Topic
Trusted third party
About: Trusted third party is a research topic. Over the lifetime, 2919 publications have been published within this topic receiving 60935 citations.
Papers published on a yearly basis
Papers
More filters
•
31 Jan 2002
TL;DR: An automatic software facility operates as an intermediary between software buyers and vendors, allowing software buyers, via predefined rules associated with the software, to easily, instantly and securely purchase or obtain authorization to use software licences as discussed by the authors.
Abstract: An automatic software facility operates as an intermediary between software buyers and vendors. It allows software buyers, via predefined rules (203) associated with the software, to easily, instantly and securely purchase or obtain authorization (207) to use software licences (205). For both buyers and vendors the automatic software license facility provides increased efficiency and convenience, a stronger strategic relationship, decreased administrative burden and costs of software asset management, better reporting (209) and better payment facilities. In a preferred embodiment, a trusted third party operates the facility.
55 citations
•
TL;DR: In this paper, the authors differentiate between permissionless and permissioned blockchains and contrast their properties to those of a centrally managed database and provide a structured methodology to determine the appropriate technical solution to solve a particular application problem.
Abstract: Blockchain is being praised as a technological innovation which allows to revolutionize how society trades and interacts. This reputation is in particular attributable to its properties of allowing mutually mistrusting entities to exchange financial value and interact without relying on a trusted third party. A blockchain moreover provides an integrity protected data storage and allows to provide process transparency. In this paper we critically analyze whether a blockchain is indeed the appropriate technical solution for a particular application scenario. We differentiate between permissionless (e.g., Bitcoin/Ethereum) and permissioned (e.g. Hyperledger/Corda) blockchains and contrast their properties to those of a centrally managed database. We provide a structured methodology to determine the appropriate technical solution to solve a particular application problem. Given our methodology, we analyze in depth three use cases - Supply Chain Management, Interbank and International Payments, and Decentralized Autonomous Organizations and conclude the article with an outlook for further opportunities.
55 citations
••
07 Jun 2017
TL;DR: A distributed platform for anonymized dataset trading without any centralized trusted third party is designed and implemented using an open-source blockchain mechanism, Hyperledger Fabric, and evaluation results of the prototype system are provided.
Abstract: In this paper, we design a distributed platform for anonymized dataset trading without any centralized trusted third party. The platform consists of peers and consensus-based blockchain mechanism, and each peer acts as a data broker, data receiver, or verifier for blockchain in a data transfer transaction. A data broker collects data from data owners under their consent for data trading. The Privacy Policy Manager (PPM) manages the consent information and confirms them on behalf of data owners, when data distribution is requested from data broker. We implement a prototype system of the platform using an open-source blockchain mechanism, Hyperledger Fabric, and provide evaluation results of the prototype system.
55 citations
••
TL;DR: A new RESTful pseudonymization interface tailored for use in web applications accessed by modern web browsers that fits the requirements of web-based scenarios and allows building applications that make pseudonymization transparent to the user using ordinary web technology.
Abstract: Background
Medical research networks rely on record linkage and pseudonymization to determine which records from different sources relate to the same patient. To establish informational separation of powers, the required identifying data are redirected to a trusted third party that has, in turn, no access to medical data. This pseudonymization service receives identifying data, compares them with a list of already reported patient records and replies with a (new or existing) pseudonym. We found existing solutions to be technically outdated, complex to implement or not suitable for internet-based research infrastructures. In this article, we propose a new RESTful pseudonymization interface tailored for use in web applications accessed by modern web browsers.
55 citations
••
21 May 2002TL;DR: A new automated negotiation mechanism that allows each party to reach an agreement and allows them to reach a state that exhibits Pareto efficiency and Nash Equilibrium without knowing each other's utility function is proposed.
Abstract: The leasing of idle computing resources over the net is one way to motivate more participants to join the grid computation initiative. Since the participating parties are independent bodies, negotiation activities are required. In this research, we propose a new automated negotiation mechanism that allows each party to reach an agreement. The mechanism includes two methods: a co-evolutionary method and a game theory based method that is a trusted third party mediated game to facilitate the automation of negotiation between two participants. This mechanism allows them to reach a state that exhibits Pareto efficiency and Nash Equilibrium without knowing each other's utility function.
55 citations