9 research outputs found
Open peer-to-peer systems over blockchain and ipfs: An agent oriented framework
In recent years, the increasing concerns around the centralized cloud web services (e.g. privacy, governance, surveillance, security) have triggered the emergence of new distributed technologies, such as IPFS or the Blockchain. These innovations have tackled technical challenges that were unresolved until their appearance. Existing models of peer-to-peer systems need a revision to cover the spectrum of potential systems that can be now implemented as peer-to-peer systems. This work presents a framework to build these systems. It uses an agent-oriented approach in an open environment where agents have only partial information of the system data. The proposal covers data access, data discovery and data trust in peer-to-peer systems where different actors may interact. Moreover, the framework proposes a distributed architecture for these open systems, and provides guidelines to decide in which cases Blockchain technology may be required, or when other technologies may be sufficient
Crypto-Securities Regulation: ICOs, Token Sales and Cryptocurrencies under EU Financial Law
Cryptocurrencies, such as bitcoin and ethereum, have not only risen to public attention as novel means of payments, but also as facilitators of initial coin offerings (ICOs, also called token sales). In these entirely online-mediated offerings, entrepreneurs sell tokens registered on a blockchain in exchange for cryptocoins. Buyers receive tokens that can be understood as cryptographically-secured coupons which embody a bundle of rights and obligations. In July 2017, the SEC released an investigative report that highlighted that such tokens can be subject to the full scope of US securities regulation. It is unclear, however, to what extent EU securities regulation is applicable to ICOs and, particularly, whether issuers have to publish and register a prospectus in order to avoid criminal and civil prospectus liability in the EU. In conceptual terms, this depends on whether tokens are considered “securities” under the EU prospectus regulation regime. Against this background, this paper develops a nuanced approach that distinguishes between three archetypes of tokens: currency, investment, and utility tokens. It analyzes the differential implications of each of these types, and their hybrid forms, for EU securities regulation, and develops policy proposals for their regulation.Cryptocurrencies, such as bitcoin and ethereum, have not only risen to public attention as novel means of payments, but also as facilitators of initial coin offerings (ICOs, also called token sales). In these entirely online-mediated offerings, entrepreneurs sell tokens registered on a blockchain in exchange for cryptocoins. Buyers receive tokens that can be understood as cryptographically-secured coupons which embody a bundle of rights and obligations. In July 2017, the SEC released an investigative report that highlighted that such tokens can be subject to the full scope of US securities regulation. It is unclear, however, to what extent EU securities regulation is applicable to ICOs and, particularly, whether issuers have to publish and register a prospectus in order to avoid criminal and civil prospectus liability in the EU. In conceptual terms, this depends on whether tokens are considered “securities” under the EU prospectus regulation regime. Against this background, this paper develops a nuanced approach that distinguishes between three archetypes of tokens: currency, investment, and utility tokens. It analyzes the differential implications of each of these types, and their hybrid forms, for EU securities regulation, and develops policy proposals for their regulation
BIM security: A critical review and recommendations using encryption strategy and blockchain
Security of information in collaborative BIM platforms is crucial particularly for critical projects such as that of government buildings, prisons, and power plants. Inappropriate distribution and loss of sensitive information may potentially lead to physical security threats, financial loss, and loss of trust and reputation. Therefore, this paper identifies the information security requirements of collaborative BIM platforms considering the characteristics related to data security of collaborative BIM platforms through a literature review and as a result, identifies seven components of BIM security, based on which defines three levels of BIM security. Existing cybersecurity facilitating technologies such as encryption protocols, distributed database technology, and blockchain technology are reviewed to assess applicability to BIM security. This review shows that although the technologies to support BIM security are available in research and on market, they are not customized in existing collaborative BIM platforms to support BIM security. Therefore, two conceptual frameworks are proposed – (1) an encryption strategy-based framework to facilitate secure storage and distribution of BIM and (2) a blockchain-based framework to record BIM changes in a tamper-proof ledger for the non-trusting environment of construction projects. Discussions on cost and functionality are provided, which will be further extended in the future
