Two-Layer Models for Managing Distributed Authenticity and Trust

2011 ◽  
pp. 140-167 ◽  
Author(s):  
Rolf Haenni ◽  
Jacek Jonczy ◽  
Reto Kohlas

This chapter describes the difficulty of managing authenticity and trust in large open networks. Participants of such networks are usually unknown to each other. Questioning somebody’s authenticity and trustworthiness is thus a natural reflex and an important security prerequisite. The resulting problem of properly managing authenticity and trust is an emerging research topic. The chapter proposes a common conceptual framework and compares it to several existing authenticity and trust models. The goal is to increase the awareness that authenticity and trust are not separable and to promote the corresponding two-layer requirement.

SAGE Open ◽  
2019 ◽  
Vol 9 (3) ◽  
pp. 215824401987053
Author(s):  
Husik Ghulyan

This article presents a comprehensive survey of applications of Henri Lefebvre’s theorizations on space in the Turkish context. Through an intensive search and screening of the literature, this article “maps” relevant studies in terms of research topic, geographic and historical scope, and the conceptual framework and concepts used while presenting the general trends and patterns of applications of Lefebvrean space frameworks in the Turkish context. According to the main argument of the study, although there have been intensive applications of various Lefebvrean conceptualizations on space for the case of Turkey, in most of the relevant scholarship, the focus has been on the spatial triad framework or its various components, rather than on a systematic and comprehensive contextualization of the theory.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 728-745
Author(s):  
Victor Garcia-Font

Nowadays, many urban areas are developing projects that are included within the area of smart cities. These systems tend to be highly heterogeneous and involve a large number of different technologies and participants. In general, cities deploy systems to integrate data and to provide protocols to ease interconnectivity between different subsystems. However, this is not enough to build a completely interoperable smart city, where control fully belongs to city administrators and citizens. Currently, in most cases, subsystems tend to be deployed and operated by providers creating silos. Furthermore, citizens, who should be the center of these systems, are often relegated to being just another participant. In this article, we study how smart cities can move towards decentralized and user-centric systems relying on distributed ledger technologies (DLT). For this, we define a conceptual framework that describes the interaction between smart city components, their participants, and the DLT ecosystem. We analyze the trust models that are created between the participants in the most relevant use cases, and we study the suitability of the different DLT types.


2012 ◽  
pp. 63-66
Author(s):  
Péter Micskei

The cluster concept is well defined in the literature, but its agricultural adaptation has not been detailed. A method is needed, which involves experts into the study, who are able to confirm that the modell is correct and help to define the conceptual gaps. The Delphi technique is suitablefor the task. This is a well-structure, iterative future foresight technique, based on experts opinion about the research topic. The method leads to consensus by all means, but it also can have a negative outcome of the researcher's point of view, that's why we have to formulate scenarios.The aim is not statistically significant result, but to build in new ideas into the modell with brainstorming.


2010 ◽  
Vol 5 (1) ◽  
pp. 91-105 ◽  
Author(s):  
Brian Matthews ◽  
Arif Shaon ◽  
Juan Bicarregui ◽  
Catherine Jones

Software preservation has not had detailed consideration as a research topic or in practical application. In this paper, we present a conceptual framework to capture and organise the main notions of software preservation, which are required for a coherent and comprehensive approach.  This framework has three main aspects. Firstly a discussion of what it means to preserve software via a performance model which considers how a software artefact can be rebuilt from preserved components and can then be seen to be representative of the original software product. Secondly the development of a model of software artefacts, describing the basic components of all software, loosely based on the FRBR model for representing digital artefacts and their history within a library context. Finally, the definition and categorisation of the properties of software artefacts which are required to ensure that the software product has been adequately preserved. These are broken down into a number of categories and related to the concepts defined in the OAIS standard. We also discuss our experience of recording these preservation properties for a number of BADC software products, which arose from a series of case studies conducted to evaluate the software preservation framework, and also briefly describe the SPEQS toolkit, a tool to capture software preservation properties within a software development.


2019 ◽  
Author(s):  
Husik Ghulyan

This paper presents a comprehensive survey of applications of Henri Lefebvre’s theorizations on space in the Turkish context. Through an intensive search and screening of the literature, this paper ‘maps’ relevant studies in terms of research topic, geographic and historical scope and the conceptual framework and concepts used while presenting the general trends and patterns of applications of Lefebvrean space frameworks in the Turkish context. According to the main argument of the study, although there have been intensive applications of various Lefebvrean conceptualizations on space for the case of Turkey, in most of the relevant scholarship, the focus has been on the spatial triad framework or its various components, rather than on a systematic and comprehensive contextualization of the theory.


1999 ◽  
Vol 41 (1) ◽  
pp. 55-59 ◽  
Author(s):  
Charlene Butler ◽  
Henry Chambers ◽  
Murray Goldstein ◽  
Susan Harris ◽  
Judy Leach ◽  
...  

Crisis ◽  
2011 ◽  
Vol 32 (4) ◽  
pp. 204-216 ◽  
Author(s):  
M. L. Rurup ◽  
H. R. W. Pasman ◽  
J. Goedhart ◽  
D. J. H. Deeg ◽  
A. J. F. M. Kerkhof ◽  
...  

Background: Quantitative studies in several European countries showed that 10–20% of older people have or have had a wish to die. Aims: To improve our understanding of why some older people develop a wish to die. Methods: In-depth interviews with people with a wish to die (n = 31) were carried out. Through open coding and inductive analysis, we developed a conceptual framework to describe the development of death wishes. Respondents were selected from two cohort studies. Results: The wish to die had either been triggered suddenly after traumatic life events or had developed gradually after a life full of adversity, as a consequence of aging or illness, or after recurring depression. The respondents were in a situation they considered unacceptable, yet they felt they had no control to change their situation and thus progressively “gave up” trying. Recurring themes included being widowed, feeling lonely, being a victim, being dependent, and wanting to be useful. Developing thoughts about death as a positive thing or a release from problems seemed to them like a way to reclaim control. Conclusions: People who wish to die originally develop thoughts about death as a positive solution to life events or to an adverse situation, and eventually reach a balance of the wish to live and to die.


1984 ◽  
Vol 29 (12) ◽  
pp. 967-968
Author(s):  
Ernst G. Beier
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document