Published September 26, 2025
| Version v1
Preprint
Open
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence
Authors/Creators
Description
This paper introduces the Pointer-Based Security Paradigm, which transforms digital security from protecting data during transmission and storage to architecting systems where sensitive data never exists as a vulnerable entity. The paradigm demonstrates practical implementations including zero-transmission messaging and storage-free authentication.
Files
suvorov-the-pointer-based-security-paradigm-v2.pdf
Files
(275.8 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:0fdf0db744f84b2870cc6d162d290162
|
275.8 kB | Preview Download |
Additional details
Related works
- Is cited by
- Preprint: 10.5281/zenodo.17264327 (DOI)
- Report: 10.5281/zenodo.17383447 (DOI)
- Preprint: 10.5281/zenodo.17614888 (DOI)
References
- Suvorov, A. (2025). The Local Data Regeneration Paradigm: Ontological Shift from Data Transmission to Synchronous State Discovery. Zenodo. https://doi.org/10.5281/zenodo.17264327
- Suvorov, A. (2025). Deterministic Game Engine: Practical Implementation of Pointer-Based Security and Local Data Regeneration Paradigms. Zenodo. https://doi.org/10.5281/zenodo.17383447
- Suvorov, A. (2025). Position-Candidate-Hypothesis (PCH) Paradigm: A Structural-Statistical Approach to NP-Complete Problems. Zenodo. https://doi.org/10.5281/zenodo.17614888