4,582 research outputs found
Computer-aided verification in mechanism design
In mechanism design, the gold standard solution concepts are dominant
strategy incentive compatibility and Bayesian incentive compatibility. These
solution concepts relieve the (possibly unsophisticated) bidders from the need
to engage in complicated strategizing. While incentive properties are simple to
state, their proofs are specific to the mechanism and can be quite complex.
This raises two concerns. From a practical perspective, checking a complex
proof can be a tedious process, often requiring experts knowledgeable in
mechanism design. Furthermore, from a modeling perspective, if unsophisticated
agents are unconvinced of incentive properties, they may strategize in
unpredictable ways.
To address both concerns, we explore techniques from computer-aided
verification to construct formal proofs of incentive properties. Because formal
proofs can be automatically checked, agents do not need to manually check the
properties, or even understand the proof. To demonstrate, we present the
verification of a sophisticated mechanism: the generic reduction from Bayesian
incentive compatible mechanism design to algorithm design given by Hartline,
Kleinberg, and Malekian. This mechanism presents new challenges for formal
verification, including essential use of randomness from both the execution of
the mechanism and from the prior type distributions. As an immediate
consequence, our work also formalizes Bayesian incentive compatibility for the
entire family of mechanisms derived via this reduction. Finally, as an
intermediate step in our formalization, we provide the first formal
verification of incentive compatibility for the celebrated
Vickrey-Clarke-Groves mechanism
Recommended from our members
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
MAKING OF TREATMENT OF AUCTION DEED FOR NOTARY BY METHOD CYBER NOTARY
This research is legal research normative using a statutory approach (statute approach) and a conceptual approach (conceptual approach) to analyze the problem, pThis research aims to examine and analyze the auction treatise deed made by a notary by cyber notary, where the conceptcyber notary turns out to have a norm conflict with Article 16 paragraph (9) regarding the word element before which is a formal requirement for the validity of an authentic deed as stated in Article 16 paragraph (9) regarding the position of Notary. Apart from that, there is also legal obscurity in Article 15 paragraph (2) letter g of the UUJN, for this reason, a revision of the UUJN is needed, especially in Article 15 paragraph (2) letter g by adding a clause that a notary who can make auction minutes is a notary who has been appointed first by the Minister of Finance of the Republic of Indonesia
Migration control for mobile agents based on passport and visa
Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system
Executory Power Of Fiduciary Guarantee Certificate In Consumer Financing Agreement Based On Law Number 42 Of 1999 Concerning Fiduciary Guarantee
Based on the discussion, it can be seen that the legal arrangements in financing agreements with fiduciary guarantees are subject to the Civil Code by the terms of the validity of Article 1319, Article 1320, and Article 1338 agreements, as well as the provisions in Presidential Decree 61 of 1988 concerning Financing Institutions and Presidential Regulation No. 9 of 2009 concerning Financing Institutions. Legal protection for consumers due to the sale of fiduciary guarantee objects in financing agreements is that they must not violate the principles of consumer protection and provide legal certainty and legal protection for those interested and guarantees, primarily related to consumer rights and the sale of objects that are objects of fiduciary guarantee by Law Number 42 of 1999 concerning Fiduciary Guarantees agreed by the fiduciary grantor and recipient. The judge's legal consideration in the Decision of the Supreme Court of the Republic of Indonesia Number 441 K / Pdt.Sus-BPSK / 2019 is the legal relationship between consumers and finance companies, namely financing agreements so that if one party does not fulfill or violate the agreement, it causes an act of breach of promise/default; when there is a default, the withdrawal or execution must be by the decision of the Constitutional Court, but if there are actions outside the procedural such as coercion and violence, then would be against the law
Raziel: Private and Verifiable Smart Contracts on Blockchains
Raziel combines secure multi-party computation and proof-carrying code to
provide privacy, correctness and verifiability guarantees for smart contracts
on blockchains. Effectively solving DAO and Gyges attacks, this paper describes
an implementation and presents examples to demonstrate its practical viability
(e.g., private and verifiable crowdfundings and investment funds).
Additionally, we show how to use Zero-Knowledge Proofs of Proofs (i.e.,
Proof-Carrying Code certificates) to prove the validity of smart contracts to
third parties before their execution without revealing anything else. Finally,
we show how miners could get rewarded for generating pre-processing data for
secure multi-party computation.Comment: Support: cothority/ByzCoin/OmniLedge
LEGAL STATUS OF FIDUCIARY GUARANTEE AUCTION
Regulations in the field of auctions as a system of logical, rational, normative thinking have not been able to solve a practical problem of a legal nature, in principle, auction buyers. In this regard, what needs attention is regarding shares as objects of Fiduciary Guarantees. This problem requires clear regulation, because Law Number 42 of 1999 does not clearly regulate this. Based on the description that has been put forward, the following conclusions can be drawn: First, the Constitutional Court Decision number 18/PUU-XVII/2019 dated January 6 2020 regarding the interpretation of Article 15 paragraph (1-3) of Law No. 42 of 1999 concerning Fiduciary Guarantees regarding default in the execution of fiduciary guarantees. The Constitutional Court gave a different interpretation from the previous article. Now, the fiduciary guarantee certificate, which contains the orders “For the sake of Justice Based on Belief in the One and Only God”, no longer automatically has executive power. Second, MK number 18/PUUXVII/2019 dated 6 January 2020 has provided legal certainty for creditors and debtors considering Article 15 paragraph (1-3) of Law no. 42 of 1999 concerning Fiduciary Guarantees related to breach of contract (default), this article is interpreted if the debtor (consumer) defaults/breaks a promise, the fiduciary recipient (leasing company) has the right to sell the collateral object with his own power (auction) as in the case of an inkracht court decisio
Problematic on Copyright Execution as Fiduciary Collateral When Debtor Defaults
The issuance of Government Regulation of the Republic of Indonesia Number 24 of 2022 on Regulation of the Implementation of Law Number 24 of 2019 on creative economy has served as the foundation of the copyright financing concept with an economic value, which can be used as fiduciary collateral. Therefore, problems that arose in the application of the mentioned concept are when copyright as fiduciary collateral is executed. Problem of copyright as fiduciary collateral for executed intellectual property due to defaulting debtor, which includes moral rights that remain attributed to despite the implementation of the execution, void of legal norms on the execution of copyrights and strength of minutes of auction evidence as proof of property rights transfer to copyright, as well as restriction of property rights by Law of Copyrights in the execution of copyright. Moreover, the research method applied in this paper was normative research, by analyzing library materials or primary and secondary data. The first result obtained only economic factors that are transferable in the transfer process of copyright, moral rights attributed to the creator, implementation of copyright execution such as legal objects with similar classification, and auction report as evidence of copyright transfer. Second, different restrictions from Article 28 H paragraph (4) of the 1945 Constitution of the Republic of Indonesia may lead to multiple interpretations and conflict of norms. The recommendation is to conduct a comparative study with countries that have the same legal system and revise Law Number 28 of 2014 on Copyright or establish the implementation of a mechanism for copyright execution.
Keywords: problematic, copyright execution, fiduciary collatera
- …