1,143 research outputs found
A Java implementation of Coordination Rules as ECA Rules
This paper gives an insight in to the design and implementation of the coordination rules as ECA rules. The language specifications of the ECA rules were designed and the corresponding implementation of the same using JAVA as been partially done. The paper also hints about the future work in this area which deals with embedding this code in JXTA, thus enabling to form a P2P layer with JXTA as the back bone
Peer-to-peer and community-based markets: A comprehensive review
The advent of more proactive consumers, the so-called "prosumers", with
production and storage capabilities, is empowering the consumers and bringing
new opportunities and challenges to the operation of power systems in a market
environment. Recently, a novel proposal for the design and operation of
electricity markets has emerged: these so-called peer-to-peer (P2P) electricity
markets conceptually allow the prosumers to directly share their electrical
energy and investment. Such P2P markets rely on a consumer-centric and
bottom-up perspective by giving the opportunity to consumers to freely choose
the way they are to source their electric energy. A community can also be
formed by prosumers who want to collaborate, or in terms of operational energy
management. This paper contributes with an overview of these new P2P markets
that starts with the motivation, challenges, market designs moving to the
potential future developments in this field, providing recommendations while
considering a test-case
Adoption of vehicular ad hoc networking protocols by networked robots
This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan
Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy
Abstract. Pursuing the purpose of effective functioning in today's conditions, the business is forced to transform rapidly, to modernize at all levels. The world
is changing, erasing the limits of its certainty. Companies need quality transformations and strategies that are effective in the face of rapid change towards
"deep" digitization. Massive corporate management systems increasingly need the flexibility to keep pace with change. And companies with an innovative culture
are more in need of creative tasks than implementing detailed regulations.
In the post-industrial time of digital economy, issues related to the development
of the information sphere, the media and communications, the usage of modern
information systems to develop the economy and stabilize social development
as a whole, come first. The basic principles of practical application of Blockchain
are investigated in the work. The stages of development of Blockchain
technology, the stages of development of Blockchain technologies by time, the
application of distributed registry technology in Blockchain applications, the
principles of construction and operation of Blockchain have been specified. The
benefits of using NEM for business are substantiated and the components of
Proxima X technology, protocols and service layers, on-line and off-line protocols,
decentralized applications are exposed
SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems
Several years of academic and industrial research efforts have converged to a
common understanding on fundamental security building blocks for the upcoming
Vehicular Communication (VC) systems. There is a growing consensus towards
deploying a special-purpose identity and credential management infrastructure,
i.e., a Vehicular Public-Key Infrastructure (VPKI), enabling pseudonymous
authentication, with standardization efforts towards that direction. In spite
of the progress made by standardization bodies (IEEE 1609.2 and ETSI) and
harmonization efforts (Car2Car Communication Consortium (C2C-CC)), significant
questions remain unanswered towards deploying a VPKI. Deep understanding of the
VPKI, a central building block of secure and privacy-preserving VC systems, is
still lacking. This paper contributes to the closing of this gap. We present
SECMACE, a VPKI system, which is compatible with the IEEE 1609.2 and ETSI
standards specifications. We provide a detailed description of our
state-of-the-art VPKI that improves upon existing proposals in terms of
security and privacy protection, and efficiency. SECMACE facilitates
multi-domain operations in the VC systems and enhances user privacy, notably
preventing linking pseudonyms based on timing information and offering
increased protection even against honest-but-curious VPKI entities. We propose
multiple policies for the vehicle-VPKI interactions, based on which and two
large-scale mobility trace datasets, we evaluate the full-blown implementation
of SECMACE. With very little attention on the VPKI performance thus far, our
results reveal that modest computing resources can support a large area of
vehicles with very low delays and the most promising policy in terms of privacy
protection can be supported with moderate overhead.Comment: 14 pages, 9 figures, 10 tables, IEEE Transactions on Intelligent
Transportation System
Privacy in the Sharing Economy
Contemporary C2C platforms, such as Airbnb, have exhibited considerable growth in recent years and are projected to continue doing so in the future. These novel consumer-to-consumer marketplaces have started to obliterate the boundaries between private and economic spheres. Marketing personal resources online is inherently associated with the disclosure of personal and sometimes intimate information. This raises unprecedented questions of privacy. Yet, there is so far little research on the role of privacy considerations in the sharing economy literature. Leveraging the theoretical perspective of privacy calculus, we address this gap by investigating how privacy concerns and economic prospects shape a potential provider’s intentions to share via different communication channels. We relate privacy concerns back to the provider’s perceptions of the audience. We evaluate our research model by means of a scenario-based online survey, providing broad support for our reasoning
- …