Views: 247 ES Score: 0 Introduced Quantity:

Security Mechanism Analysis of Blockchain Smart Contract in Cross-Border Trade Field

DOI
10.26855/oajem.2022.07.002
Year, volume (issue)
2022, 1(1)
pp. 5-9
Published in
OA Journal of Economy and Management
Fund Project

Relevant scholars

Relevant institutions

Ruirui Yuan

Cross-border, Trade, Block chain, Smart contracts, Security mechanism

Abstract

The current smart contract is a transaction program that can automatically execute prefabricated rules and treaties. In recent years, with the innovation and development of block chain technology, it has not only attracted much attention but also been widely used in various industries. Because smart contracts are independently self-validated and automatically executed in a network environment, there are many security problems. This article analyzes the potential security risks of smart contracts in block chain, and proposes a comprehensive and effective security mechanism based on actual business development scenarios, hoping to provide some help for the secure application of smart contracts in block chain in cross-border trade.

Keywords: Cross-border, Trade, Block chain, Smart contracts, Security mechanism

  • Reference
  • Related literature

[1] Zeng Li. (2020). Blockchain-based intelligent processing transmission method and platform for cross-border e-commerce big data, CN111461840A [P]. 2020.

[2] Wang, D., Xie, Z., Zhen Zhen. (2020). The application path and legal regulation framework of blockchain technology in the collaborative development of cross-border e-commerce [J]. Journal of Xinjiang University of Finance and Economics, 2020(3): 8.

[3] Lin Binhui. (2020). Research on the impact of blockchain technology on traditional cross-border trade settlement methods [J]. 2020.

[4] Li Xiaofeng, Xu Jinlin. (2021). A blockchain-based cross-border trade privacy data management system and method: CN112417512A [P]. 2021.

[5] Lu Fang. (2021). Research on blockchain smart contract security mechanism in cross-border trade [J]. Network Security Technology and Applications, 2021(07): 161-164.

Comments