{"componentChunkName":"component---src-templates-blog-template-blog-template-js","path":"/tools-and-techniques-for-secure-by-design-dlt-system","result":{"data":{"markdownRemark":{"fields":{"dateSlug":"2020-07-04","id":"tools-and-techniques-for-secure-by-design-dlt-system-2020-07-04"},"frontmatter":{"title":"Tools and Techniques for Secure-by-Design DLT System","categories":["research topic","cyber security"],"date":"July 4, 2020","tags":["Cyber Security","IT Services"],"type":"area","author1":null,"author1_image":null},"html":"<h1>Tools and Techniques for Secure-by-Design DLT System</h1>\n<p>The third area of research concerns with techniques and tools for facilitating secure-by-design of DLT. We focus on a holistic perspective that considers not just the ledger networks but the interfaces between the ledger and other system components. Some topics of interest include:</p>\n<ul>\n<li>Establishing a security framework for the interface between ledger and the rest of the system</li>\n<li>Assessing the security of multi-ledger architecture</li>\n<li>Assessing the trade-off between security and privacy in a DLT system. </li>\n</ul>"}},"pageContext":{"slug":"tools-and-techniques-for-secure-by-design-dlt-system","next":{"frontmatter":{"title":"CCOP Dashboard","featured_image":null},"fields":{"slug":"ccop-dashboard"}},"previous":{"frontmatter":{"title":"Tools and Automation Support for DLT System Engineering","featured_image":{"childImageSharp":{"fluid":{"src":"/static/bbdecc8f12f99be010105337e5fc7456/7a94d/blog-03-1170x600.jpg","presentationWidth":720,"presentationHeight":120}}}},"fields":{"slug":"tools-and-automation-support-for-dlt-system-engineering"}},"breadcrumb":{"location":"/tools-and-techniques-for-secure-by-design-dlt-system","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/tools-and-techniques-for-secure-by-design-dlt-system","crumbLabel":"tools-and-techniques-for-secure-by-design-dlt-system"}]}}}}