27,776 research outputs found

    Philosophy of Blockchain Technology - Ontologies

    Get PDF
    About the necessity and usefulness of developing a philosophy specific to the blockchain technology, emphasizing on the ontological aspects. After an Introduction that highlights the main philosophical directions for this emerging technology, in Blockchain Technology I explain the way the blockchain works, discussing ontological development directions of this technology in Designing and Modeling. The next section is dedicated to the main application of blockchain technology, Bitcoin, with the social implications of this cryptocurrency. There follows a section of Philosophy in which I identify the blockchain technology with the concept of heterotopia developed by Michel Foucault and I interpret it in the light of the notational technology developed by Nelson Goodman as a notational system. In the Ontology section, I present two developmental paths that I consider important: Narrative Ontology, based on the idea of order and structure of history transmitted through Paul Ricoeur's narrative history, and the Enterprise Ontology system based on concepts and models of an enterprise, specific to the semantic web, and which I consider to be the most well developed and which will probably become the formal ontological system, at least in terms of the economic and legal aspects of blockchain technology. In Conclusions I am talking about the future directions of developing the blockchain technology philosophy in general as an explanatory and robust theory from a phenomenologically consistent point of view, which allows testability and ontologies in particular, arguing for the need of a global adoption of an ontological system for develop cross-cutting solutions and to make this technology profitable. CONTENTS: Abstract Introducere Tehnologia blockchain - Proiectare - Modele Bitcoin Filosofia Ontologii - Ontologii narative - Ontologii de intreprindere Concluzii Note Bibliografie DOI: 10.13140/RG.2.2.24510.3360

    Blockchain Technology: An Analysis of Potential Applications and Uses

    Get PDF
    This paper will focus on explaining what blockchain technology is, the fundamentals of how it works, and applications of it. By utilizing sophisticated cryptography, a distributed network, a specified order of events the technology is able to create a ledger that cannot be altered due to its existence on many computers that able to detect if the data has been changed or tampered with. To help illustrate the uses of blockchain technology the technical explanation is complemented with real and hypothetical ways that the technology it being used. The use of blockchain technology originated with financial application and has expanded to many industries as new and creative ideas come to fruition

    Blockchain and the causal tree of reference

    Get PDF
    In a previous article, Philosophy of Blockchain Technology - Ontologies, I talked about applying Paul Ricœur's narrative theory in developing an ontology of blockchain technology. In this article I intend to highlight the idea of an analogy between blockchain technology and the causal theories of reference. Such a theory can be interpreted as a result of syntactic notation in a reference field, based on the narrative theory developed by Paul Ricœur in Time and Narrative. DOI: 10.13140/RG.2.2.26682.9568

    Blockchain Technology - China\u27s Bid to High Long-Run Growth

    Full text link
    Despite having the second largest economy at 13trillion,ChinahasonlyrecentlysurpassedtheWorldBanksdefinitionofthemiddleincomerangewhichisagrossnationalincomepercapitabetween13 trillion, China has only recently surpassed the World Bank’s definition of the ‘middle-income range’ which is a gross national income per capita between 1,000 to 12,000(constant2011international12,000 (constant 2011 international ). This is a noteworthy accomplishment since many other developing nations have fallen victim to economic stagnation within this range leading to the term “middle-income trap”. This paper will argue that one of the ways in which China escaped the middle-income trap and will continue to grow its economic influence is through the support of blockchain technology. Research and development, early technological adoption and business climate all play a role in explaining how the Chinese public and private sector have used blockchain technology to encourage economic growth. While there are many questions and misconceptions about blockchain technology and its place in China, this paper seeks only to answer a select few

    Beyond the Hype: On Using Blockchains in Trust Management for Authentication

    Full text link
    Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient reasoning, as to its merits.In this work, we investigate the merits of using open distributed ledgers (ODLs), such as the one implemented by blockchain technology, for securing TM systems for authentication. We formally model such systems, and explore how blockchain can help mitigate attacks against them. After formal argumentation, we conclude that in the context of Trust Management for authentication, blockchain technology, and ODLs in general, can offer considerable advantages compared to previous approaches. Our analysis is, to the best of our knowledge, the first to formally model and argue about the security of TM systems for authentication, based on blockchain technology. To achieve this result, we first provide an abstract model for TM systems for authentication. Then, we show how this model can be conceptually encoded in a blockchain, by expressing it as a series of state transitions. As a next step, we examine five prevalent attacks on TM systems, and provide evidence that blockchain-based solutions can be beneficial to the security of such systems, by mitigating, or completely negating such attacks.Comment: A version of this paper was published in IEEE Trustcom. http://ieeexplore.ieee.org/document/8029486
    corecore