1)Describe how permissionless and permissioned blkckchains differ in how each ty

1)Describe how permissionless and permissioned blkckchains differ in how each type approaches disput resolution among participants.2)Explain how Ethereum’s design affects the blockchin’s vulnerability to Denial of Service attacks.3)In one of the papers you read this semester, Koteska (2017) presented current quality issues in blockchain implementations. Using issues presented in the paper, describe the quality issue you think Hyperledger Fabric is best able to address and which quality issue Hyperledger Fabric is least able to address. Explain your justification for each choice.Koteska, B., Karafiloski, E., & Mishev, A. (2017). Blockchain implementation quality challenges: a literature. In SQAMIA 2017: 6th Workshop of Software Quality, Analysis, Monitoring, Improvement, and Applications (pp. 11-13).4) According to Zakir (2019), when does a new block that stores communication messages between aircraft and ATC get created? How does this approach improvide communication security in terms of message confidentiality, integrity, and availablility?Zakir, Y., Hasan, K. S., Wiggins, N. S., & Chatterjee, A. (2019, October). Improving Data Security in Message Communication between ACT and Aircraft using Private Blockchain. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (pp. 506-513). IEEE.
Requirements: 50 words each

Leave a comment

Your email address will not be published. Required fields are marked *