Autonomous Security Services for Organizations Assisted by Blockchain and Cryptographic Protocols / (Record no. 615837)

000 -LEADER
fixed length control field 04865nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260117150641.0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,RAS
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Rashid, Aqas
9 (RLIN) 132798
245 ## - TITLE STATEMENT
Title Autonomous Security Services for Organizations Assisted by Blockchain and Cryptographic Protocols /
Statement of responsibility, etc. Aqas Rashid
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. September 2024
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 119 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Security services are essential for organizations, enterprises, and individuals to protect their network, data, resources, services, privileges, databases, cloud and web access, and administrative tasks. These services include encryption and authentication using the Public Key Infrastructure (PKI) mechanism, privacy using the Privilege Management Infrastructure (PMI) and Identity and Access Management (IdAM), Provenance using track and trace, and Integrity Assurance using end-to-end trustworthiness. These security services are the cornerstones for surviving in the modern digital world.<br/>Centralized enforcement mechanisms for security services are vulnerable to security attacks and issues that have been documented throughout history. The literature presents numerous blockchain-empowered security service mechanisms for PKI, PMI, IdAM, Provenance, and Integrity Assurance. However, the existing solutions in these security mechanisms, including their frameworks, architectures, designs, algorithms, and implementations, are thoroughly reviewed and critically analyzed. The conclusion drawn is that there is room for improvement in these areas to improve security through autonomous security services to enhance security operations. Autonomous security services enhance human capabilities, improve response times, and enhance overall security posture in an increasingly complex and dynamic threat landscape.<br/>This research aims to design autonomous security service mechanisms for PKI, PMI, IdAM, Provenance, and Integrity Assurance using blockchain and cryptographic protocols. The objective is to improve performance in terms of computational effort and security features, as compared to existing techniques.<br/>In the encryption and authentication security services part, the focus of this research is to propose a blockchain-based PKI mechanism within a privately trusted, managed, and publicly trusted PKI domain. The performance of the proposed designs is evaluated through proof of concept experiments and deployment to test the effectiveness of the proposed PKI mechanisms. Additionally, the quantitative results obtained are benchmarked against the corresponding results acquired from the existing techniques. The comparison results highlight the significance of the mechanism in terms of computational effort. Collectively, we referred to all the contributions of this dissertation in this domain as “PKI 3600.”<br/>In the privacy security services part, PMI mechanisms have been proposed for organizations and enterprises. The focus of this domain is to propose blockchain-based PMI mechanisms in the Privileges in PKI (PPKI), and Privileges in Functional PKI (PFPKI) in privately trusted, managed, and publicly trusted PMI domains. The validation of the proposed designs has been performed through proof of concept. The proposed mechanisms comply with the X.509 PMI standard and are efficient in terms of computational effort. We referred to all the contributions of this dissertation in this domain collectively as “PMI 3600.”<br/>In the privacy security services part, IdAM mechanisms have been proposed. The focus of the IdAM domain is to propose blockchain-based IdAM mechanisms in trans-organizational, intra-, and inter-domain environments, used both with and without bridging entities. The IdAM enforcement design considers identity, attribute, and role-based access control security policies. Simulation experiments and deployment are used to evaluate the performance of the proposed designs and test the effectiveness of the IdAM mechanisms. Additionally, the obtained quantitative results are compared to those of existing techniques to assess their significance in terms of computational effort. The results demonstrate that the proposed schemes outperform existing solutions. Collectively, we referred to all the contributions of this dissertation in this domain as “IdAM 3600.”<br/>In the provenance security services part, the mechanisms are presented for the contagious disease vaccination and immunity licenses. Within this domain, three protocols are defined to manage health licenses for contagious diseases. Performance evaluation is conducted through proof of concept experiments and deployment to test the effectiveness of proposed provenance mechanisms.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Information Security Thesis
9 (RLIN) 132793
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD IS Thesis
9 (RLIN) 132794
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Dr. Asif Masood
9 (RLIN) 132796
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 01/17/2026   005.8,RAS MCSPhD IS-12 01/17/2026 01/17/2026 Thesis Almirah No.68, Shelf No.5
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.