D3.1 Tools Assessment Version Date: 30/06/2019 Total Number of Pages: 37 Abstract: Report on the Technical Requirements to Be Covered by the EUNOMIA Solution

D3.1 Tools Assessment Version Date: 30/06/2019 Total Number of Pages: 37 Abstract: Report on the Technical Requirements to Be Covered by the EUNOMIA Solution

INNOVATION ACTION H2020 GRANT AGREEMENT NUMBER: 825171 WP3 – Vision Materialisation and Technical Infrastructure D3.1 – Tools assessment Document Info Contractual Delivery Date: 30/06/2019 Actual Delivery Date: 30/06/2019 Responsible Beneficiary: UNIC Contributing Beneficiaries: SIV, INOV, UWA, UOG, EGR Dissemination Level: Public Version: 1.2 Type: Final This project has received funding from the European Union’s H2020 research and innovation programme under the grant agreement No 825171 ` DOCUMENT INFORMATION Document ID: D3.1 Tools assessment Version Date: 30/06/2019 Total Number of Pages: 37 Abstract: Report on the technical requirements to be covered by the EUNOMIA solution. The report presents the requirements, as well as describes the state-of-the-art of the technologies and tools involved. Keywords: Technical requirements, tools VERSION HISTORY Version Date Comments 0.1 01/06/2019 First draft of the ToC 0.2 15/06/2019 State-of-the-art 0.3 21/06/2019 Completed state-of-the-art 1.0 26/06/2019 Final draft 1.1 29/06/2019 Revision based on review 1.2 30/06/2019 Final AUTHORS Full Name Beneficiary / Organisation Role University of Nicosia UNIC Editor University of West Attica UWA Contributor SIVECO Romania SA SIV Contributor University of Greenwich UOG Contributor, Reviewer INOV INESC INOVAÇÃO INOV Contributor, Reviewer Eugen Rochko EGR Contributor REVIEWERS Full Name Beneficiary / Organisation Date INOV INESC INOVAÇÃO INOV 28/06/2019 University of Greenwich UOG 30/06/2019 Type of deliverable PUBLIC Page | 2 H2020 Grant Agreement Number: 825171 Document ID: WP2 / D2.4 EXECUTIVE SUMMARY EUNOMIA is a fully decentralised, intermediary-free and open-source solution for addressing three key challenges: (a) which social media user is the original source of a piece of information; (b) how this information has spread and been modified in an information cascade; (c) and how likely it is to be trustworthy. Work package 3 sets the basis for the technical implementation of EUNOMIA by identifying the technical requirements and producing the specifications and architecture design. WP3 also progresses with the setup of the technical infrastructures and frameworks that will allow the development, operation and evaluation of the tools and prototypes of WP4. The scope of the current deliverable 3.1 is to identify the technical requirements and the actors/services of the EUNOMIA platform. The functional and non-functional requirements were extracted and analysed in deliverable 2.4: “User needs and requirements”, as well as the actors/services. In total, 26 actors, 61 functional and 21 non-functional requirements were identified. These will guide the development of all technical components in the project directly and indirectly by informing the specifications and architecture. Also, this deliverable documents the state-of-the-art technologies to be implemented, which are: blockchain infrastructure, content and context analysis, human-as-trust-sensor and user reputation mechanism, cybersecurity and privacy framework, digital companion and peer-to-peer infrastructure. @Copyright of EUNOMIA Consortium Page iii ` TABLE OF CONTENTS DOCUMENT INFORMATION ........................................................................................................ ii VERSION HISTORY ......................................................................................................................... ii AUTHORS......................................................................................................................................... ii REVIEWERS ...................................................................................................................................... ii Executive Summary ....................................................................................................................... iii Table of Contents .......................................................................................................................... iv List of Figures ................................................................................................................................. iv List of Tables.................................................................................................................................... v List of Acronyms and Abbreviations .......................................................................................... vi 1. Introduction ............................................................................................................................ 1 1.1 Relation to Other Tasks and Deliverables .............................................................................. 1 2. State-of-the-art Review......................................................................................................... 1 2.1 Blockchain infrastructure ........................................................................................................... 1 2.2 Content and Context Analysis .................................................................................................. 4 2.3 Human-as-trust-sensor and reputation mechanism ............................................................ 8 2.4 Cybersecurity and Privacy Framework ................................................................................... 11 2.5 Digital Companion ................................................................................................................... 12 2.6 Peer-to-peer Infrastructure .................................................................................................... 17 3. Technical requirements identification .............................................................................. 20 3.1 Identified Actors ....................................................................................................................... 20 3.2 Functional Requirements ........................................................................................................ 22 3.3 Non-functional requirements ................................................................................................. 27 4. Conclusions .......................................................................................................................... 30 5. References ............................................................................................................................. 31 LIST OF FIGURES Figure 1: Samples from the Quora dataset ...................................................................................................... 10 Figure 2: Web of Trust and NewsGuard Browser extensions .................................................................... 13 Figure 3: Textbox screenshot ............................................................................................................................... 14 Type of deliverable PUBLIC Page | 4 H2020 Grant Agreement Number: 825171 Document ID: WP2 / D2.4 LIST OF TABLES Table 1: Comparison between Ethereum, Bitcoin and Hyperledger Fabric ............................................ 2 Table 2: A sample of extracted patterns and their sentiment polarity ..................................................... 6 Table 3: Sentiment analysis on a sample of opinion snippets (Twitter) ................................................... 6 Table 4: Opinion targets and their respective sentiment polarity from a sample of Twitter reviews ......................................................................................................................................................................................... 7 Table 5: High-level summary of existing platforms ........................................................................................ 8 Table 6: Cross-platform mobile development frameworks ....................................................................... 14 Table 7: Description of actors .............................................................................................................................. 20 Table 8: MoSCoW method ................................................................................................................................... 23 Table 9: Generic Functional Requirements ...................................................................................................... 23 Table 10: Functional Requirements per component ..................................................................................... 24 Table 11: ISO/IEC 25010:2011 Software Product Quality Model Sub-Categories ................................. 27 Table 12: Non-functional requirements ............................................................................................................ 28 @Copyright of EUNOMIA Consortium Page v ` LIST OF ACRONYMS AND ABBREVIATIONS Term Description BI Blockchain Infrastructure CA Content and context anal CNN Convolutional Neural Network DNS Domain name system HaTS Human-as-Trust-Sensor HRM HaTS and reputation mechanism IPFS InterPlanetary File System LSTM Long Short-Term Memory MRPC Microsoft Research Paraphrase Corpus NLP Natural language processing P2P Peer-to-peer PI Paraphrase Identification URL Uniform Resource Locator Type of deliverable PUBLIC Page | 6 H2020 Grant Agreement Number: 825171 Document ID: WP3 / D3.1 1. INTRODUCTION Work Package 3 sets the basis for the technical implementation of EUNOMIA by identifying the technical requirements. The EUNOMIA user needs and requirements will stem directly from the D2.4: Report on

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    43 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us