872 Hits in 7.3 sec

Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders [article]

Franz Gregor and Wojciech Ozga and Sébastien Vaucher and Rafael Pires and Do Le Quoc and Sergei Arnautov and André Martin and Valerio Schiavoni and Pascal Felber and Christof Fetzer
2020 arXiv   pre-print
We propose a more powerful and generic approach to trust management that instead relies on trusted execution environments (TEEs) and a set of stakeholders as root of trust.  ...  PALAEMON addresses in a secure, efficient and cost-effective way five main challenges faced when developing trusted networked applications and services.  ...  and Innovation (SERI) under the SecureCloud Project (, grant agreement No 690111, as well as under the LEGaTO Project (, grant agreement No 780681.  ... 
arXiv:2003.14099v1 fatcat:d3cvpfp4zrdlzeceg4boipg6iu

Effective Optimization of Multi-Clouds using Software-as-a-Service

Byeong Ho Kang, Tai-hoon Kim
2012 Asia-pacific Journal of Multimedia services convergent with Art Humanities and Sociology  
The DepSky algorithm exists in the clients' machines as a software library to communicate with each cloud. These four clouds are storage clouds, so there are no codes to be executed.  ...  Furthermore, many describe BFT as being of only"purely academic interest" for a cloud service.  ...  The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service [3] .  ... 
doi:10.14257/ajmscahs.2012.12.04 fatcat:5ig3huvz3ncj5oe4lhkjdl5eom

A Privacy-Aware PKI System Based on Permissioned Blockchains

Rong Wang, Juan He, Can Liu, Qi Li, Wei-Tek Tsai, Enyan Deng
2018 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS)  
At present, the supply chain system has many problems, such as a large number of scattered participants, which make it difficult to centralize management and operation.  ...  To address these problems, we propose a trusted supply chain management (SCM) system based on permissioned blockchains (BCs) to making the transaction information between alliance companies which is transparent  ...  in the face of hacker attacks.  ... 
doi:10.1109/icsess.2018.8663738 fatcat:5tidrgxkufeltiwwrd5sl26u5y

5GZORRO_D3.1: Design of the evolved 5G Service layer solutions

K. Barabash K. Meth
2021 Zenodo  
This deliverable specifies the architecture of data-driven solution for DLT and distributed intelligent resource discovery and management in use in 5GZORRO project.  ...  SLA Smart Contract, resource discovery, allocation and provisioning services offered by the 5GZORRO platform.  ...  The aforementioned additions refer to 5GZORRO ideas presented in the 5G PPP Whitepaper, AI and ML -Enablers for Beyond 5G Networks (Zenodo., contributed by authors  ... 
doi:10.5281/zenodo.5562219 fatcat:u2x5ulzchrgxhavftrot6s3zoa


Juan Jim Tan, Stefan Poslad, Leonid Titkov
2006 Applied Artificial Intelligence  
In a heterogeneous open service environment, the variety of security standards and possible settings used can hinder security interoperability, because a common security configuration may not be able to  ...  & There is a plethora of different security standards proposed by a range of standards consortia, including the IETF, W3C, and OASIS.  ...  The service workflow has a number of inputs required for invoking services; each process is managed and executed by the process logic application that enables the invocation of appropriate interaction  ... 
doi:10.1080/08839510500484298 fatcat:774p7gk2mrespeso4kei4guzsi

Falcon: A Blockchain-Based Edge Service Migration Framework in MEC

Xiangjun Zhang, Weiguo Wu, Shiyuan Yang, Xiong Wang, Prosanta Gope
2020 Mobile Information Systems  
In addition, during the migration process, edge services face security challenges in an edge network environment without centralized management.  ...  In order to ensure the migration of edge services in a safe and reliable environment, Falcon maintains an immutable alliance chain among multiple edge clouds.  ...  we have developed a decentralized blockchain trust management service, which has a trust authorization mechanism.  ... 
doi:10.1155/2020/8820507 fatcat:y2ww3zo3yrhsnhi2rgsb5jimdi

Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations [chapter]

Stefan Poslad
2009 Lecture Notes in Computer Science  
The interrelationships, interactions and behaviours of agents in MAS and multi-MAS (MMAS) are analogous to those in VO.  ...  MAS provide a useful method of modelling VO, to manage their and to make them secure and safer.  ...  Acknowledgements The research described was aided by the endeavours of the following research assistants: Juan (Jim) Tan and Leonid Titkov.  ... 
doi:10.1007/978-3-642-04879-1_18 fatcat:bqeflr5tszev3imshjfsp6gcqq

Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey

Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail
2018 International Journal on Advanced Science, Engineering and Information Technology  
In a nutshell, the discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform.  ...  A summary of the state-of-the-art blockchain based identity management and authentication solutions from year 2014 to 2018 is presented.  ...  As of today, they are still facing challenges in managing user's identity, authenticating and authorizing users.  ... 
doi:10.18517/ijaseit.8.4-2.6838 fatcat:shrmouxcgjhs3ddtkoofguo2g4

When Services Computing Meets Blockchain: Challenges and Opportunities [article]

Xiaoyun Li, Zibin Zheng, Hong-Ning Dai
2020 arXiv   pre-print
In this paper, we present a survey to investigate the integration of blockchain with services computing.  ...  The recent advances of blockchain bring opportunities to address the challenges of services computing due to its build-in encryption as well as digital signature schemes, decentralization feature, and  ...  However, a critical issue arises: no trusted-third-party ensures the correct execution of the workflow in a trustless environment.  ... 
arXiv:2012.04172v1 fatcat:55yhacv4kvd7lfncbnpnlcog2a

The Use of Blockchain Technology in e-Government Services

Ioannis Lykidis, George Drosatos, Konstantinos Rantos
2021 Computers  
In this paper, we conduct a literature review on the use of blockchain technology in e-government applications to identify e-government services that can benefit from the use of blockchains, types of technologies  ...  in their future activities in blockchain-enabled e-government services.  ...  Blockchain technology is considered as a revolutionary approach in the area of public services and e-governance, and acts as an enabler for citizens,  ... 
doi:10.3390/computers10120168 fatcat:zfrvsw7uezbx7gp5e4f6w2r3ky

Blockchain challenges and opportunities: a survey

Huaimin Wang, Zibin Zheng, Shaoan Xie, Hong Ning Dai, Xiangping Chen
2018 International Journal of Web and Grid Services  
There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, Internet of Things to public and social services.  ...  Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application  ...  Acknowledgement The work described in this paper was supported by the National Key  ... 
doi:10.1504/ijwgs.2018.10016848 fatcat:gyxdgwgscbhq5oogcrufiotdxy

Blockchain challenges and opportunities: a survey

Zibin Zheng, Shaoan Xie, Hong Ning Dai, Xiangping Chen, Huaimin Wang
2018 International Journal of Web and Grid Services  
There is a wide spectrum of blockchain applications ranging from cryptocurrency, financial services, risk management, internet of things (IoT) to public and social services.  ...  Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application  ...  Acknowledgement The work described in this paper was supported by the National Key  ... 
doi:10.1504/ijwgs.2018.095647 fatcat:tstcy73a7bajbcfutreco44hmu

Blockchain-Based Context-Aware Authorization Management as a Service in IoT

Tidiane Sylla, Leo Mendiboure, Mohamed Aymen Chalouf, Francine Krief
2021 Sensors  
In this paper, we propose a decentralized context-aware authorization management as a service based on the blockchain.  ...  Moreover, with the advancements in edge computing, context-aware security services can dynamically be placed close to a user's location and enable the support of low latency communication and mobility.  ...  Security Analysis Implementing as-a-service context-aware authorization management in the Edge IoT networks may face several security threats.  ... 
doi:10.3390/s21227656 pmid:34833732 pmcid:PMC8619443 fatcat:uzg2pe6o3rbwrjsj3yi76p22vi

Distributed ledger technology - Addressing the challenges of assurance in accounting systems: A research note

Kishore Singh, School of Business and Law, CQ University, Australia, Amlan Haque, Sabi Kaphle, Janice Joowon Ban
2021 Contabilitate şi Informatică de Gestiune  
As the technology gains acceptance in businesses such as banking, stock exchanges, insurance, law, government services, and e-voting, business leaders are beginning to recognise its potential to transform  ...  of transactions in a public distributed ledger.  ...  The blockchain as a source of trust can be very helpful in existing accounting structures.  ... 
doi:10.24818/jamis.2021.04004 fatcat:2lzvhgpbeffjhfiviryw6rmsmm

A Survey on Consensus Algorithms used in Blockchain Platforms

2020 International Journal of Advanced Trends in Computer Science and Engineering  
Blockchain is a form of distributed ledger where each node in the network contains records of transactions called blocks. The block is linked to another block using a cryptographic hash.  ...  Though Bitcoin was the first implementation of the blockchain technology it can be used for a wide range of applications including finance, healthcare, banking etc.  ...  Nodes interested in joining the network must download the trusted POET code run SGX in a Trusted Execution Environment (TEE). The POET algorithm consumes lower energy when compared to the POW.  ... 
doi:10.30534/ijatcse/2020/323952020 fatcat:4cfbmi5qmvbavpad7zzwcp5igq
« Previous Showing results 1 — 15 out of 872 results