Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3288599.3288639acmconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Exploration and impact of blockchain-enabled adaptive non-binary trust models

Published: 04 January 2019 Publication History

Abstract

Distributed identity-, attribute- and reputation- management constitutes a major benefit that a properly designed permissioned blockchain system can provide. As a complementary built-in feature set, finely-granulated and time-window-constrained auditability mechanisms aid blockchain performance and scalability by eliminating the need to front-load core transaction processing with onerous communications and computational complexity, while still meeting the requirements of effective governance, risk & compliance management and containment against compromised entities. A prevalent aspect of this methodology is the capability to determine not only what entities should be considered trustworthy, but to what extent and with which relevant functionalities, where completion of tasks entails distributing communications across multiple components as means of addressing corroboration of claimed suitability in order to choose the most trustworthy available solution components matched against specific sub-task requirements.

References

[1]
S. Farrell, R. Housley, S. Turner, IETF RFC 5755, An Internet Attribute Certificate Profile for Authorization, January 2010. https://tools.ietf.org/html/rfc5755.
[2]
J. Camenisch, A. Lehmann, G. Neven, Electronic Identities Need Private Credentials, IEEE Security & Privacy, Volume 10, Issue 1, January-February 2012, 80--83. http://neven.org/papers/ieeecreds.html.
[3]
FIPS PUB 186--4, Digital Signature Standard (DSS), July 2013. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.
[4]
SCMS CV Pilots Documentation, Security Credential Management System Proof-of-Concept Implementation EE Requirements and Specifications Supporting SCMS Software Release 1.2.2, November 15, 2016. https://wiki.campllc.org/display/SCP.
[5]
Bitcoin Forum, A question on ECDSA signing (more efficient tx signing)?. https://bitcointalk.org/index.php?topic=258132.0.
[6]
A. Mayer, V. Mladenov, J. Schwenk, On the Security of Holder-of-Key Single Sign-On, January 2014. https://pdfs.semanticscholar.org/60e9/ee854c1ee9687646a320f15e68f1e0a61d68.pdf.
[7]
P. Grassi, M. Garcia, J. Fenton., NIST Special Publication 800--63 Revision 3, Digital Identity Guidelines, June 22, 2017. https://pages.nist.gov/800-63-3/.
[8]
D.W. Kravitz, 2016-06-23_Hyperledger Membership Services Presentation.pdf and 2016-07-13_MembershipServicesInHyperledgerFabric_Part2.pdf. https://github.com/hyperledger/hyperledger/tree/master/presentations.
[9]
IOTA Foundation. https://www.iota.org/.
[10]
D.W. Kravitz, J. Cooper, Securing User Identity and Transactions Symbiotically: IoT Meets Blockchain, IEEE Global Internet of Things Summit (GIoTS) 2017, June 2017, 1--6. https://ieeexplore.ieee.org/document/8016280/.
[11]
J. Camenisch, T. Groß, Efficient Attributes for Anonymous Credentials. https://eprint.iacr.org/2010/496.pdf.
[12]
A. Sudarsono, T. Nakanishi, N. Funabiki, Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System. https://pdfs.semanticscholar.org/a7cd/4a562bc01b5a849e2938747ca83198d2367b.pdf.
[13]
P. Vullers, Efficient Implementations of Attribute-based Credentials on Smart Cards. http://www.cs.ru.nl/~pim/publications/2014_phd_thesis.pdf.
[14]
J. Camenisch, V. Shoup, Practical Verifiable Encryption and Decryption of Discrete Logarithm, August 22, 2003. https://www.shoup.net/papers/verenc.pdf.
[15]
SCP1: Butterfly Keys, https://wiki.campllc.org/display/SCP/SCP1%3A+Butterfly+Keys.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICDCN '19: Proceedings of the 20th International Conference on Distributed Computing and Networking
January 2019
535 pages
ISBN:9781450360944
DOI:10.1145/3288599
  • General Chairs:
  • R. C. Hansdah,
  • Dilip Krishnaswamy,
  • Nitin Vaidya
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 January 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT
  2. access control
  3. blockchain
  4. cryptography
  5. identity management
  6. permissioned
  7. privacy
  8. reputation management
  9. security

Qualifiers

  • Research-article

Conference

ICDCN '19
Sponsor:
  • SIGOPS
  • Indian Institute of Science

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 184
    Total Downloads
  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Nov 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media