دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2021 نویسندگان: Victoria L. Lemieux (editor), Chen Feng (editor) سری: ISBN (شابک) : 9783030544133, 9783030544140 ناشر: Springer سال نشر: 2021 تعداد صفحات: 169 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 3 مگابایت
در صورت تبدیل فایل کتاب Building Decentralized Trust: Multidisciplinary Perspectives on the Design of Blockchains and Distributed Ledgers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ایجاد اعتماد غیرمتمرکز: دیدگاه های چند رشته ای در مورد طراحی بلاک چین و دفتر کل توزیع شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این جلد گروهی چند رشتهای از محققان را در زمینههای مختلف از جمله علوم کامپیوتر، مهندسی، علوم آرشیو، حقوق، تجارت، روانشناسی، اقتصاد، پزشکی و موارد دیگر گرد هم میآورد تا در مورد مبادلات بین «لایههای» مختلف در طراحی استفاده از بلاک چین بحث کند. فناوری دفتر کل توزیع شده (DLT) برای اعتماد اجتماعی، اعتماد به داده ها و سوابق، و اعتماد به سیستم ها. فناوری بلاک چین به دلیل پتانسیل عمیق خود به عنوان یک زیرساخت اعتماد دیجیتال به عنوان راه حلی برای مشکل اعتماد به داده ها و سوابق و همچنین اعتماد به نهادهای اجتماعی، سیاسی و اقتصادی ظاهر شده است. Blockchain یک DLT است که در آن مجموعههای تایید شده و تایید شده از تراکنشها در بلوکهایی ذخیره میشوند که به هم متصل شدهاند تا دستکاری را دشوارتر کرده و رکوردها را غیرقابل تغییر کنند. این کتاب به کاوش و انتشار آخرین یافته ها در مورد روابط بین داده های اجتماعی-سیاسی و اقتصادی، ثبت سوابق و جنبه های فنی بلاک چین اختصاص دارد.
This volume brings together a multidisciplinary group of scholars from diverse fields including computer science, engineering, archival science, law, business, psychology, economics, medicine and more to discuss the trade-offs between different “layers” in designing the use of blockchain/Distributed Ledger Technology (DLT) for social trust, trust in data and records, and trust in systems. Blockchain technology has emerged as a solution to the problem of trust in data and records, as well as trust in social, political and economic institutions, due to its profound potential as a digital trust infrastructure. Blockchain is a DLT in which confirmed and validated sets of transactions are stored in blocks that are chained together to make tampering more difficult and render records immutable. This book is dedicated to exploring and disseminating the latest findings on the relationships between socio-political and economic data, record-keeping, and technical aspects of blockchain.
Preface Acknowledgments Contents Chapter 1: Introduction: Theorizing from Multidisciplinary Perspectives on the Design of Blockchain and Distributed Ledger Sys... 1.1 A Comprehensive Perspective: The Opportunity and Need for Blockchain and Distributed Ledger Technology Systems Integrated ... 1.2 Blockchain and DLT Systems´ Interacting Trust Layers 1.3 The Design Approach: Introducing Strategic Design as a Guiding Collaborative Framework 1.4 Interdisciplinary and Multidisciplinary Underpinnings, and the Design of the Collaborative Experience 1.5 The PWIAS RT Experience and Follow-Up Collaborative Work 1.6 Applied Reflection, Lessons Learned from the Process, and Future Applications Annex 1: Participants by Last Name Teamwork Facilitators Pedagogical Facilitators Annex 2: Agenda of Roundtable June 11th, 2019 June 12th, 2019 References Chapter 2: Blockchain Governance: De Facto (x)or Designed? 2.1 Introduction: De Facto Governance in Blockchains 2.2 The Case for a Grounded Theory of Blockchain Governance 2.3 Situating Blockchain Governance in Existing Power Structures 2.4 Blockchain Governance Analysis Framework 2.4.1 Within the Cloud: Internal Governance 2.4.1.1 Why: Values and Use Cases 2.4.1.2 Who: Actors and Stakeholders 2.4.1.3 When: Temporality and Change Over Time 2.4.1.4 What: Data, Records, and Protocols 2.4.1.5 Where: Geography of Instantiation 2.4.1.6 How: Instantiation 2.5 Conclusion References Chapter 3: Incentives to Engage Blockchain and Ecosystem Actors 3.1 Introduction 3.2 The Blockchain Ecosystem 3.2.1 Enterprise Ecosystems and Incentives for Assimilation of Blockchain Technology 3.2.1.1 Incentives, Motivation, and Information 3.2.1.2 Information Relevance to Support Awareness and Assess Capabilities 3.2.1.3 Information Relevance to Motivate Change Behaviour 3.2.1.4 Enterprise Ecosystems and Platform for Distributed Data Sharing 3.2.1.5 Incentives to Engage Stakeholders in Enterprise Ecosystem 3.2.1.6 Business Model Exploration 3.2.1.7 Overcoming Resistance 3.3 Incentives and the Business Model of Blockchain Developer/Administrator Ecosystem 3.3.1 Designing Incentive Mechanisms 3.3.2 Bitcoin Blockchain Incentive Challenges 3.3.2.1 Selfish Mining 3.3.2.2 Recentralization/Pool Mining 3.3.2.3 Token Incentives 3.3.3 Permissioned Blockchains 3.4 Trade-offs 3.5 Conclusions and Directions for Future Research 3.5.1 Conclusions 3.5.2 Future Research References Chapter 4: Balancing Security: A Moving Target 4.1 Introduction 4.1.1 Security 4.1.2 Trust in an Untrusted Environment 4.1.3 Privacy on Blockchains 4.1.4 Security as a Moving Target 4.2 Security Landscape 4.2.1 Attack Surfaces and Adversarial Goals 4.2.1.1 Network-Based Attacks 4.2.1.2 Software-Based Attacks 4.2.1.3 User-Based Attacks 4.2.2 Technical Weak Points 4.2.2.1 Attacks on the Application Layer 4.2.2.2 Attacks on the Transaction Layer 4.2.2.3 Attacks on the Consensus Layer 4.2.2.4 Attacks on the Block Data Layer 4.2.2.5 Attacks on the Network Layer 4.2.3 Records Weak Points 4.2.4 Social Weak Points 4.2.5 Failure in Governance: Regulations and Regulatory Goals 4.3 The Moving Target: Open Security Challenges of Blockchains 4.3.1 Longevity Requirements for Security of Blockchains 4.3.2 Regulation, Operation and Security 4.3.3 Trade-off Between Security and Usability 4.3.4 Decentralizing Responsibility for Data Security 4.3.5 More Complexity Means Less Security 4.3.5.1 Social Layer/Dimension 4.3.5.2 Data Records Layer/Dimension 4.3.5.3 Technological Layer/Dimension 4.4 The Constant 4.4.1 Designing for the Future 4.4.2 The Weakest Link References Chapter 5: Distributing and Democratizing Institutional Power Through Decentralization 5.1 Introduction 5.2 Concept Ambiguity 5.2.1 The Spectrum of Centralization and Decentralization 5.2.2 The Distinction Between Decentralization and Distribution 5.3 Influence of Decentralization in Blockchain 5.3.1 Influence on Data Layer: Improving Security and Disruptive Power of Data Decentralization 5.3.2 Influence Technical Layer: The Disruptive Power of System Decentralization 5.3.3 Influence Social Layer: The Disruptive Power of Transaction Decentralization 5.3.3.1 Decentralization from a Socio-Technical Perspective 5.3.3.2 Decentralization and Distributed Trust 5.3.4 Resistance to the Decentralization Process 5.4 Conclusion References Chapter 6: Blockchains and Provenance: How a Technical System for Tracing Origins, Ownership and Authenticity Can Transform So... 6.1 Introduction 6.2 Conceptualizations and Recent Applications of Provenance 6.3 Token Economics in Real-Life: Cryptocurrency and Incentives Design to Improve the Accuracy and Reliability of Data and Rec... 6.4 Blockchain and the Authenticity of Digital Records: The Concept of Digital Originals 6.5 Preservation of Provenance 6.6 The Use Case in Health 6.7 The Use Case in Banking and Finance 6.8 Conclusion References Chapter 7: Conclusion: Theorizing from Multidisciplinary Perspectives on the Design of Blockchain and Distributed Ledger Syste... 7.1 Introduction 7.2 Ontological Foundations 7.3 Refining the ``Three-Layer´´ Model as Description of DLT Systems 7.4 The Three Layer Model as a Framework for Design Alternatives 7.4.1 Governance 7.4.2 Incentives 7.4.3 Security 7.4.4 Decentralization 7.4.5 Provenance 7.4.6 Temporality 7.5 Using the Three Layer Model in the Design of DLT Systems 7.6 Towards a Mathematical Foundation for the Design of DLT Systems 7.7 Conclusion References