Skip to main content

Showing 1–5 of 5 results for author: Akbarfam, A J

.
  1. arXiv:2406.11729  [pdf

    cs.CR cs.SI

    Secure Cross-Chain Provenance for Digital Forensics Collaboration

    Authors: Asma Jodeiri Akbarfam, Gokila Dorai, Hoda Maleki

    Abstract: In digital forensics and various sectors like medicine and supply chain, blockchains play a crucial role in providing a secure and tamper-resistant system that meticulously records every detail, ensuring accountability. However, collaboration among different agencies, each with its own blockchains, creates challenges due to diverse protocols and a lack of interoperability, hindering seamless infor… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  2. arXiv:2311.06236  [pdf

    cs.CR

    Deep Learning meets Blockchain for Automated and Secure Access Control

    Authors: Asma Jodeiri Akbarfam, Sina Barazandeh, Deepti Gupta, Hoda Maleki

    Abstract: Access control is a critical component of computer security, governing access to system resources. However, designing policies and roles in traditional access control can be challenging and difficult to maintain in dynamic and complex systems, which is particularly problematic for organizations with numerous resources. Furthermore, traditional methods suffer from issues such as third-party involve… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: text overlap with arXiv:2303.14758

    Journal ref: International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 12, No 3/4, November 2023

  3. arXiv:2308.03927  [pdf, other

    cs.CR

    ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability

    Authors: Asma Jodeiri Akbarfam, Mahdieh Heidaripour, Hoda Maleki, Gokila Dorai, Gagan Agrawal

    Abstract: Maintaining accurate provenance records is paramount in digital forensics, as they underpin evidence credibility and integrity, addressing essential aspects like accountability and reproducibility. Blockchains have several properties that can address these requirements. Previous systems utilized public blockchains, i.e., treated blockchain as a black box, and benefiting from the immutability prope… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2303.14758  [pdf

    cs.CR

    DLACB: Deep Learning Based Access Control Using Blockchain

    Authors: Asma Jodeiri Akbarfam, Sina Barazandeh, Hoda Maleki, Deepti Gupta

    Abstract: In general, deep learning models use to make informed decisions immensely. Developed models are mainly based on centralized servers, which face several issues, including transparency, traceability, reliability, security, and privacy. In this research, we identify a research gap in a distributed nature-based access control that can solve those issues. The innovative technology blockchain could fill… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

  5. Uniqueness for Inverse Sturm-Liouville Problems with a Finite Number of Transmission Conditions

    Authors: Mohammad Shahriari, Aliasghar Jodayree Akbarfam, Gerald Teschl

    Abstract: We establish various uniqueness results for inverse spectral problems of Sturm-Liouville operators with a finite number of discontinuities at interior points at which we impose the usual transmission conditions. We consider both the case of classical Robin and of eigenparameter dependent boundary conditions.

    Submitted 3 October, 2012; v1 submitted 29 March, 2012; originally announced March 2012.

    Comments: 15 pages; Addendum added

    MSC Class: 34B20; 34L05 (Primary) 34B24; 47A10 (Secondary)

    Journal ref: J. Math. Anal. Appl. 395, 19-29 (2012)