Abdul Ghafoor Abbasi
YOU?
Author Swipe
View article: Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing Open
Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches,…
View article: Towards Empowering Stakeholders through Decentralized Trust and Secure Livestock Data Sharing
Towards Empowering Stakeholders through Decentralized Trust and Secure Livestock Data Sharing Open
Cybersecurity presents a key challenge in data-sharing platforms involving multiple stakeholders, particularly in complex, decentralized systems such as livestock supply chain networks. Such systems require novel approaches, robust securit…
View article: A Holistic and Circular Approach for Managing End-of-Service Wind Turbine Blades
A Holistic and Circular Approach for Managing End-of-Service Wind Turbine Blades Open
This paper aims to define the challenges and requirements necessary for the holistic management of wind turbine blades at the end of their service (EoS). Conducted within the Swedish research project Circublade, this study focuses on Swede…
View article: Towards a verifiable and secure data sharing platform for livestock supply chain
Towards a verifiable and secure data sharing platform for livestock supply chain Open
The digitization of a supply chain involves satisfying several functional and non-functional context specific requirements. The work presented herein builds on efforts to elicit trust and profit requirements from actors in the Swedish live…
View article: Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS
Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS Open
Evolving traceability requirements increasingly challenge manufacturing supply chain actors to collect tamperproof and auditable evidence about what inputs they process, in what way these inputs are used, and what the resulting process out…
View article: An Architecture for Source Code Protection
An Architecture for Source Code Protection Open
Due to great competition in software industry the source code and binaries have to be protected.Source code available in plain form could be easily stolen and launched on any computer using IDE.We have given an architecture that will be us…