7,778 research outputs found

    Supply chain traceability using blockchain

    Get PDF
    Mestrado em Gestão MBARastreabilidade é a capacidade de rastrear a origem, a história e a distribuição de produtos numa cadeia logística. Para implementar rastreabilidade completa, é crucial estabelecer uma cadeia de custódia, normalmente definida como uma sequência de procedimentos que valida a propriedade e o controle de produtos ao longo da cadeia de logística. No mercado atual globalizado, as cadeias de logística podem abranger um grande número de países e fronteiras e exigir a interoperabilidade de numerosas organizações. Esta vastidão e complexidade impacta a competitividade dos negócios e dificulta a segurança, e a transparência da cadeia de logística. A implementação da rastreabilidade é fundamental para que as organizações possam posteriormente demonstrar a rastreabilidade, proveniência e integridade e conformidade do produto. A tecnologia Blockchain, com os seus atributos de descentralização, transparência e imutabilidade, tem sido apontada como destinada a revolucionar vários setores, com aplicação ao gerenciamento de cadeias de logística. O presente estudo começa pela revisão da literatura publicada para encontrar aspetos que influenciam o problema e segue a Metodologia de Pesquisa de Projeto para analisar os requisitos e propor uma solução para um sistema de gestão de cadeia de logística com melhor rastreabilidade. Os resultados da tese são artefactos de arquitetura, incluindo um contracto inteligente para Ethereum e um sistema de autenticação baseado em certificados, que permitem a implementação de um sistema de cadeia de logística suportado em Ethereum Blockchain que providencia aos seus utilizadores e ao consumidor final, as funcionalidades de proveniência, rastreabilidade e cadeia de custódia.Traceability is the ability to trace the origin, processing history, and the distribution of products in a Supply chain. In order to implement a complete traceability system, it is crucial to establish a chain of custody. Chain of Custody is typically defined as a sequence of procedures that validates the ownership and control of products along the supply chain. In the current global marketplace supply chains can span a huge number of countries and require interoperation of a multitude of organizations. This vastness of supply chains impacts business competitiveness since it adds complexity and can difficult securing traceability, chain of custody and transparency. In this work it is proposed a complete approach for organizations to be able to demonstrate traceability, provenance (proof of origin) and product integrity and compliance. Blockchain technology with its attributes of decentralization, transparency and immutability has been touted to revolutionize several industries, and most recently has been proposed for supply chain management (SCM). The present study reviews the published literature to find the aspects that influence the problem and then follows the Design Science Research Methodology to analyze the requirements and propose a solution to a more complete traceability in SCMs. The results of this thesis were architectural artifacts, including an Ethereum SC (Smart Contract) and a certificate-based authentication system. These deliverables would allow implementation of a supply chain system over the Ethereum Blockchain that can provide decentralized and trustful assurance of the provenance, chain of custody and traceability functionalities for the participants and consumers.info:eu-repo/semantics/publishedVersio

    Trust in a multi-tenant, logistics, data sharing infrastructure:Opportunities for blockchain technology

    Get PDF
    In support of the trend towards ever more complex supply chain collaboration for the physical Internet, a trusted, multi-tenant (and interoperable) data sharing infrastructure has to be enabled. Trust is a condition sine qua non organizations may not be prepared to share potentially competitive sensitive information. As such, trust has to be an essential design aspect for any multi-tenant data sharing infrastructure for the data sharing stakeholders To overcome the challenges for trusted data sharing, various reference architectures for a trusted, multi-tenant, data sharing infrastructure are being developed. As such, the Industrial Data Space (IDS) initiative is currently gaining attention. It’s based on the architectural principles of keeping the data owner in control over his data and keeping data, data processing and data distribution at the source. Its reference architecture is strongly grounded on a role / stakeholder model for the intermediary trusted roles to enable peer-to-peer data sharing over a controlled and trusted connector infrastructure. The intermediary trusted roles may contain and process meta-data on the data sources, the data transactions and/or on the identities of the parties involved in the data sharing. This paper focuses on the role of blockchain technology for improving trust levels for such intermediary trusted roles

    Forage seed quality in Ethiopia: Issues and opportunities

    Get PDF

    Immigration: The points based system – student routes

    Get PDF

    How to be FAIR with your data

    Get PDF
    This handbook was written and edited by a group of about 40 collaborators in a series of six book sprints that took place between 1 and 10 June 2021. It aims to support higher education institutions with the practical implementation of content relating to the FAIR principles in their curricula, while also aiding teaching by providing practical material, such as competence profiles, learning outcomes, lesson plans, and supporting information. It incorporates community feedback received during the public consultation which ran from 27 July to 12 September 2021

    EFFICIENT AND SCALABLE NETWORK SECURITY PROTOCOLS BASED ON LFSR SEQUENCES

    Get PDF
    The gap between abstract, mathematics-oriented research in cryptography and the engineering approach of designing practical, network security protocols is widening. Network researchers experiment with well-known cryptographic protocols suitable for different network models. On the other hand, researchers inclined toward theory often design cryptographic schemes without considering the practical network constraints. The goal of this dissertation is to address problems in these two challenging areas: building bridges between practical network security protocols and theoretical cryptography. This dissertation presents techniques for building performance sensitive security protocols, using primitives from linear feedback register sequences (LFSR) sequences, for a variety of challenging networking applications. The significant contributions of this thesis are: 1. A common problem faced by large-scale multicast applications, like real-time news feeds, is collecting authenticated feedback from the intended recipients. We design an efficient, scalable, and fault-tolerant technique for combining multiple signed acknowledgments into a single compact one and observe that most signatures (based on the discrete logarithm problem) used in previous protocols do not result in a scalable solution to the problem. 2. We propose a technique to authenticate on-demand source routing protocols in resource-constrained wireless mobile ad-hoc networks. We develop a single-round multisignature that requires no prior cooperation among nodes to construct the multisignature and supports authentication of cached routes. 3. We propose an efficient and scalable aggregate signature, tailored for applications like building efficient certificate chains, authenticating distributed and adaptive content management systems and securing path-vector routing protocols. 4. We observe that blind signatures could form critical building blocks of privacypreserving accountability systems, where an authority needs to vouch for the legitimacy of a message but the ownership of the message should be kept secret from the authority. We propose an efficient blind signature that can serve as a protocol building block for performance sensitive, accountability systems. All special forms digital signatures—aggregate, multi-, and blind signatures—proposed in this dissertation are the first to be constructed using LFSR sequences. Our detailed cost analysis shows that for a desired level of security, the proposed signatures outperformed existing protocols in computation cost, number of communication rounds and storage overhead

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    DRM convergence:interoperability between DRM systems

    Get PDF
    corecore