain Attacks (Record no. 19581)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230703144849.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 230703b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 21290 |
| Author | Ratnakanth, B |
| 245 ## - TITLE STATEMENT | |
| Title | Competent Methods to Shield the SCM from New Age Blockchain Attacks |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol, 9(2),Jul-Dec |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Tamil Nadu |
| Name of publisher, distributor, etc. | i-manager's |
| Year | 2022 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 21-37p |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | interior technology of the blockchain is the decentralized ledger, which can be used to record and secure transaction data across many parties in a blockchain. Cryptocurrencies such as Bitcoin, Ethereum, and other coins can use the blockchain to perform transactions between infinity and unknown parties without the need for an intermediary. A blockchain-based supply chain can support participants in recording price, location, cost, certification, quality, and other significant information. As a characteristic of blockchain, the information available within the blockchain can provide traceability of the material supply chain, reduce losses from the fake and grey markets, improve visibility and agreement over outsourced contract manufacturing, and effectively enhance an organization's position as a leader in responsible manufacturing. This paper proposed a Supply Chain Management (SCM) framework and tested it against various blockchain-based new age attacks, like peer-to-peer network-based attacks and consensus and ledger-based attacks, to analyze the impact of SCM. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4622 |
| Topical term or geographic name entry element | Computer Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 21292 |
| Co-Author | Nad, Bhaludra R |
| 773 0# - HOST ITEM ENTRY | |
| Title | i-manager's journal on cloud computing (JCC) |
| International Standard Serial Number | 2349-6835 |
| Place, publisher, and date of publication | Nagercoil i-manager Publication |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://imanagerpublications.com/article/18950/ |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 03/07/2023 | 2023-0953 | 03/07/2023 | 03/07/2023 | Articles Abstract Database |