Dylan Yaga
YOU?
Author Swipe
View article: A security perspective on the Web3 paradigm
A security perspective on the Web3 paradigm Open
Web3 is a proposed vision for the future of the internet that is restructured to be more user-centric with an emphasis on decentralized data. Users would own and manage their personal data, and systems would be decentralized and distribute…
View article: Understanding stablecoin technology and related security considerations
Understanding stablecoin technology and related security considerations Open
Stablecoins are cryptocurrencies whose price is pegged to that of another asset (typically one with low price volatility). The market for stablecoins has grown tremendously - up to almost $200 billion USD in 2022. These coins are being use…
View article: Understanding Stablecoin Technology and Related Security Considerations
Understanding Stablecoin Technology and Related Security Considerations Open
Stablecoins are cryptocurrencies whose price is pegged to that of another asset (typically one with low price volatility). The market for stablecoins has grown tremendously – up to almost $200 billion USD in 2022. These coins are being use…
View article: Blockchain networks :
Blockchain networks : Open
Blockchain technology has enabled a new software paradigm for managing digital ownership in partial- or zero-trust environments. It uses tokens to conduct transactions, exchange verifiable data, and achieve coordination across organization…
View article: Blockchain Networks:
Blockchain Networks: Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: Rethinking Distributed Ledger Technology
Rethinking Distributed Ledger Technology Open
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest than previous proposals for digital currencies. Blockchains are being used in o…
View article: Blockchain technology overview
Blockchain technology overview Open
Blockchains are tamper evident and tamper resistant digital ledgers\nimplemented in a distributed fashion (i.e., without a central repository) and\nusually without a central authority (i.e., a bank, company, or government). At\ntheir basic…
View article: Pseudo-Exhaustive Verification of Rule Based Systems
Pseudo-Exhaustive Verification of Rule Based Systems Open
Rule-based systems are important in application domains such as artificial intelligence and business rule engines.When translated into an implementation, simple expressions in rules may map to a large body of code that requires testing.We …
View article: Verification and test methods for access control policiesmodels
Verification and test methods for access control policiesmodels Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…
View article: Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist
Guide to securing Apple OS X 10.10 systems for IT professionals: a NIST security configuration checklist Open
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructu…