Automating Interpretations of Trustworthiness Marc Sel Royal Holloway, University of London

Total Page:16

File Type:pdf, Size:1020Kb

Automating Interpretations of Trustworthiness Marc Sel Royal Holloway, University of London Automating interpretations of trustworthiness Submitted by Marc Sel for the degree of Doctor of Philosophy of Royal Holloway, University of London 2021 Declaration I, Marc Sel, hereby declare that this thesis and the work presented in it is entirely my own. Where I have consulted the work of others, this is always clearly stated. Signed . (Marc Sel) Date: 1 To Trijntje. 2 Abstract Digital services have a significant impact on the lives of many individuals and organisations. Trust influences decisions regarding potential service providers, and continues to do so once a service provider has been selected. It is common to refer to the entity that is trusting as the trustor, and to the entity that is trusted as the trustee. There is no globally accepted model to describe trust in the context of digital services, nor to evaluate the trustworthiness of entities. Trust is commonly used in the context of digital services, yet it is overloaded with meaning and difficult to interpret. This thesis presents a novel model to describe and evaluate an entity’s trustworthiness. The model is referred to as the trustworthy ecosystem model. It is based on four building blocks: a data model, a rulebook, trustworthiness evaluation functions and instance data. The data model is expressed in First Order Logic. Rulebooks, which consist of constraints that reflect a particular context for reasoning about trustworthiness, are described using predi- cates. The entity that is evaluating is referred to as the evaluator, and the entity that is evaluated is the evaluation subject. The evaluator corresponds to a potential trustor, and the evaluation subject to a potential trustee. Verifying whether the constraints are satisfied over a set of instance data allows an evaluator to evaluate the trustworthiness of an evaluation subject. For this purpose trustworthiness eval- uation functions are specified. The functions takes as input a rulebook, i.e. a set of constraints, and a set of data. A rulebook contains a mandatory and a discretionary part. The mandatory part describes the constraints that must be satisfied to have the minimal basis for relevant execution of the discretionary rules. The discretionary part allows the evaluator to specify a trustworthi- ness evaluation policy by selecting discretionary constraints. The data represents real world information about the potential trustee and its context. The outcome of the evaluation provides evidence that can be used by the evaluator to decide to interact with the evaluation subject in the relationship of trustor–trustee. To demonstrate the practical feasibility of the proposed framework, a partial implementa- tion is presented. The data model was implemented in OWL, a logic language that was es- tablished by the Worldwide Web Consortium (W3C). The data model was complemented by a data import and transformation mechanism which transforms data from public and authori- tative sources into the data model and stores it in a graph database. A sample rulebook and trustworthiness evaluation function were implemented in the form of SPARQL queries. The implementation is partial because it implements only two particular rulebooks, inspired by the European legislation for trust services, and because it uses a specific set of data sources for its instance data. The approach was validated by implementing the model, importing real world data, per- forming selective evaluations of trustworthiness and comparing their outcome to other ap- 3 proaches such as PKI and the Web of Trust verification. The scientific contribution of the thesis can be summarised as follows: • A thorough investigation of the current academic field on trust and trustworthiness was performed through a literature review, to identify potential improvement points and thus create the basis for the thesis. • An integrated set of requirements for trust, i.e. things which must hold for an entity, or the outcome of an interaction to be regarded as trustworthy, were proposed on the basis of the literature review and the findings of the FutureTrust research project. • Based on these requirements, a new way to logically model providers and consumers of digital services as well as the providers of trust services as participants in a digital ecosys- tem was proposed. It is based on a data model, a rulebook, trustworthiness evaluation functions and instance data. • A partial implementation of the model was performed to validate it, using data from authoritative public sources. 4 Acknowledgements I am very grateful to Professor Chris Mitchell, for being my Supervisor and keeping me on track. His comments were always a wonderful balance in terms of shortness, being to the point and being constructive. He introduced me to the academic world in a fantastic way. Thank you so much, Chris. You were an extraordinary guide. I’m also grateful to Professor Jason Crampton for challenging and supporting me as Advisor. I have really enjoyed every talk, comment and discussion. Thank you so much, Jason. Furthermore, I have to thank Professor Bart Preneel for planting the seed of my curiosity in security and cryptology. And I thank Professor Stephen Marsh for making me feel welcome at various IFIP International Conferences on Trust Management, which provided a challenging breeding ground, and Professor Vijay Varadharajan for interesting discussions. My special thanks go to Detlef and Tina Hühnlein for inviting me to join the inspiring FutureTrust project. Professor Jörg Schwenck as well as Vladimir Mladenov and Juraj Somorovsky are thanked for their friendly collaboration and the exchange of ideas, as well as Herbert Leitold, Thomas Zefferer, Gerald Dißauer, Elif Üstündağ Soykan and Edona Fasllija. I am also indebted to Nikos Loutas for his motivating introduction to the semantic web. Finally I thank Danny De Cock for stimulating discussions. This work was conducted using the Protégé and GraphDB resources. Protégé1 is supported by grant GM10331601 from the National Institute of General Medical Sciences of the United States National Institutes of Health. Ontotext offered free use of their GraphDB database2. 1https://protege.stanford.edu/ 2https://www.ontotext.com/products/graphdb/ 5 Contents 1 Introduction 32 1.1 Motivation . 32 1.1.1 The importance of trust . 32 1.1.2 The meaning of trust . 33 1.1.3 Lack of clarity . 33 1.1.4 Ambiguity . 34 1.1.5 A lack of semantic precision . 35 1.1.6 Lack of a precise trust definition for PKI . 36 1.1.7 Trust and this thesis . 37 1.2 Research challenges . 38 1.2.1 Problem statement . 38 1.2.2 Hypothesis . 38 1.2.3 Research questions . 39 1.3 Research methodology . 39 1.4 Contributions . 40 1.5 Publications . 43 1.5.1 Publications in international conferences . 43 1.5.2 Publications from research projects . 45 1.6 Thesis Outline . 45 1.6.1 Part I Background . 45 1.6.2 Part II Modelling trustworthiness . 46 1.6.3 Part III Using trust and trustworthiness . 47 1.6.4 Appendices . 47 I Background 49 2 Trust, trustworthiness and related concepts 50 2.1 Introduction . 50 6 2.2 Social science approaches . 51 2.2.1 Sociological perspectives . 51 2.2.2 Psychological perspectives . 54 2.2.3 Legal perspectives of on-line transactions . 55 2.3 Formal science approaches . 59 2.3.1 Applying logic to trust relationships . 59 2.3.2 Computational treatments of trust . 61 2.4 Applications of trust . 63 2.4.1 Dependability and trust . 63 2.4.2 Distributed trust . 65 2.4.3 Trust and the Semantic Web . 66 2.4.4 Multidisciplinary approaches to trust . 68 2.5 Summary . 69 3 A structured literature review 73 3.1 Introduction . 73 3.2 Design of the review methodology . 74 3.2.1 Protocol . 74 3.2.2 Background to the approach . 74 3.2.3 Approach used . 75 3.3 Preparation . 76 3.3.1 Scope, purpose and questions . 77 3.3.2 Search terms . 77 3.3.3 Information sources . 80 3.3.4 Selection . 83 3.4 Execution . 84 3.4.1 Longlist criteria . 84 3.4.2 Performing the search . 84 3.4.3 Longlist and shortlist . 85 3.5 Analysis . 85 3.5.1 Surveys and reviews . 85 3.5.2 Articles . 87 3.5.3 Research topics . 104 3.6 Summary . 106 4 Logic and the Semantic Web 108 4.1 Introduction . 108 4.2 Formal logic . 109 7 4.2.1 Sets and logic — basic terminology . 109 4.2.2 First-order Logic . 110 4.3 Semantic web formalisms . 112 4.3.1 Resource Description Framework . 112 4.3.2 SPARQL . 115 4.3.3 Description Logics . 116 4.3.4 Knowledge representation and the Attributive Language AL . 121 4.3.5 The Description Logic SROIQ.D/ . 123 4.3.6 The W3C Web Ontology Language (OWL) . 126 4.4 Summary . 131 II Modelling trustworthiness 133 5 Requirements for trustworthiness 134 5.1 Introduction . 134 5.2 Definitions . 135 5.2.1 Objective and assumptions . 135 5.2.2 Defining trustworthiness . 136 5.3 Requirements from the literature survey . 136 5.3.1 SR1 Semantic definition of trustworthiness . 136 5.3.2 SR2 Reasoning about trustworthiness . 137 5.3.3 SR3 Deciding whether an entity is trustworthy . 137 5.3.4 SR4 Information for reasoning about trustworthiness . 137 5.4 Requirements from FutureTrust . 137 5.4.1 The FutureTrust project . 137 5.4.2 Requirements applicable to all participants . 138 5.4.3 Requirements applicable to participants in a FutureTrust role . 140 5.4.4 Using the FutureTrust trustworthiness requirements . ..
Recommended publications
  • Stephan Wolf GLEIF.Pdf
    @ Eurofiling Frankfurt 2016, June 2nd Visibility. Stability. Integrity. Author: Stephan Wolf – GLEIF CEO June 2, 2016 © 2016 GLEIF and/or its affiliates. All rights reserved. | June 2016 | | GLEIF unrestricted | 1 | 28 Who is GLEIF . The Global Legal Entity Identifier Foundation (GLEIF) is a Swiss foundation inaugurated in June 2014 and founded by the Financial Stability Board (FSB), overseen by 70 global regulators in the Regulatory Oversight Committee (ROC) . GLEIF Board with 18 independent directors Employee by country GER (June 2016), chaired by Gerard Hartsink AUS 1 1 USA 1 CHN 1 10 KOR 1 . GLEIF in Numbers: LBN 1 Revenue 2015 – 6,1M USD IND Number of employees – 25 PUR 1 POE 1 Partners for LEI issuing (LOUs) – 28 UK 1 2 1 Registered LEIs (May 2016) – 440.000 IRL 3 MEX NED © 2016 GLEIF and/or its affiliates. All rights reserved. | June 2016 | | GLEIF unrestricted | 2 | 28 GLEIF Mission Statement Each business should have only one identity. GLEIF manages a network of partners to provide trusted services and open, reliable data for unique legal entity identification worldwide. © 2016 GLEIF and/or its affiliates. All rights reserved. | June 2016 | | GLEIF unrestricted | 3 | 28 GLEIF Core Competencies The fundamental capabilities that set us apart and enable us to uniquely serve our constituents. GLEIF as Accreditation Agency runs a leading quality management system for its network of partners. GLEIF is recognized and trusted partner in Identification Management for legal entities. GLEIF supplies a defined and growing range of value added services to the . Accreditation public / private sector. ID Management . Service © 2016 GLEIF and/or its affiliates.
    [Show full text]
  • ISO/TC68/AG2 ‐ Standards Advisory Group
    ISO/TC68/AG2 ‐ Standards Advisory Group 24 May 2018 To: Financial Stability Board ([email protected]) Attention: To Whom It May Concern Re: Certain Governance Considerations for the Unique Product Identifier (UPI), A Key Data Element for Reporting Over The Counter (OTC) Derivative Transactions Dear Sir/ Madam, We write to you in our capacity as co‐chairs of the Standards Advisory Group (SAG) of Technical Committee 68 of the International Organization for Standardization (ISO) TC68/AG2. ISO is an independent, non‐governmental international organisation with a membership of 163 national standards bodies. Through its members, it brings together experts to share knowledge and develop voluntary, consensus‐based, market relevant International Standards that support innovation and provide solutions to global challenges. ISO/TC68 is the Technical Committee within ISO tasked with developing and maintaining international standards covering the areas of banking, securities, and other financial services. The Standards Advisory Group (SAG) as an Advisory Group of ISO/TC68 acts as an advisory sounding board to support and engage with regulators on financial services standards requirements, for the effective and efficient use and development of financial services standards, delivered using a cooperative relationship approach. The SAG enables a proactive dialogue with regulators on financial services standards matters. The SAG’s objectives are: ・ Provide a forum for mutual assistance between the global regulatory community and ISO in carrying out their respective authorities and responsibilities with respect to financial services standards; ・ Aid the adoption and promotion of consistent standards, where possible; ・ Effectively deal with common issues collectively and consistently; and ・ Encourage strong and open communication within the regulatory community and with the industry concerning financial services standards.
    [Show full text]
  • ISO 20275:2017 7B73e4209b71/Iso-20275-2017
    INTERNATIONAL ISO STANDARD 20275 First edition 2017-07 Financial services — Entity legal forms (ELF) Services financiers — Formes juridique des entités (ELF) iTeh STANDARD PREVIEW (standards.iteh.ai) ISO 20275:2017 https://standards.iteh.ai/catalog/standards/sist/94c9e19b-4370-4771-98ee- 7b73e4209b71/iso-20275-2017 Reference number ISO 20275:2017(E) © ISO 2017 ISO 20275:2017(E) iTeh STANDARD PREVIEW (standards.iteh.ai) ISO 20275:2017 https://standards.iteh.ai/catalog/standards/sist/94c9e19b-4370-4771-98ee- 7b73e4209b71/iso-20275-2017 COPYRIGHT PROTECTED DOCUMENT © ISO 2017, Published in Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form orthe by requester. any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of Ch. de Blandonnet 8 • CP 401 ISOCH-1214 copyright Vernier, office Geneva, Switzerland Tel. +41 22 749 01 11 Fax +41 22 749 09 47 www.iso.org [email protected] ii © ISO 2017 – All rights reserved ISO 20275:2017(E) Contents Page Foreword ........................................................................................................................................................................................................................................iv Introduction ..................................................................................................................................................................................................................................v
    [Show full text]
  • FIB-DM Banking Entity Code Name Comment Stereotype.Xlsx
    Financial Industry Business Data Model (FIB-DM), January 2021 BANKING SCOPE Financial Industry Business Ontology (FIBO) Development release 2020/Q4 Name Code Comment Stereotype Board fibo-be-corp-corp:BoardAgreement A formal, legally binding agreement between members of the Board of Directors of the organization Agreement has Date Of fibo-be-corp- Associative Incorporation corp:hasDateOfIncorporation The formal date of incorporation as stated in filing documents Entity has Date Of fibo-be-corp- A date on which the corporation has registered in some jurisdiction for regulatory and / or for tax Associative Registration corp:hasDateOfRegistration purposes Entity has Issued The total of a corporation's shares that are held by shareholders. A corporation can, at any time, Associative Capital fibo-be-corp-corp:hasIssuedCapital issue new shares up to the full amount of authorized share capital. Entity Nominal capital is an alternate term for authorized share capital. The maximum value of securities that a company can legally issue. This number is specified in the memorandum of association (or articles of incorporation in the US) when a company is incorporated, but can be changed later with shareholders approval. Authorized share capital may be divided into (1) Issued capital - par value of the shares actually issued, (2) Paid up capital - money received from the shareholders in exchange for has Nominal fibo-be-corp- shares, and (3) Uncalled capital - money remaining unpaid by the shareholders for the shares they Associative Capital corp:hasNominalCapital have bought. Entity 1. In the UK, the original (17th century) name for a corporation in which the liability of the owners is limited to the nominal value of the stock (shares) held by them.
    [Show full text]
  • Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux
    Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux To cite this version: Thomas Gerbet, Amrit Kumar, Cédric Lauradoux. Safe Browsing Services: to Track, Censor and Protect. [Research Report] RR-8686, INRIA. 2015. hal-01120186v1 HAL Id: hal-01120186 https://hal.inria.fr/hal-01120186v1 Submitted on 4 Mar 2015 (v1), last revised 8 Sep 2015 (v4) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux RESEARCH REPORT N° 8686 February 2015 Project-Teams PRIVATICS ISSN 0249-6399 ISRN INRIA/RR--8686--FR+ENG Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux Project-Teams PRIVATICS Research Report n° 8686 — February 2015 — 25 pages Abstract: Users often inadvertently click malicious phishing or malware website links, and in doing so they sacrifice secret information and sometimes even fully compromise their devices. The purveyors of these sites are highly motivated and hence construct intelligently scripted URLs to remain inconspicuous over the Internet. In light of the ever increasing number of such URLs, new ingenious strategies have been invented to detect them and inform the end user when he is tempted to access such a link.
    [Show full text]
  • Security and Privacy for Outsourced Computations. Amrit Kumar
    Security and privacy for outsourced computations. Amrit Kumar To cite this version: Amrit Kumar. Security and privacy for outsourced computations.. Cryptography and Security [cs.CR]. Université Grenoble Alpes, 2016. English. NNT : 2016GREAM093. tel-01687732 HAL Id: tel-01687732 https://tel.archives-ouvertes.fr/tel-01687732 Submitted on 18 Jan 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THESE` Pour obtenir le grade de DOCTEUR DE L’UNIVERSITE´ DE GRENOBLE Specialit´ e´ : Informatique Arretˆ e´ ministerial´ : 7 aoutˆ 2006 Present´ ee´ par Amrit Kumar These` dirigee´ par Pascal Lafourcade et codirigee´ par Cedric´ Lauradoux prepar´ ee´ au sein d’Equipe´ Privatics, Inria, Grenoble-Rhoneˆ Alpes et de l’Ecole´ Doctorale MSTII Security and Privacy of Hash-Based Software Applications These` soutenue publiquement le 20 octobre, 2016, devant le jury compose´ de : Mr. Refik Molva Professeur, Eurecom, President´ Mr. Gildas Avoine Professeur, INSA Rennes, Rapporteur Mr. Sebastien´ Gambs Professeur, Universite´ du Quebec´ a` Montreal,´ Rapporteur Mr. Kasper B. Rasmussen Professeur associe,´ University of Oxford, Examinateur Ms. Reihaneh Safavi-Naini Professeur, University of Calgary, Examinatrice Mr. Pascal Lafourcade Maˆıtre de Conference,´ Universite´ d’Auvergne, Directeur de these` Mr.
    [Show full text]
  • International Standard Iso 21586:2020(E)
    INTERNATIONAL ISO STANDARD 21586 First edition 2020-09 Reference data for financial services — Specification for the description of banking products or services (BPoS) Données de référence pour les services financiers — Spécification pour la description de produits ou services bancaires (BPoS) iTeh STANDARD PREVIEW (standards.iteh.ai) ISO 21586:2020 https://standards.iteh.ai/catalog/standards/sist/9a1f44a6-813d-45b8-a153- 5abbcb54e620/iso-21586-2020 Reference number ISO 21586:2020(E) © ISO 2020 ISO 21586:2020(E) iTeh STANDARD PREVIEW (standards.iteh.ai) ISO 21586:2020 https://standards.iteh.ai/catalog/standards/sist/9a1f44a6-813d-45b8-a153- 5abbcb54e620/iso-21586-2020 COPYRIGHT PROTECTED DOCUMENT © ISO 2020 All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester. ISO copyright office CP 401 • Ch. de Blandonnet 8 CH-1214 Vernier, Geneva Phone:Website: +41 www.iso.org 22 749 01 11 Email: [email protected] iiPublished in Switzerland © ISO 2020 – All rights reserved ISO 21586:2020(E) Contents Page Foreword ........................................................................................................................................................................................................................................iv
    [Show full text]
  • Catalogue Des Normes Togolaises Avril 2019.Pdf
    AGROALIMANTAIRE CTN: 1 Nbre de normes: 55 URL: Mises à jour: https://h-atn.com/ct1-agroalimentaires/ 21 Avril 2019 Annee d'adoption Année d'adoption N° REFERENCES TITRE par ISO/ARS par le togo 1 TGN ARS 461 Grains de maïs- spécification 2013 2019 2 TGN ARS 464 Riz usiné - spécification 2013 2019 3 TGN ARS 466 Produits de mouture à base de maïs - Spécification 2013 2019 4 TGN ARS 751 Produits biologiques – Code de bonnes pratiques 2013 2019 5 TGN ARS 858 Le riz paddy - Spécification 2013 2019 6 TGN ARS 859 Riz brun - Spécification 2013 2019 7 TGN ARS 864 Haricots secs - Spécification 2013 2019 8 TGN ARS 865 .Haricot mungo sec - Spécification 2014 2019 9 TGN ARS 870 Lentilles - Spécification 2014 2019 10 TGN ARS 872 Soja sec - spécification 2014 2019 11 TGN ARS 935 Farine de soja non dégraissé comestible 2014 2019 12 TGN ARS 936 Lait de soja – spécification 2014 2019 13 TGN ARS 937 Matières protéiques de soja - Spécifications 2014 2019 14 TGN ARS 938 Produits protéiques à base de soja texturé - Spécifications 2014 2019 15 TGN ARS 940 Aquaculture - Glossaire 2014 2019 16 TGN ARS 854 .Gari - Spécification 2016 2019 17 TGN ARS 1109 Production and handling of fruits and vegetables – Good agricultural practices. 2018 2019 18 TGN ARS 1106 Tilapia production aquaculture farms – Good agricultural practices 2018 2019 19 TGN ARS 323 Norme codex pour le suif comestible 1 2014 2019 20 TGN ARS 324 L’huile comestible de coco 2014 2019 21 TGN ARS 500 Engrais composés - Echantillonnage 2014 2019 22 TGN ARS 501 Engrais composés – Méthode d’essai 2014 2019
    [Show full text]
  • Annual Report & Accounts
    ANNUAL REPORT & ACCOUNTS for the year ended 31 December 2020 The Investment Association Camomile Court, 23 Camomile Street, London EC3A 7LL Registered number: 04343737 T: +44 (0)20 7831 0898 W: theia.org June 2021 © The Investment Association (2021). All rights reserved. No reproduction without permission of The Investment Association. ANNUAL REPORT AND ACCOUNTS 2020 CONTENTS Chair’s Review 2 Chief Executive’s Report 4 Strategic Report 7 How we support and promote our members 12 Directors and Officers 14 Directors’ Report 15 Statement of Directors’ Responsibilities 16 Board Activity and its Committees 17 Independent Auditors’ Report to Members of The Investment Association 20 Consolidated Statement of Income and Retained Earnings for the year ended 31 December 2020 25 Statements of Financial Position as at 31 December 2020 26 Consolidated Cash Flow Statement for the year ended 31 December 2020 27 Notes to the Consolidated Financial Statements for the year ended 31 December 2020 28 Full Members at December 2020 38 Affiliate Members at December 2020 41 Sector Members at December 2020 42 External Committees of which IA staff are members 43 1 THE INVESTMENT ASSOCIATION CHAIR’S REVIEW DELIVERING POSITIVE CHANGE IN TUMULTUOUS TIMES under management. If anything is a testament to the resilience of our industry and to the hard work that took place to deliver for our customers, this was it. This year past was my first as Chair of the Investment Association Board, a position I have been honoured to fill. Particularly at a time when our industry’s purpose – to help millions of people prepare for a more financially secure future, and to support the UK economy and its businesses to thrive – has felt even more vital.
    [Show full text]
  • The Eubusinessgraph Ontology
    Journal Title 0 (0) 1 1 IOS Press 1 1 2 2 3 3 4 The euBusinessGraph Ontology: a 4 5 5 6 6 7 Lightweight Ontology for Harmonizing 7 8 8 9 Basic Company Information 9 10 10 11 11 a;∗ b c a 12 Dumitru Roman , Vladimir Alexiev , Javier Paniagua , Brian Elvesæter , 12 a a b d 13 Bjørn Marius von Zernichow , Ahmet Soylu , Boyan Simeonov and Chris Taggart 13 14 a SINTEF AS, Norway 14 15 E-mail: {firstname.lastname}@sintef.no 15 16 b Ontotext, Bulgaria 16 17 E-mail: {firstname.lastname}@ontotext.com 17 18 c SpazioDati, Italy 18 19 E-mail: [email protected] 19 20 d OpenCorporates, UK 20 21 E-mail: [email protected] 21 22 22 23 Abstract. Company data, ranging from basic company information such as company name(s) and incorporation date to complex 23 24 balance sheets and personal data about directors and shareholders, are the foundation that many data value chains depend upon 24 in various sectors (e.g., business information, marketing and sales, etc.). Company data becomes a valuable asset when data 25 25 is collected and integrated from a variety of sources, both authoritative (e.g., national business registers) and non-authoritative 26 (e.g., company websites). Company data integration is however a difficult task primarily due to the heterogeneity and complexity 26 27 of company data, and the lack of generally agreed upon semantic descriptions of the concepts in this domain. In this article, 27 28 we introduce the euBusinessGraph ontology as a lightweight mechanism for harmonising company data for the purpose of 28 aggregating, linking, provisioning and analysing basic company data.
    [Show full text]
  • Identity, Identification and Identifiers: the Global Legal Entity Identifier System
    Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Identity, Identification and Identifiers: The Global Legal Entity Identifier System Arthur B. Kennickell 2016-103 Please cite this paper as: Kennickell, Arthur B. (2016). “Identity, Identification and Identifiers: The Global Legal Entity Identifier System,” Finance and Economics Discussion Se- ries 2016-103. Washington: Board of Governors of the Federal Reserve System, https://doi.org/10.17016/FEDS.2016.103. NOTE: Staff working papers in the Finance and Economics Discussion Series (FEDS) are preliminary materials circulated to stimulate discussion and critical comment. The analysis and conclusions set forth are those of the authors and do not indicate concurrence by other members of the research staff or the Board of Governors. References in publications to the Finance and Economics Discussion Series (other than acknowledgement) should be cleared with the author(s) to protect the tentative character of these papers. Identity, Identification and Identifiers: The Global Legal Entity Identifier System November 8, 2016 Arthur B. Kennickell Advisor Board of Governors of the Federal Reserve System Washington, DC 20551 [email protected] The views expressed in this paper are the views of the author alone and they do not necessarily reflect the views of the Board of Governors of the Federal Reserve System or its staff, or any part of the Global LEI System. I am grateful to my colleagues on the LEI Regulatory Oversight Committee and its predecessors, the board members and staff of the Global LEI Foundation, as well as numerous other public spirited people who contributed their time to develop and guide the Global LEI System.
    [Show full text]
  • A Privacy Analysis of Google and Yandex Safe Browsing Thomas Gerbet, Amrit Kumar, Cédric Lauradoux
    A Privacy Analysis of Google and Yandex Safe Browsing Thomas Gerbet, Amrit Kumar, Cédric Lauradoux To cite this version: Thomas Gerbet, Amrit Kumar, Cédric Lauradoux. A Privacy Analysis of Google and Yandex Safe Browsing. [Research Report] RR-8686, INRIA. 2015. hal-01120186v3 HAL Id: hal-01120186 https://hal.inria.fr/hal-01120186v3 Submitted on 24 Apr 2015 (v3), last revised 8 Sep 2015 (v4) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux RESEARCH REPORT N° 8686 February 2015 Project-Teams PRIVATICS ISSN 0249-6399 ISRN INRIA/RR--8686--FR+ENG Safe Browsing Services: to Track, Censor and Protect Thomas Gerbet, Amrit Kumar, Cédric Lauradoux Project-Teams PRIVATICS Research Report n° 8686 — February 2015 — 20 pages Abstract: Users often inadvertently click phishing or malware website links, and in doing so they sacrifice secret information and sometimes even fully compromise their devices. In light of the increasing number of such URLs, new strategies have been invented to detect them and prevent users from harm. At the forefront lies the Safe Browsing mechanism, which identifies unsafe URLs and notifies its users in real-time.
    [Show full text]