Auflistung nach Schlagwort "blockchain"
1 - 9 von 9
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragAdversary Tactics and Techniques specific to Cryptocurrency Scams(Open Identity Summit 2022, 2022) Horch, Andrea; Schunck, Christian H.; Ruff, ChristopherAt the end of the year 2020, there was a steep uptrend of the cryptocurrency market. The global market capitalization of cryptocurrencies climbed from 350 billion US$ in October 2020 to almost 2.5 trillion US$ in May 2021 and reached 3 trillion US$ in November 2021. Currently, there are more than 17,600 cryptocurrencies listed on CoinMarketCap. The ample amount of money within the market attracts investors as well as scammers and hackers. Recent incidents like the BadgerDAO hack have shown how easy it is to steal cryptocurrencies. While all the standard scamming and hacking techniques such as identity theft, social engineering and web application hacking are successfully employed by attackers, new scams very specific to cryptocurrencies emerged, which are the focus of this paper.
- ZeitschriftenartikelBlockchain in Industrie 4.0: Beyond cryptocurrency(it - Information Technology: Vol. 60, No. 3, 2018) Laabs, Martin; Đukanović, SinišaIndustrie 4.0, the transition from static, centrally controlled production to dynamic, decentralized manufacturing, is aiming to increase product quality, customization and efficiency. Autonomous production systems and flexible inter-organizational cooperation are key challenges. Blockchain seems to be a natural fit to cope with these challenges. This article derives major challenges of I4.0 and compares them with benefits of blockchain technology. Use cases demonstrate where challenges and benefits match. Also, well known blockchain issues and possible solutions are addressed.
- TextdokumentBlockchain-based consent manager for GDPR compliance(Open Identity Summit 2019, 2019) Vargas; Juan CamiloThe General Data Protection Regulation represents great challenges for companies. This paper proposes a model of consent management for personal data that uses blockchain technology to help address part of these challenges. On the one hand, the model aims to facilitate compliance with the regulation and offer an agile tool for consent control and interaction between data subjects, controllers and processors. On the other hand, it aims to offer data subjects a tool to assert their rights and get bigger control over their consents and indirectly over personal data. A proof of concept was developed using Hyperledger Fabric and allowed to identify the benefits and challenges of the model.
- KonferenzbeitragIdToken: a new decentralized approach to digital identi-ty(Open Identity Summit 2020, 2020) Talamo, Edoardo; Pennacchi, AlmaThe ability to store and share digital data offers benefits that the digitization of information has become a growing trend but has raised questions about the security of personal data. There have been countless high-profile hacks and personal information leaks. Furthermore users don’t (and shouldn’t) always trust an external server of a third party to store their personal data. Blockchain tries to offer a compelling solution to the problem of combining accessibility with privacy and security. Records can be held securely, using end-to-end encryption, and yet openly authenticated so that data can still be trusted as reliable. This project goes deeper in this solution thanks to an innovative idea and development of a new kind of blockchain non fungible token specifically created to store and manage digital identities and sensible data. It has the potential to resolve issues blockchain alone was starting to approach and improves security, privacy and accessibility.
- ZeitschriftenartikelOn-chain vs. off-chain storage for supply- and blockchain integration(it - Information Technology: Vol. 60, No. 5-6, 2018) Hepp, Thomas; Sharinghousen, Matthew; Ehret, Philip; Schoenhals, Alexander; Gipp, BelaSupply chains are the basis of most everyday life products. Both data integrity and authenticity of related information have severe implications for quality and safety of end-products. Hence, tamper-proof storage is necessary that prevents unauthorized modifications. We examine peer-reviewed blockchain technologies according to four criteria relevant to supply chains: On-chain storage, off-chain storage, verification cost and secure data sharing. Our evaluation yields an overview of concepts for modeling supply chain processes and points out that on-chain storage is currently not practical.
- KonferenzbeitragRecords Management and Long-Term Preservation of Evidence in DLT(Open Identity Summit 2021, 2021) Kusber, Tomasz; Schwalm, Steffen; Dr. Korte, Ulrike; Schamburger, KalindaDLT improves decentralized business models and transactions from supply chain or cryptocurrencies to shared mobility, electronic registries or proof of origin. The planned enhancement of European Blockchain Service Infrastructure approximately 2021-2022 is expected to accelerate these developments based on a scalable, standardized framework. Like any infrastructure or IT-system used for business relevant transactions also in DLT is has to be possible to make decisions and processes evident against 3rd parties such as courts, auditors or regulative authorities. This leads to the challenge to fulfil requirements on a valid records management acc. to current standards [IS20b] [IS16] as well as to preserve the evidences of electronic records as long as they are needed according to current regulations and standards [eIDAS] [ETS19b] [VDG]. Based on international standardization the authors are taking part in, this paper focuses on the challenges and requirements for records management and preservation of evidence in DLT as well as possible solutions and needs for further standardization.
- KonferenzbeitragSelf-sovereign and Decentralized identity as the future of identity management?(Open Identity Summit 2020, 2020) Kubach, Michael; Schunck, Christian H.; Sellung, Rachelle; Roßnagel, HeikoBlockchain-based Self-sovereign and Decentralized identity approaches are seen by many as the future of identity management. These solutions are supposed to finally bring universally usable, trustworthy, secure, and privacy friendly digital identities for everyone and all use cases. This paper first presents the promises of this technological app
- TextdokumentSmart Contract Federated Identity Management without Third Party Authentication Services(Open Identity Summit 2019, 2019) Mell, Peter; Dray, Jim; Shook, JamesFederated identity management enables users to access multiple systems using a single login credential. However, to achieve this a complex privacy compromising authentication has to occur between the user, relying party (RP) (e.g., abusiness), and a credential service provider(CSP) that performs the authentication. In this work, we use a smart contract on a blockchain to enable an architecture where authentication no longer involves the CSP. Authentication is performed solely through user to RP communications (eliminating fees and enhancing privacy). No third party needs to be contacted, not even the smart contract. No public key infrastructure (PKI) needs to be maintained. And no revocation lists need to be checked. In contrast to competing smart contract approaches, ours is hierarchically managed (like a PKI) enabling better validation of attribute providers and making it more useful for large entities to provide identity services for their constituents (e.g.,a government) while still enabling users to maintain a level of self-sovereignty.
- ZeitschriftenartikelWorkflow Management on BFT Blockchains(Enterprise Modelling and Information Systems Architectures (EMISAJ) – International Journal of Conceptual Modeling: Vol. 15, Nr. 14, 2020) Evermann, Joerg; Kim, HenryBlockchains have been proposed as infrastructure technology for a wide variety of applications. They provide an immutable record of transactions, making them useful when business actors do not trust each other, and their distributed nature makes them suitable for inter-organizational applications. However, widely-used proof-of-work based blockchains are computationally inefficient and do not provide final consensus, although they scale well to large networks. In contrast, blockchains built around Byzantine Fault Tolerance (BFT) consensus algorithms are more efficient and provide immediate and final consensus, but do not scale well to large networks. We argue that this makes them well-suited for workflow management applications, which typically include no more than a few dozen participants. This paper is motivated by a use case in the resource extraction industry. We develop an architecture for a BFT blockchain based workflow management system (WfMS) and present a prototype implementation. We discuss its advantages and limitations with respect to proof-of-work based systems and provide an outlook to future research.