711 research outputs found

    Assesment of Blockchain-Based P2P (Pear to Pear) Transactions in International Trade with Swot Analysis

    Get PDF
    Blockchain is known as a digitalized, decentralized online computer network on which a public ledger of all cryptocurrency transactions stored and it attempts to create and share all transactions that are verified by using a peer-to-peer (P2P) connected computer network. From the point of production to the truncating the international trade finance process or recording the customs procedures control, many companies are taking the advantages of blockchain technology day by day. The development of peer-to-peer payment systems make the crypto-currencies capable of dealing with not only the individual money transfers but also with the international trade activities. Expected result of this development is an increase the international trade volume in the short run. There are both threats and opportunities in terms of blockchain-based peer-to-peer commercial transactions. And also, some strengths and weaknesses due to the internal structure of the blockchain system. In this study, we are analyzing online peer-to-peer commercial activities via SWOT analysis from the perspective of institutions. It is expected that this study will enable to analyze the major factors of the peer-to-peer transactions in international trade facilities by applying "SWOT analysis". Even though there are a lot of research about blockchain in the local literature, institutional dimension in terms of the state-of-the-art cases of the adoption of blockchain in transport and logistics are studied scarcely in Turkey and hopefully will guide the academicians who want to work in this field

    Tutorial: Identity Management Systems and Secured Access Control

    Get PDF
    Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions

    Enhancements to the XNS authentication-by-proxy model

    Get PDF
    Authentication is the secure network architecture mechanism by which a pair of suspicious principals communicating over presumably unsecure channels assure themselves that each is that whom it claims to be. The Xerox Network Systems architecture proposes one such authentication scheme. This thesis examines the system consequences of the XNS model\u27s unique proxy variant, by which a principal may temporarily commission a second network entity to assume its identity as a means of authority transfer. Specific attendant system failure modes are highlighted. The student\u27s associated original contributions include proposed model revisions which rectify authentication shortfalls yet facilitate the temporal authority transfer motivating the proxy model. Consistent with the acknowledgement that no single solution is defensible as best under circumstances of such technical and administrative complexity, three viable such architectures are specified. Finally, the demand for a disciplined agent management mechanism within a distributed system such as XNS is resoundingly affirmed in the course of these first-order pursuits

    Regulatory Compliance in Multi-Tier Supplier Networks

    Get PDF
    Over the years, avionics systems have increased in complexity to the point where 1st tier suppliers to an aircraft OEM find it financially beneficial to outsource designs of subsystems to 2nd tier and at times to 3rd tier suppliers. Combined with challenging schedule and budgetary pressures, the environment in which safety-critical systems are being developed introduces new hurdles for regulatory agencies and industry. This new environment of both complex systems and tiered development has raised concerns in the ability of the designers to ensure safety considerations are fully addressed throughout the tier levels. This has also raised questions about the sufficiency of current regulatory guidance to ensure: proper flow down of safety awareness, avionics application understanding at the lower tiers, OEM and 1st tier oversight practices, and capabilities of lower tier suppliers. Therefore, NASA established a research project to address Regulatory Compliance in a Multi-tier Supplier Network. This research was divided into three major study efforts: 1. Describe Modern Multi-tier Avionics Development 2. Identify Current Issues in Achieving Safety and Regulatory Compliance 3. Short-term/Long-term Recommendations Toward Higher Assurance Confidence This report presents our findings of the risks, weaknesses, and our recommendations. It also includes a collection of industry-identified risks, an assessment of guideline weaknesses related to multi-tier development of complex avionics systems, and a postulation of potential modifications to guidelines to close the identified risks and weaknesses
    • …
    corecore