- New practice of secure storage, management and transfer of data which will be offered in a series of libraries and application interfaces (APIs) which will be implemented as closed code applications according to the goals set.The products will initially be available in the language implemented (Java) for the servers available in the system and the available mobile devices (mobiles & tablets). With the way of implementation, it will be ensured that in addition to the common necessary knowledge for their proper operation, none of the development managers will have the complete knowledge of operation in order to be able to intervene in it in the future and influence it. This package of applications as described can be given to third parties by way of installation and deployment.
- Since the secure storage, management and data transfer package can be used by third parties, it can also be used by the company’s existing departments and applications in order to further improve the respective parts of these applications.
In order to publicly disseminate the results of the research, an academic paper was published entitled “A WAY TO INVALIDATE ALTERATIONS IN A DATABASE STORED DATA FROM INSIDERS AND TO AVOID LOCATION-BASED DATA DECEIT.” Which based on gold access standards is publicly available on the page of the International journal of creative research thoughts ( https://ijcrt.org/viewfulltext.php?&p_id=IJCRT2207605 )
Georgios Chiotis, Aristotelis Skamagkis, Spyros Zavitsanos, “A WAY TO INVALIDATE ALTERATIONS IN A DATABASE STORED DATA FROM INSIDERS AND TO AVOID LOCATION-BASED DATA DECEIT.”, International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.10, Issue 7, pp.e627-e639, July 2022, Available at :http://www.ijcrt.org/papers/IJCRT2207605.pdf