A Review on the Role of Blockchain Technology in the Healthcare Domain
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Design Principles for the Information Architecture of a SMET Education Digital Library
DOCUMENT RESUME ED 459 837 IR 058 373 AUTHOR Dong, Andy; Agogino, Alice M. TITLE Design Principles for the Information Architecture of a SMET Education Digital Library. SPONS AGENCY National Science Foundation, Arlington, VA. PUB DATE 2001-06-00 NOTE 10p.; In: Proceedings of the ACM/IEEE-CS Joint Conference on Digital Libraries (1st, Roanoke, Virginia, June 24-28, 2001). For entire proceedings, see IR 058 348. Figures may not reproduce well. Also funded by National SMETE Digital Library Program. CONTRACT DUE-0085878 AVAILABLE FROM Association for Computing Machinery, 1515 Broadway, New York NY 10036. Tel: 800-342-6626 (Toll Free); Tel: 212-626-0500; e-mail: [email protected]. For full text: http://wwwl.acm.org/pubs/contents/proceedings/d1/379437/. PUB TYPE Reports - Research (143) Speeches/Meeting Papers (150) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer System Design; *Design Requirements; Education; Educational Media; Educational Resources; Educational Technology; *Electronic Libraries; Information Systems; *Instructional Design; Instructional Materials ABSTRACT This implementation paper introduces principles for the information architecture of an educational digital library, principles that address the distinction between designing digital libraries for education and designing digital libraries for information retrieval in general. Design is a key element of any successful product. Good designers and their designs put technology into the hands of the user, making the product's focus comprehensible and tangible through design. As straightforward as this may appear, the design of learning technologies is often masked by the enabling technology. In fact, they often lack an explicitly stated instructional design methodology. While the technologies are important hurdles to overcome, the report advocates learning systems that empower education-driven experiences rather than technology-driven experiences. -
Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood Bryan Ford Swiss Federal Institute of Technology in Lausanne (EPFL) November 5, 2020 Abstract of enforced physical security and privacy can address the coercion and vote-buying risks that plague today’s E- Digital identity seems at first like a prerequisite for digi- voting and postal voting systems alike. We also examine tal democracy: how can we ensure “one person, one vote” other recently-proposed approaches to proof of person- online without identifying voters? But the full gamut of hood, some of which offer conveniencessuch as all-online digital identity solutions – e.g., online ID checking, bio- participation. These alternatives currently fall short of sat- metrics, self-sovereign identity, and social/trust networks isfying all the key digital personhood goals, unfortunately, – all present severe flaws in security, privacy, and trans- but offer valuable insights into the challenges we face. parency, leaving users vulnerable to exclusion, identity loss or theft, and coercion. These flaws may be insur- mountable because digital identity is a cart pulling the Contents horse. We cannot achieve digital identity secure enough to support the weight of digital democracy, until we can 1 Introduction 2 build it on a solid foundation of digital personhood meet- ing key requirements. While identity is about distinguish- 2 Goals for Digital Personhood 4 ing one person from another through attributes or affilia- tions, personhood is about giving all real people inalien- 3 Pseudonym Parties 5 able digital participation rights independent of identity, 3.1 Thebasicidea. -
Studying Social Tagging and Folksonomy: a Review and Framework
Studying Social Tagging and Folksonomy: A Review and Framework Item Type Journal Article (On-line/Unpaginated) Authors Trant, Jennifer Citation Studying Social Tagging and Folksonomy: A Review and Framework 2009-01, 10(1) Journal of Digital Information Journal Journal of Digital Information Download date 02/10/2021 03:25:18 Link to Item http://hdl.handle.net/10150/105375 Trant, Jennifer (2009) Studying Social Tagging and Folksonomy: A Review and Framework. Journal of Digital Information 10(1). Studying Social Tagging and Folksonomy: A Review and Framework J. Trant, University of Toronto / Archives & Museum Informatics 158 Lee Ave, Toronto, ON Canada M4E 2P3 jtrant [at] archimuse.com Abstract This paper reviews research into social tagging and folksonomy (as reflected in about 180 sources published through December 2007). Methods of researching the contribution of social tagging and folksonomy are described, and outstanding research questions are presented. This is a new area of research, where theoretical perspectives and relevant research methods are only now being defined. This paper provides a framework for the study of folksonomy, tagging and social tagging systems. Three broad approaches are identified, focusing first, on the folksonomy itself (and the role of tags in indexing and retrieval); secondly, on tagging (and the behaviour of users); and thirdly, on the nature of social tagging systems (as socio-technical frameworks). Keywords: Social tagging, folksonomy, tagging, literature review, research review 1. Introduction User-generated keywords – tags – have been suggested as a lightweight way of enhancing descriptions of on-line information resources, and improving their access through broader indexing. “Social Tagging” refers to the practice of publicly labeling or categorizing resources in a shared, on-line environment. -
Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: a Systematic Review
Received February 13, 2019, accepted February 27, 2019, date of publication March 21, 2019, date of current version April 13, 2019. Digital Object Identifier 10.1109/ACCESS.2019.2904181 Applicability and Appropriateness of Distributed Ledgers Consensus Protocols in Public and Private Sectors: A Systematic Review A. SHAHAAB 1, B. LIDGEY2, C. HEWAGE 1, AND I. KHAN1 1Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, CF5 2YB, U.K. 2Companies House, Cardiff, CF14 3UZ, U.K. Corresponding author: A. Shahaab ([email protected]) This work was supported by the Knowledge Economy Skills Scholarships through a major pan-Wales operation supported by the European Social Funds through the Welsh Government, and through Companies House, U.K., under Grant CMK219. ABSTRACT Advancement of consensus protocols in recent years has enabled distributed ledger technologies (DLTs) to find its application and value in sectors beyond cryptocurrencies. Here we reviewed 66 known consensus protocols and classified them into philosophical and architectural categories, also providing a visual representation. As a case study, we focus on the public sector and highlighted potential protocols. We have also listed these protocols against basic features and sector preference in a tabular format to facilitate selection. We argue that no protocol is a silver bullet, therefore should be selected carefully, considering the sector requirements and environment. INDEX TERMS Blockchain technology, consensus algorithms, distributed consensus protocols, distributed ledger technology, DLTs for public sector, distributed systems, Govtech, permissioned and permissionless blockchains. I. INTRODUCTION information across a distributed ledger. The objective of all Achieving consensus is a fundamental problem in distributed of these attempts is to achieve availability and consistency computing. -
The Role of Information Architecture in Designing a Third-Generation Library Web Site
The Role of Information Architecture in Designing a Third-Generation Library Web Site Jennifer Duncan and Wendy Holliday Library Web sites have evolved over the past decade, from simple pages with a few links to complex sites that provide direct access to hundreds of different resources. In many cases, this evolution occurs with little overall planning, often resulting in Web sites that are hard to manage and difficult for users to navigate.This article outlines the process of using Information Architecture (IA) to redesign a third-generation library Web site from the ground up.The result was a much more usable and cohesive library Web site that meets the needs of a broad range of users. n 2003, the Utah State Univer- had graphically redesigned the Web site sity (USU) Library anticipated a few times, the underlying structure the third major redesign of remained intact. The first and second their Web site. The original levels received a graphic makeover but re- design of the site simply provided basic mained mapped to years of accumulated information about library resources and pages that were not organized coherently. services. Like many library Web sites, it As Louis Rosenfeld, a pioneer in the field had grown over the years in both size and of Information Architecture, suggests, scope. By 2003, the site included several this is a common problem in the current hundred pages and provided access to electronic information environment: hundreds of electronic resources. It had grown without overall planning and it Increased scope, volume, and for- included several different graphic looks, mat types result in great content with “legacy” pages from previous de- ambiguity, muddier information signs existing alongside newer content. -
Using Information Architecture to Evaluate Digital Libraries, the Reference Librarian, 51, 124-134
FAU Institutional Repository http://purl.fcla.edu/fau/fauir This paper was submitted by the faculty of FAU Libraries. Notice: ©2010 Taylor & Francis Group, LLC. This is an electronic version of an article which is published and may be cited as: Parandjuk, J. C. (2010). Using Information Architecture to Evaluate Digital Libraries, The Reference Librarian, 51, 124-134. doi:10.1080/027638709 The Reference Librarian is available online at: http://www.tandfonline.com/doi/full/10.1080/02763870903579737 The Reference Librarian, 51:124–134, 2010 Copyright © Taylor & Francis Group, LLC ISSN: 0276-3877 print/1541-1117 online DOI: 10.1080/02763870903579737 WREF0276-38771541-1117The Reference Librarian,Librarian Vol. 51, No. 2, Feb 2009: pp. 0–0 Using Information Architecture to Evaluate Digital Libraries UsingJ. C. Parandjuk Information Architecture to Evaluate Digital Libraries JOANNE C. PARANDJUK Florida Atlantic University Libraries, Boca Raton, FL Information users face increasing amounts of digital content, some of which is held in digital library collections. Academic librarians have the dual challenge of organizing online library content and instructing users in how to find, evaluate, and use digital information. Information architecture supports evolving library services by bringing best practice principles to digital collection development. Information architects organize content with a user-centered, customer oriented approach that benefits library users in resource discovery. The Publication of Archival, Library & Museum Materials (PALMM), -
Chapter 1 Web Basics and Overview
Chapter 1 Web Basics and Overview The Web is an Internet-based distributed information system. Anyone with a computer connected to the Internet can easily retrieve information by giving a Web address or by simply clicking a mouse button. The Web is a great way to disseminate information and making it available 24/7. Information can also be collected from Web users and customers through online forms. Maintainers and administrators can control and update Web content from anywhere on the Web. All these make the Web a powerful tool for mass communication, e-business and e-commerce. Compared with TV, radio, news papers, and magazines, putting the word out on the Web is relatively simple and inexpensive. But a website is much more than such one-way communication media. It can be a virtual o±ce or store that is always open and supported by workers from anywhere. Web service companies o®er free Web space and tools to generate simple personal or even business Web pages. But, well-designed and professionally implemented websites are much more involved. Even then, expertly produced websites are still much more cost-e®ective than other means of mass communication. For business and commerce, the cost of a website is negligible when compared to building and operating a brick-and-mortar o±ce or store. Once in-place, a website is a store that never closes and that is very attractive. People take great pains in building an o±ce or store to project the right image and to serve the needs 7 8 CHAPTER 1. -
Using Ontologies for Enterprise Architecture Model Alignment
Using Ontologies for Enterprise Architecture Model Alignment Gon¸caloAntunes1, Artur Caetano1;2, Marzieh Bakhshandeh1, Rudolf Mayer3, and Jos´eBorbinha1;2 1 Instituto Superior T´ecnico, University of Lisbon, Av. Rovisco Pais 1, 1049-001 Lisboa, Portugal, 2 Information Systems Group, INESC-ID, Rua Alves Redol 9, 1000-029 Lisboa, Portugal, 3 SBA Research, Favoritenstraße 16, 1040 Wien, Austria {goncalo.antunes,artur.caetano}@ist.utl.pt Abstract. One of the primary goals of enterprise architecture aligning the business with the underlying support systems. An architecture de- scription encompasses an heterogeneous spectrum of domains, such as business processes, application components, metrics, people and tech- nological infrastructure. Views express the domain elements and their relationships from the perspective of specific concerns relevant to the system stakeholders. Thus, each view needs to be expressed in the de- scription language that best suits its concerns. However, enterprise ar- chitecture languages often specify meta-models that cross-cut distinct architectural domains. This hinders extensibility and adds complexity to the language. Ob the other hand, describing each domain through a specialized language and then integrating the multiple languages raises challenges at the level of traceability and consistency. This paper pro- poses using ontologies to integrate different enterprise architecture do- mains and to analyse the resulting models. This goal is realized through a core domain-independent language that is extended by several domain- specific languages, each focussing on a set of specific concerns. The ap- proach contributes to the alignment of the different domains while en- suring traceability and model consistency. The proposal is demonstrated through an evaluation scenario that employs ArchiMate as the domain- independent language extended with a set of domain-specific languages. -
Sybil Attacks on Identity-Augmented Proof-Of-Stake
King’s Research Portal DOI: 10.1016/j.comnet.2021.108424 Document Version Early version, also known as pre-print Link to publication record in King's Research Portal Citation for published version (APA): Platt, M., & McBurney, P. (2021). Sybil Attacks on Identity-Augmented Proof-of-Stake. COMPUTER NETWORKS , 199, [108424]. https://doi.org/10.1016/j.comnet.2021.108424 Citing this paper Please note that where the full-text provided on King's Research Portal is the Author Accepted Manuscript or Post-Print version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections. General rights Copyright and moral rights for the publications made accessible in the Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights. •Users may download and print one copy of any publication from the Research Portal for the purpose of private study or research. •You may not further distribute the material or use it for any profit-making activity or commercial gain •You may freely distribute the URL identifying the publication in the Research Portal Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. -
Coins, Clubs, and Crowds: Scaling and Decentralization in Next-Generation Blockchains
Coins, Clubs, and Crowds: Scaling and Decentralization in Next-Generation Blockchains Prof. Bryan Ford Decentralized and Distributed Systems (DEDIS) School of Information and Communications (IC) [email protected] – dedis.epfl.ch Vienna BDLT Summer School – September 3, 2019 Where there’s data, there’s risk... Access, sharing compounds risk Weakest-Link Security “You can trust us!” Shared Access Partner A Business Partner B Partner C “All of us!” A Fundamental Challenge In today’s IT systems, security is an afterthought ● Designs embody “weakest-link” security Scaling to bigger systems → weaker security ● Greater chance of any “weak link” breaking Central Databases = Attractive Targets One of three credit rating agencies in the US ● Exposed sensitive personal information about 143 million people (44% of US population) The DEDIS lab at EPFL: Mission Design, build, and deploy secure privacy-preserving Decentralized and Distributed Systems (DEDIS) • Distributed: spread widely across the Internet & world • Decentralized: independent participants, no central authority, no single points of failure or compromise Overarching theme: building decentralized systems that distribute trust widely with strongest-link security Strongest-Link Security Weakest-Link Security Turning Around the Security Game Design IT systems so that making them bigger makes their security increase instead of decrease Weakest-link Strongest-link Scalable security security Strongest-link security DEDIS Laboratory Members Bryan Ford Philipp Jovanovic Associate Professor Postdoctoral Scholar Lefteris Kokoris-Kogias Kirill Nikitin Cristina Basescu Enis Ceyhun Alp Ph.D. Student Ph.D. Student Ph.D. Student Ph.D. Student Jeff R. Allen Kelong Cong Gaylor Bosson Noémien Kocher Software Engineer Software Engineer Software Engineer Software Engineer Today’s Hot Decentralized Technology (credit: Tony Arcieri) Bitcoin (2008) First successful decentralized cryptocurrency… How to track wealth (or anything)? Things Ledgers ● Gold, beads, cash.. -
Sok: Layer-Two Blockchain Protocols
SoK: Layer-Two Blockchain Protocols Lewis Gudgeon1, Pedro Moreno-Sanchez2, Stefanie Roos3, Patrick McCorry4, and Arthur Gervais1;5;6 1 Imperial College London, United Kingdom 2 TU Wien, Austria 3 TU Delft, Netherlands 4 PISA Research, United Kingdom 5 Lucerne University of Applied Sciences and Arts, Switzerland 6 Liquidity Network, Switzerland Abstract. Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchang- ing authenticated transactions off-chain. Instead, they utilize the expen- sive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and pro- tocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated syn- chronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work. Keywords: Applied Cryptography, Blockchain Applications, Layer-Two Blockchain Protocols, Blockchain Scaling, Cryptocurrency Adoption 1 Introduction Blockchains offer a mechanism through which mutually mistrusting entities can cooperate in the absence of a trusted third party. -
D-3.1 (D-B.1) the Network of Information: Architecture and Applications
Objective FP7-ICT-2009-5-257448/D-3.1 Future Networks Project 257448 “SAIL – Scalable and Adaptable Internet Solutions” D-3.1 (D-B.1) The Network of Information: Architecture and Applications Date of preparation: 11-07-31 Revision: 1.0 Start date of Project: 10-08-01 Duration: 13-01-31 Project Coordinator: Thomas Edwall Ericsson AB Document: FP7-ICT-2009-5-257448-SAIL/D-3.1 Date: July 31, 2011 Security: Public Status: Final version Version: 1.0 Document Properties Document Number: D-3.1 Document Title: The Network of Information: Architecture and Applications Document Responsible: Dirk Kutscher (NEC) Document Editor: Petteri P¨oyh¨onen (NSN), Ove Strandberg (NSN) Bengt Ahlgren (SICS), Matteo D. Ambrosio (TI), Erik Axelsson (KTH), Lars Brown (KTH), Christian Dannewitz (UPB), Zoran Despotovic (DoCoMo), Anders E. Eriksson (EAB), Stephen Farrell (TCD), Jelena Frtunikj (DoCoMo), Massimo Gallo (FT), Bj¨orn Gr¨onvall (SICS), Claudio Imbrenda (NEC), Bruno Kauffmann (FT), Dirk Kutscher (NEC), Authors: Anders Lindgren (SICS), Henrik Lundqvist (DoCoMo), Aidan Lynch (TCD), Luca Muscariello (FT), B¨orje Ohlman (EAB), Jean Francois Peltier (FT), Karl-Ake Persson (EAB), Petteri P¨oyh¨onen (NSN), Ove Strandberg (NSN), Patrick Truong (FT), Janne Tuononen (NSN), Vinicio Vercellone (TI), Stefan Weber (TCD) Target Dissemination Level: PU Status of the Document: Final version Version: 1.0 Production Properties: Reviewers: Pedro Aranda (TID), Bj¨orn Levin (SICS) Document History: Revision Date Issued by Description 1.0 2011-07-31 Petteri P¨oyh¨onen Final version Disclaimer: This document has been produced in the context of the SAIL Project. The research leading to these results has received funding from the European Community’s Seventh Framework Programme (FP7/2010–2013) under grant agreement n◦ 257448.