Slides of the keynote held at the BPM Blockchain Forum 2023, 13 September 2023, Utrecht, Netherlands.
Synopsis:
Multi-party business processes rely on the collaboration of various players in a decentralized setting. Blockchain technology can facilitate the automation of these processes, even in cases where trust among participants is limited. Transactions are stored in a ledger, a replica of which is retained by every node of the blockchain network. The operations saved thereby are thus publicly accessible, which benefits transparency, reliability, and persistence. Smart contracts can encode the system behavior agreed upon by the involved parties to define the behaviour of collaborative processes. Rule enforcement, traceability and non-repudiation are thus catered for, too. However, data, objects and services in the outer world are not directly accessible from within a blockchain execution evironment. On one hand, access to limited information hinders the adoption of programmable blockchains as an effective aid to process intelligence. On the other hand, transferring every bit of off-chain information on-chain is not only impractical but also undesirable, as this operation could violate typical confidentiality requirements in enterprise settings. In this talk, we discuss and explore approaches aimed at strengthening the bond between process and blockchain execution environments, balancing between knowledge sharing and secrecy preservation.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Blockchain and smart contracts: infrastructure and platformsClaudio Di Ciccio
An introductory presentation on the main concepts of blockchain technologies, with a special focus on the smart contracts. The slides supported the talk held at the Cyber 4.0 Seminar on Cyber 4.0 Seminar on “Blockchain and Smart Contracts: Concepts and applications” on 2021-03-03, virtually hosted by the Sapienza University of Rome for the Cyber 4.0 Competence Centre.
This document discusses blockchain technology and its potential impacts. It begins with a definition of blockchain as a decentralized digital ledger that records transactions across computers so that the record cannot be altered without altering subsequent blocks. It then discusses how blockchain aims to eliminate intermediaries in transactions to reduce time and costs. The rest of the document outlines various applications of blockchain beyond cryptocurrency, such as for smart contracts, decentralized applications, authorship and ownership records, commodities transactions, insurance, data management, and the Internet of Things. It envisions blockchain becoming a platform for connected systems and value chains in the future.
Blockchain and smart contracts have potential applications in the insurance sector, but the technology is still maturing. The article discusses use cases for blockchain in insurance like smart contracts for claims processing but notes the technology is still early in the hype cycle for insurance. It aims to help insurers evaluate if and how to adopt blockchain by reviewing the technology, use cases, and doing a SWOT analysis to discuss strengths, weaknesses and other factors to consider for adoption. A decision to adopt now may not show results for 3-5 years when the technology is more mature for insurance applications.
Blockchain and IoT convergence has potential benefits across many industries. IBM is working on extending private blockchains to cognitive IoT solutions. Blockchain can improve IoT features and cost efficiency through smart contracts that automatically execute transactions. However, challenges remain regarding technology, business models, legal issues, and developing agreements between many ecosystem actors. Future applications may involve peer-to-peer IoT device interactions using blockchain for security and transactions without centralized authorities.
Pragmatic applications of blockchain technologies for arts and creative organ...Adrian Gonzalez Sanchez
This document discusses pragmatic applications of blockchain technologies for arts and creative organizations. It begins with an introduction to blockchain concepts like distributed ledgers and potential application areas. Examples of blockchain use cases are provided, such as provenance tracking for diamonds and social media reputation. Specific applications for creative industries are explored, including smart contracts, royalty payments, and digital art marketplaces. The document concludes by encouraging attendees to reflect on potential opportunities for blockchain to generate revenue, savings, or enable new business lines for their own organizations.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Blockchain and smart contracts: infrastructure and platformsClaudio Di Ciccio
An introductory presentation on the main concepts of blockchain technologies, with a special focus on the smart contracts. The slides supported the talk held at the Cyber 4.0 Seminar on Cyber 4.0 Seminar on “Blockchain and Smart Contracts: Concepts and applications” on 2021-03-03, virtually hosted by the Sapienza University of Rome for the Cyber 4.0 Competence Centre.
This document discusses blockchain technology and its potential impacts. It begins with a definition of blockchain as a decentralized digital ledger that records transactions across computers so that the record cannot be altered without altering subsequent blocks. It then discusses how blockchain aims to eliminate intermediaries in transactions to reduce time and costs. The rest of the document outlines various applications of blockchain beyond cryptocurrency, such as for smart contracts, decentralized applications, authorship and ownership records, commodities transactions, insurance, data management, and the Internet of Things. It envisions blockchain becoming a platform for connected systems and value chains in the future.
Blockchain and smart contracts have potential applications in the insurance sector, but the technology is still maturing. The article discusses use cases for blockchain in insurance like smart contracts for claims processing but notes the technology is still early in the hype cycle for insurance. It aims to help insurers evaluate if and how to adopt blockchain by reviewing the technology, use cases, and doing a SWOT analysis to discuss strengths, weaknesses and other factors to consider for adoption. A decision to adopt now may not show results for 3-5 years when the technology is more mature for insurance applications.
Blockchain and IoT convergence has potential benefits across many industries. IBM is working on extending private blockchains to cognitive IoT solutions. Blockchain can improve IoT features and cost efficiency through smart contracts that automatically execute transactions. However, challenges remain regarding technology, business models, legal issues, and developing agreements between many ecosystem actors. Future applications may involve peer-to-peer IoT device interactions using blockchain for security and transactions without centralized authorities.
Pragmatic applications of blockchain technologies for arts and creative organ...Adrian Gonzalez Sanchez
This document discusses pragmatic applications of blockchain technologies for arts and creative organizations. It begins with an introduction to blockchain concepts like distributed ledgers and potential application areas. Examples of blockchain use cases are provided, such as provenance tracking for diamonds and social media reputation. Specific applications for creative industries are explored, including smart contracts, royalty payments, and digital art marketplaces. The document concludes by encouraging attendees to reflect on potential opportunities for blockchain to generate revenue, savings, or enable new business lines for their own organizations.
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...eraser Juan José Calderón
Using Blockchain as a Platform for Smart Cities
Christian Nãsulea, Stelian-Mihai Mic University of Bucharest, Romania.
ABSTRACT: Objectives: Incorporating new technologies into the development of smart cities means rethinking the way
different services are provided. From this perspective, Blockchain might represent the future of both smart cities and smart
communities as it offers new alteratives for individuals and institutions.
Prior Work: Blockchain was mainly perceived through its linkage with bitcoin, but recent developments have started
exploring the idea of using it for financial transactions, logistics and securing contracts. Tapscott & Tapscott (2016)have
acknowledged the potential the Blockchain Revolution had on redefining the idea of trust in both digital and local communities.
Blockchain technology has the ability to enhance transparency of local and regional institutions while also making it easier
to communicate sensitive data without compromising security and privacy.
Approach: We look at the different fields blockchain can have an impact on and we try to assess the viability of moving
towards an integrated platform for intermediating day-to-day activities between both institutions and individuals. We will
assess the advantages of digitizing and securing public and private data while also considering the potential risks this
process might involve.
Results: We aim to create a model of how blockchain might work in communities and assess its impact on the overall
economic and human development indicators.
Implications: Public administrators in many countries are starting to acknowledge blockchain’s potential in solving problems
for local communities our results will be a valuable starting point for developing local initiatives for using blockchain as a
platform for communications and transactions. Furthermore, a smart city must be a city where individuals can interact and
solve their issues quickly, using digital technologies for increased efficiency.
Value: Blockchain is thought to be the future of managing both public and private affairs. Countries such as Dubai, Singapore
and China are incorporating blockchain technology into developing smart cities. Blockchain makes us rethink many of the
different aspects of how communities can be organized, offering new alternatives and promising a more transparent and
efficient economic model.
Keywords: Digital Era, Economic Model, IoT, Technology
Blockchain in Digital Vienna - Technology of an innovative administrationStadt Wien
The document discusses the City of Vienna's exploration of blockchain technology through pilot projects. It outlines two initial pilots: one to securely timestamp and archive changes to open government data using blockchain notarization, and another to implement a digital food voucher system for city employees using blockchain. The city aims to learn from these pilots, establish Vienna as a blockchain hub, and find more opportunities to optimize administrative processes with the technology.
Blockchain can be used at airports and in aviation business for retail sales, ticketing, loyalty systems, identity, aircraft lifecycle management and maintenance along with source of truth for flight plan data.
This document provides an overview of blockchain technology applications in logistics and transportation. It discusses several enterprise blockchain projects involving major companies like Maersk, IBM, Walmart, and Microsoft to improve supply chain management and tracking of goods. Consortia funded by governments in countries like Germany and Finland are also mentioned as working on blockchain solutions for secure document management and data sharing across the logistics industry. The document aims to illustrate the potential of blockchain technology to increase transparency, efficiency and reduce costs in supply chain and transportation processes.
This document provides an overview of blockchain technology. It begins with definitions, explaining that blockchain is a public ledger of transactions distributed across a peer-to-peer network with no central authority. It then describes how blockchain works, including how transactions are grouped into blocks and added to the chain in a way that can never be erased. The three key pillars of blockchain - decentralization, transparency, and immutability - are also summarized. Potential applications for blockchain technology are listed across various industries. Both pros and cons of blockchain are identified. The document concludes by suggesting that blockchain will continue gaining widespread adoption as its practical applications become more established.
Blockchain is a distributed database that records all transactions in a verifiable and permanent way by achieving consensus among participants. It was first conceptualized in 2008 as the backbone technology for bitcoin. A blockchain contains a history of all transactions and blocks are linked together using cryptography, ensuring data cannot be altered retroactively. Blockchain has many applications including cryptocurrency, smart contracts, financial services, supply chain management and more. It provides advantages like verification without intermediaries, immutable and append-only data, security through cryptography, and a distributed network with no single point of failure.
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Blockchain technology and its impact on the supply chain Artur Gowin
Disruptive technologies such as Artificial Intelligence (AI), Blockchain, Virtual/Augmented Reality, or the Internet of Things (IoT), have already revolutionized almost every industry in the world. The four main trends in the automotive sector are diverse mobility, electrification, autonomous driving, and connectivity.
I invite you to read the material on how Blockchain can revolutionize the Finished Vehicle Logistics market!
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
Aztec Labs - Digital Pound Consultation Response.pdfAztecLabs
- Aztec Labs is a UK-based software company focused on developing privacy-enhancing technologies like zero-knowledge proofs (ZKPs).
- They submitted a response supporting the use of ZKPs for the digital pound as it would enable strong privacy protections in compliance with data protection laws.
- ZKPs allow one party to prove statements about encrypted data without revealing the underlying data, and could enable privacy-preserving features like anti-money laundering checks and tiered access for the digital pound.
Literature Survey on “Crowdfunding Using Blockchain”IRJET Journal
This document summarizes research on using blockchain technology for crowdfunding. It discusses how blockchain could address issues with existing crowdfunding platforms like high fees and scams by providing a decentralized, transparent, and secure system. Blockchain allows every transaction to be recorded in a distributed ledger and uses smart contracts to automate funding. The document reviews several research papers analyzing the benefits of blockchain crowdfunding systems like ICOs and IEOs over traditional models as well as potential challenges around performance, lack of standards, and unrecoverable bugs. It proposes a decentralized crowdfunding application on the Ethereum blockchain to provide investor protection without a centralized intermediary.
This document discusses next generation content technologies being developed at VTT Technical Research Centre of Finland. VTT is a multidisciplinary research organization working on applied materials, energy, ICT, and other areas. The document notes that currently most content is designed for PCs, but numerous new devices like mobile phones, e-readers, smart TVs, and more will require content to be optimized for different screens. It discusses how content can be designed to separate content from presentation to allow for dynamic formatting across devices. It also covers developing new forms of interaction like touch, gestures and speech recognition. The goal is to serve users based on their unique context through technologies like augmented reality, geolocation and smart environments.
This document discusses next generation content technologies being developed at VTT Technical Research Centre of Finland. VTT is a multidisciplinary research organization working on applied materials, energy, ICT, and other areas. The document notes that content currently focuses on PCs but future technologies need to serve many new devices like mobile, TVs, glasses, watches and digital signs. It discusses making content device-independent through separation of content and presentation and using responsive design and metadata. It also covers smart interaction technologies like touch, speech recognition and augmented reality to target content to users' contexts.
Deck presented during "BVL Webinar Blockchain" dated Aug 16, 2017. Focussing on the deployment of blockchain in supply chain management and transport logistics.
This document discusses blockchain and smart contracts. It begins with an introduction to blockchain technology and how it underlies cryptocurrencies like Bitcoin. The document then covers fundamental cryptographic tools like hash functions and public-private key cryptography. It discusses how these tools can be used to build applications like timestamping services, notary services, and state machine replication. State machine replication is described as a method for replicating computations across multiple independent processors to achieve fault tolerance. Challenges of open distributed systems like message ordering and consistency are also covered.
Blockchain technology allows for a distributed ledger of transactions and digital events that is shared among participants in a network. It allows transactions to be verified through consensus, recorded immutably on the blockchain, and provides a verifiable record of all transactions. The document discusses how blockchain works through public and private networks and provides examples of applications in supply chain management, the Internet of Things, tracking origins of goods, and smart contracts. It also covers challenges and opportunities of adopting blockchain technology.
The Six Biggest Blockchain Trends Everyone Should Know About In 2021Bernard Marr
Blockchain has been one of the most talked-about tech trends of the last few years. As with many other trends that were important before the pandemic hit, it didn't make as many headlines in 2021 as it has done previously. But development has been ongoing and the year saw continued adoption of the technology throughout many industries and sectors.
Visibility and digital art: Blockchain as an ownership layer on the Interneteraser Juan José Calderón
Visibility and digital art: Blockchain as an ownership layer on the Internet, de Masha McConaghy | Greg McMullen | Glenn Parry | Trent McConaghy | David Holtzman.
DOI: 10.1002/jsc.2146
The document summarizes a student presentation on using blockchain technology to secure IoT devices. The presentation was delivered at the Second International Conference on Advances in Engineering and Technology on September 29-30, 2022. The student discusses how blockchain could address security issues in IoT by eliminating a central server and allowing devices to securely communicate and authenticate directly on the blockchain network. The presentation covers IoT security challenges, an overview of blockchain technology, potential applications of blockchain in IoT security, and future research directions around decentralizing IoT systems with blockchain.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Measurement of Rule-based LTLf Declarative Process SpecificationsClaudio Di Ciccio
The document describes a method for calculating the probability of an Reactive Constraint (RCon) specification being satisfied, violated, or unaffected given a trace or log of event data. An RCon consists of an activation formula (φα) and target formula (φτ). The probability of a single RCon is calculated by determining the maximum likelihood estimate of the target formula occurring given the activation occurred, based on event labellings in the traces. The probability of an RCon specification (a set of RCon rules) is also defined based on the probabilities of individual RCon rules. This allows interestingness measures to be applied to entire specifications rather than just individual rules.
Contenu connexe
Similaire à Look but don’t touch: On the impalpable bond between blockchain and process
Using Blockchain as a Platform for Smart Cities. Christian Nãsulea, Stelian-M...eraser Juan José Calderón
Using Blockchain as a Platform for Smart Cities
Christian Nãsulea, Stelian-Mihai Mic University of Bucharest, Romania.
ABSTRACT: Objectives: Incorporating new technologies into the development of smart cities means rethinking the way
different services are provided. From this perspective, Blockchain might represent the future of both smart cities and smart
communities as it offers new alteratives for individuals and institutions.
Prior Work: Blockchain was mainly perceived through its linkage with bitcoin, but recent developments have started
exploring the idea of using it for financial transactions, logistics and securing contracts. Tapscott & Tapscott (2016)have
acknowledged the potential the Blockchain Revolution had on redefining the idea of trust in both digital and local communities.
Blockchain technology has the ability to enhance transparency of local and regional institutions while also making it easier
to communicate sensitive data without compromising security and privacy.
Approach: We look at the different fields blockchain can have an impact on and we try to assess the viability of moving
towards an integrated platform for intermediating day-to-day activities between both institutions and individuals. We will
assess the advantages of digitizing and securing public and private data while also considering the potential risks this
process might involve.
Results: We aim to create a model of how blockchain might work in communities and assess its impact on the overall
economic and human development indicators.
Implications: Public administrators in many countries are starting to acknowledge blockchain’s potential in solving problems
for local communities our results will be a valuable starting point for developing local initiatives for using blockchain as a
platform for communications and transactions. Furthermore, a smart city must be a city where individuals can interact and
solve their issues quickly, using digital technologies for increased efficiency.
Value: Blockchain is thought to be the future of managing both public and private affairs. Countries such as Dubai, Singapore
and China are incorporating blockchain technology into developing smart cities. Blockchain makes us rethink many of the
different aspects of how communities can be organized, offering new alternatives and promising a more transparent and
efficient economic model.
Keywords: Digital Era, Economic Model, IoT, Technology
Blockchain in Digital Vienna - Technology of an innovative administrationStadt Wien
The document discusses the City of Vienna's exploration of blockchain technology through pilot projects. It outlines two initial pilots: one to securely timestamp and archive changes to open government data using blockchain notarization, and another to implement a digital food voucher system for city employees using blockchain. The city aims to learn from these pilots, establish Vienna as a blockchain hub, and find more opportunities to optimize administrative processes with the technology.
Blockchain can be used at airports and in aviation business for retail sales, ticketing, loyalty systems, identity, aircraft lifecycle management and maintenance along with source of truth for flight plan data.
This document provides an overview of blockchain technology applications in logistics and transportation. It discusses several enterprise blockchain projects involving major companies like Maersk, IBM, Walmart, and Microsoft to improve supply chain management and tracking of goods. Consortia funded by governments in countries like Germany and Finland are also mentioned as working on blockchain solutions for secure document management and data sharing across the logistics industry. The document aims to illustrate the potential of blockchain technology to increase transparency, efficiency and reduce costs in supply chain and transportation processes.
This document provides an overview of blockchain technology. It begins with definitions, explaining that blockchain is a public ledger of transactions distributed across a peer-to-peer network with no central authority. It then describes how blockchain works, including how transactions are grouped into blocks and added to the chain in a way that can never be erased. The three key pillars of blockchain - decentralization, transparency, and immutability - are also summarized. Potential applications for blockchain technology are listed across various industries. Both pros and cons of blockchain are identified. The document concludes by suggesting that blockchain will continue gaining widespread adoption as its practical applications become more established.
Blockchain is a distributed database that records all transactions in a verifiable and permanent way by achieving consensus among participants. It was first conceptualized in 2008 as the backbone technology for bitcoin. A blockchain contains a history of all transactions and blocks are linked together using cryptography, ensuring data cannot be altered retroactively. Blockchain has many applications including cryptocurrency, smart contracts, financial services, supply chain management and more. It provides advantages like verification without intermediaries, immutable and append-only data, security through cryptography, and a distributed network with no single point of failure.
Educaterer India is an unique combination of passion driven into a hobby which makes an awesome profession. We carve the lives of enthusiastic candidates to a perfect professional who can impress upon the mindsets of the industry, while following the established traditions, can dare to set new standards to follow. We don't want you to be the part of the crowd, rather we like to make you the reason of the crowd.
Today's Effort For A Better Tomorrow
Blockchain technology and its impact on the supply chain Artur Gowin
Disruptive technologies such as Artificial Intelligence (AI), Blockchain, Virtual/Augmented Reality, or the Internet of Things (IoT), have already revolutionized almost every industry in the world. The four main trends in the automotive sector are diverse mobility, electrification, autonomous driving, and connectivity.
I invite you to read the material on how Blockchain can revolutionize the Finished Vehicle Logistics market!
Things (sensors, actuators) that connect to the
Internet either directly or via gateways. They use IoT networking
protocols like Bluetooth Low Energy, ZigBee, LoRaWAN, etc.
»
Gateway: A device that connects multiple things to the Internet
using IoT networking protocols and acts as a bridge to the
Internet.
»
IoT platform: A cloud-based service that manages connectivity,
data storage, and processing for IoT applications. It exposes
APIs for applications to access data and control things.
»
Application: Software that interacts with the IoT platform to
access data, control things, and provide value to end users.
Aztec Labs - Digital Pound Consultation Response.pdfAztecLabs
- Aztec Labs is a UK-based software company focused on developing privacy-enhancing technologies like zero-knowledge proofs (ZKPs).
- They submitted a response supporting the use of ZKPs for the digital pound as it would enable strong privacy protections in compliance with data protection laws.
- ZKPs allow one party to prove statements about encrypted data without revealing the underlying data, and could enable privacy-preserving features like anti-money laundering checks and tiered access for the digital pound.
Literature Survey on “Crowdfunding Using Blockchain”IRJET Journal
This document summarizes research on using blockchain technology for crowdfunding. It discusses how blockchain could address issues with existing crowdfunding platforms like high fees and scams by providing a decentralized, transparent, and secure system. Blockchain allows every transaction to be recorded in a distributed ledger and uses smart contracts to automate funding. The document reviews several research papers analyzing the benefits of blockchain crowdfunding systems like ICOs and IEOs over traditional models as well as potential challenges around performance, lack of standards, and unrecoverable bugs. It proposes a decentralized crowdfunding application on the Ethereum blockchain to provide investor protection without a centralized intermediary.
This document discusses next generation content technologies being developed at VTT Technical Research Centre of Finland. VTT is a multidisciplinary research organization working on applied materials, energy, ICT, and other areas. The document notes that currently most content is designed for PCs, but numerous new devices like mobile phones, e-readers, smart TVs, and more will require content to be optimized for different screens. It discusses how content can be designed to separate content from presentation to allow for dynamic formatting across devices. It also covers developing new forms of interaction like touch, gestures and speech recognition. The goal is to serve users based on their unique context through technologies like augmented reality, geolocation and smart environments.
This document discusses next generation content technologies being developed at VTT Technical Research Centre of Finland. VTT is a multidisciplinary research organization working on applied materials, energy, ICT, and other areas. The document notes that content currently focuses on PCs but future technologies need to serve many new devices like mobile, TVs, glasses, watches and digital signs. It discusses making content device-independent through separation of content and presentation and using responsive design and metadata. It also covers smart interaction technologies like touch, speech recognition and augmented reality to target content to users' contexts.
Deck presented during "BVL Webinar Blockchain" dated Aug 16, 2017. Focussing on the deployment of blockchain in supply chain management and transport logistics.
This document discusses blockchain and smart contracts. It begins with an introduction to blockchain technology and how it underlies cryptocurrencies like Bitcoin. The document then covers fundamental cryptographic tools like hash functions and public-private key cryptography. It discusses how these tools can be used to build applications like timestamping services, notary services, and state machine replication. State machine replication is described as a method for replicating computations across multiple independent processors to achieve fault tolerance. Challenges of open distributed systems like message ordering and consistency are also covered.
Blockchain technology allows for a distributed ledger of transactions and digital events that is shared among participants in a network. It allows transactions to be verified through consensus, recorded immutably on the blockchain, and provides a verifiable record of all transactions. The document discusses how blockchain works through public and private networks and provides examples of applications in supply chain management, the Internet of Things, tracking origins of goods, and smart contracts. It also covers challenges and opportunities of adopting blockchain technology.
The Six Biggest Blockchain Trends Everyone Should Know About In 2021Bernard Marr
Blockchain has been one of the most talked-about tech trends of the last few years. As with many other trends that were important before the pandemic hit, it didn't make as many headlines in 2021 as it has done previously. But development has been ongoing and the year saw continued adoption of the technology throughout many industries and sectors.
Visibility and digital art: Blockchain as an ownership layer on the Interneteraser Juan José Calderón
Visibility and digital art: Blockchain as an ownership layer on the Internet, de Masha McConaghy | Greg McMullen | Glenn Parry | Trent McConaghy | David Holtzman.
DOI: 10.1002/jsc.2146
The document summarizes a student presentation on using blockchain technology to secure IoT devices. The presentation was delivered at the Second International Conference on Advances in Engineering and Technology on September 29-30, 2022. The student discusses how blockchain could address security issues in IoT by eliminating a central server and allowing devices to securely communicate and authenticate directly on the blockchain network. The presentation covers IoT security challenges, an overview of blockchain technology, potential applications of blockchain in IoT security, and future research directions around decentralizing IoT systems with blockchain.
Similaire à Look but don’t touch: On the impalpable bond between blockchain and process (20)
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Measurement of Rule-based LTLf Declarative Process SpecificationsClaudio Di Ciccio
The document describes a method for calculating the probability of an Reactive Constraint (RCon) specification being satisfied, violated, or unaffected given a trace or log of event data. An RCon consists of an activation formula (φα) and target formula (φτ). The probability of a single RCon is calculated by determining the maximum likelihood estimate of the target formula occurring given the activation occurred, based on event labellings in the traces. The probability of an RCon specification (a set of RCon rules) is also defined based on the probabilities of individual RCon rules. This allows interestingness measures to be applied to entire specifications rather than just individual rules.
Presented at the 12th International Conference on Business Process Management (BPM 2014), 7-11 September 2014, Eindhoven, The Netherlands.
Abstract: Process discovery is the task of generating models from event logs. Mining processes that operate in an environment of high variability is an ongoing research challenge because various algorithms tend to produce spaghetti-like models. This is particularly the case when procedural models are generated. A promising direction to tackle this challenge is the usage of declarative process modelling languages like Declare, which summarise complex behaviour in a compact set of behavioural constraints. However, Declare constraints with branching are expensive to be calculated.In addition, it is often the case that hundreds of branching Declare constraints are valid for the same log, thus making, again, the discovery results unreadable. In this paper, we address these problems from a theoretical angle. More specifically, we define the class of Target- Branched Declare constraints and investigate the formal properties it exhibits. Furthermore, we present a technique for the efficient discovery of compact Target-Branched Declare models. We discuss the merits of our work through an evaluation based on a prototypical implementation using both artificial and real-world event logs.
Introduction to the declarative specification of processesClaudio Di Ciccio
The document introduces declarative process modeling notation (DECLARE) which specifies constraints for permitted behavior rather than explicit execution paths. It provides templates for constraint types like existence, activation-target relations, mutual relations, and negatives. Constraints can be used to declaratively specify a paper submission process and an invoice handling process. Compliance of process instances can be checked against the specified constraints.
Declarative Specification of Processes: Discovery and ReasoningClaudio Di Ciccio
A process describes the temporal evolution of a system. Capturing the rules that govern its control flow helps to understand the boundaries of its behaviour. The declarative specification of processes is based on the representation of those boundaries by means of constraints rooted in temporal logics. The execution dynamics can vary as long as they do not violate such constraints, which specify the conditions that require or forbid the execution of actions.
This talk revolves around the recent advancements in research concerning the discovery of, and reasoning on, the declarative specifications of processes. The discourse will include a focus on how to automatically extract the constraints from process data, and how to losslessly minimise the size of discovered constraint sets. The conclusion will illustrate open challenges and future research avenues in the field.
Extracting Event Logs for Process Mining from Data Stored on the BlockchainClaudio Di Ciccio
Presentation of the paper presented at the 2nd International Workshop on Security and Privacy-enhanced Business Process Management (SPBP’19), 2 September 2019, Vienna, Austria (pre-print available at https://easychair.org/publications/preprint/cW8l).
Abstract: The integration of business process management with blockchains across organisational borders provides a means to establish transparency of execution and auditing capabilities. To enable process analytics, though, non-trivial extraction and transformation tasks are necessary on the raw data stored in the ledger. In this paper, we describe our approach to retrieve process data from an Ethereum blockchain ledger and subsequently convert those data into an event log formatted according to the IEEE Extensible Event Stream (XES) standard. We show a proof-of-concept software artefact and its application on a data set produced by the smart contracts of a process execution engine stored on the public Ethereum blockchain network.
A blockchain can be defined as an immutable distributed ledger on which transactions exchanged between peers are recorded. Transactions are cryptographically signed and are meant to transfer digital commodities between parties. Lately, the blockchains have undergone a paradigm shift from mere electronic cash systems to a universal platform endowed with internal programming languages, on top of which decentralised applications can be built. That has been the turning point enabling the execution of inter-organisational business processes on blockchains.
In this talk, the concepts behind and around blockchains will be described, together with the current research and future directions on its usage as an infrastructure for business process management.
Blockchain based traceability of inter-organisational business processesClaudio Di Ciccio
This document discusses using blockchain technology to provide traceability of inter-organizational business processes. It describes how business processes can be executed on a blockchain using smart contracts, with each process instance and task recorded as transactions. This allows anyone to trace the execution of a process across organizations. As a case study, it examines applying this approach to trace pharmaceutical supply chains.
Log-Based Understanding of Business Processes through Temporal Logic Query Ch...Claudio Di Ciccio
Process mining is a discipline that aims at discovering, monitoring and improving real-life processes by extracting knowledge from event logs. Process discovery and conformance checking are the two main process mining tasks. Process discovery techniques can be used to learn a process model from example traces in an event log, whereas the goal of conformance checking is to compare the observed behavior in the event log with the modeled behavior. In this paper, we propose an approach based on temporal logic query checking, which is in the middle between process discovery and conformance checking. It can be used to discover those LTL-based business rules that are valid in the log, by checking against the log a (user-defined) class of rules. The proposed approach is not limited to provide a boolean answer about the validity of a business rule in the log, but it rather provides valuable diagnostics in terms of traces in which the rule is satisfied (witnesses) and traces in which the rule is violated (counterexamples). We have implemented our approach as a proof of concept and conducted a wide experimentation using both synthetic and real-life logs.
Resolving Inconsistencies and Redundancies in Declarative Process ModelsClaudio Di Ciccio
This document presents an algorithm for detecting inconsistencies and redundancies in declarative process models mined from event logs. The algorithm represents constraints as automata and uses automata operations like intersection to identify conflicts or redundant constraints. It aims to return minimal and consistent models by removing conflicting or unnecessary constraints. The algorithm is implemented in a tool called Minerful and evaluations show it can improve the quality of mined declarative models. Limitations include the effect of constraint sorting order and performance challenges with large logs. Future work includes user involvement and integration into process mining tools.
Slides of the presentation held at the Humboldt University of Berlin on 2016, December the 7th.
Abstract:
The declarative modelling of business processes is based upon the specification of behavioural rules that constrain the work-flows enactment. It is meant not to explicitly specify every possible execution path from the beginning to the end: The carry-out of the process is up to the actors, who can vary the execution dynamics as long as they do not violate the constraints imposed by the declarative model. The constraints specify the conditions that require or forbid the execution of activities, either considering them singularly or depending on the occurrence of other ones. In this talk, the recent advancements in the automated discovery of declarative control flows from event logs are discussed, together with open challenges in the field.
Semantical Vacuity Detection in Declarative Process MiningClaudio Di Ciccio
Presentation of the paper entitled “Semantical Vacuity Detection in Declarative Process Mining”
(http://dx.doi.org/10.1007/978-3-319-45348-4_10), held at BPM 2016, Rio de Janeiro, Brazil (http://bpm2016.uniriotec.br/).
A large share of the literature on process mining based on declarative process modeling languages, like DECLARE, relies on the notion of constraint activation to distinguish between the case in which a process execution recorded in event data “vacuously” satisfies a constraint, or satisfies the constraint in an “interesting way”. This fine-grained indicator is then used to decide whether a candidate constraint supported by the analyzed event log is indeed relevant or not. Unfortunately, this notion of relevance has never been formally defined, and all the proposals existing in the literature use ad-hoc definitions that are only applicable to a pre-defined set of constraint patterns. This makes existing declarative process mining technique inapplicable when the target constraint language is extensible and may contain formulae that go beyond pre-defined patterns. In this paper, we tackle this hot, open challenge and show how the notion of constraint activation and vacuous satisfaction can be captured semantically, in the case of constraints expressed in arbitrary temporal logics over finite traces. We then extend the standard automata-based approach so as to incorporate relevance-related information. We finally report on an implementation and experimentation of the approach that confirms the advantages and feasibility of our solution.
Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Tr...Claudio Di Ciccio
Presentation of the paper entitled “Detecting Flight Trajectory Anomalies and Predicting Diversions in Freight Transportation”
(http://dx.doi.org/10.1016/j.dss.2016.05.004), held at EMISA 2016, Vienna, Austria (https://aic.ai.wu.ac.at/emisa2016/).
Abstract:
Timely identifying flight diversions is a crucial aspect of efficient multi-modal transportation. When an airplane diverts, logistics providers must promptly adapt their transportation plans in order to ensure proper delivery despite such an unexpected event. In practice, the different parties in a logistics chain do not exchange real-time information related to flights. This calls for a means to detect diversions that just requires publicly available data, thus being independent of the communication between different parties. The dependence on public data results in a challenge to detect anomalous behavior without knowing the planned flight trajectory. Our work addresses this challenge by introducing a prediction model that just requires information on an airplane’s position, velocity, and intended destination. This information is used to distinguish between regular and anomalous behavior. When an airplane displays anomalous behavior for an extended period of time, the model predicts a diversion. A quantitative evaluation shows that this approach is able to detect diverting airplanes with excellent precision and recall even without knowing planned trajectories as required by related research. By utilizing the proposed prediction model, logistics companies gain a significant amount of response time for these cases.
Ensuring Model Consistency in Declarative Process DiscoveryClaudio Di Ciccio
Presentation of the paper entitled “Ensuring Model Consistency in Declarative Process Discovery” (http://dx.doi.org/10.1007/978-3-319-23063-4_9) at the 13th International Conference on Business Process Management (BPM 2015), Innsbruck, Austria.
The main theme is the description of an automated technique to detect inconsistencies within mined declarative process models.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Look but don’t touch: On the impalpable bond between blockchain and process
1. Look but don’t touch:
On the impalpable bond
between blockchain and
process
Claudio Di Ciccio | claudio.diciccio.net | claudio@diciccio.net
Presented works were funded by the SmartDeFi project, Spoke 09, SERICS (PE00000014), under
the NRRP MUR program funded by the EU – NextGenerationEU; project PINPOINT
(B87G22000450001), under the PRIN MUR program; the Cyber 4.0 project BRIE.
2. Claudio Di Ciccio /klˈaːudio di ˈt͡ʃiːtt͡ʃo/
Associate professor
Ph.D. in Computer Science and Engineering
Main research interests:
automated reasoning &
logic and computation,
applied in
blockchain architectures &
process analytics
Claudio Di Ciccio 13/09/2023
2
3. So, what is your research about?
13/09/2023
Claudio Di Ciccio
3
Thanks to Sabrina Kirrane for the photo (2019)
4. So, what is your research about?
13/09/2023
Claudio Di Ciccio
4
Thanks to Sabrina Kirrane for the photo (2019)
5. Claudio Di Ciccio /klˈaːudio di ˈt͡ʃiːtt͡ʃo/
Associate professor
Ph.D. in Computer Science and Engineering
Main research interests:
automated reasoning &
logic and computation,
applied in
blockchain architectures &
process analytics
Claudio Di Ciccio 13/09/2023
5
6. Transaction
• Transfer of (crypto)assets (Ether, Bitcoin, Algo, …)
from account A to account B
Externally Owned
Account (EOA)
Externally Owned
Account (EOA)
Digital signature
13/09/2023
Claudio Di Ciccio
9
Transaction ID: 0xfa12…40c6da
8. Amsterdam, 1856
13/09/2023
Claudio Di Ciccio
11
• About 2000 ships departed on
an annual basis
• Seafarers
numerous
a vital contribution to trade
wages paid after a journey
(always in need of credit)
• Non-bank credit markets
Shopkeepers and boarding-house
keepers as lenders
• The Discipline Act (1856)
Forbids the use of seafarers’ wages
as redemption payments
Image source: https://www.istockphoto.com/nl/vector/amsterdam-in-the-
19th-century-gm538063610-95625387
9. The ledger of the
water bailiff’s
13/09/2023
Claudio Di Ciccio
12
• The Discipline Act prescribed
that lenders had to present
their unredeemed IOUs to the
water bailiff’s during the month
of July 1856
• Every IOU recorded basic
information, including:
the date on which it was entered
the names of lender and borrower
the unredeemed amount
• 13,708 loans were registered in
a 443-page ledger
A hand-drawn ink lithography of men writing a ledger in the water bailiff's
office in 1856 (DALL-E, https://openai.com/dall-e-2/)
10. Block
• Blocks group and collate transactions
• The order matters!
13/09/2023
Claudio Di Ciccio
13
11. Hashing the previous block for immutability
• Blocks refer back to direct predecessors via hashing
• The order matters!
13/09/2023
Claudio Di Ciccio
14
13. Centralised ledger
13/09/2023
Claudio Di Ciccio
16
“In Amsterdam, the water bailiff’s office was
located in the […] middle of one of the
seafarers’ quarters […] open for registering
IOUs six days per week.
On one occasion, clerks […] worked
overtime on a Sunday: presumably
because the company of H. Lond, one of
the largest lenders in town, had delivered its
1314 unredeemed IOUs the day before and
they did not want to start the new week with
such a backlog”
15. Private|public / Permissioned|permissionless
Transactability / visibility
Private Public
Consensus
Permissionless
Selected nodes can
transact and view,
all nodes can
participate in consensus
Every node can
transact and view,
participate in consensus
Permissioned
Selected nodes can
transact and view, or
participate in consensus
Every node can
transact and view,
selected nodes
participate in consensus
13/09/2023
Claudio Di Ciccio
18
Anderberg et al. “Blockchain Now And Tomorrow” (2019) http://dx.doi.org/10.2760/901029
16. “A universal platform with internal
programming language, so that everyone
could write any app”
[V. Buterin]
13/09/2023
19
Claudio
Di
Ciccio
From a peer-to-peer electronic cash system
to a programmable distributed environment
17. Smart Contracts
13/09/2023
Claudio Di Ciccio
20
• Smart Contracts in Ethereum
live in the Ethereum environment
execute a function when called
have direct control over their own
balance and key/value storage
exhibit a behaviour that is fully
specified by their code
18. 13/09/2023
Claudio Di Ciccio
21
Where are Smart Contracts
executed?
First on the mining nodes.
Then, potentially, on every node!
Only absolutely needed
instructions should be in the code!
The polygraph machine
19. Expressive power of
smart contracts
13/09/2023
Claudio Di Ciccio
22
• Variants exist
• Solidity is a Turing-complete
language for the Ethereum
blockchain
• Smart contracts can potentially
run any computable algorithm
Picture: https://doi.org/10.1093/ref:odnb/36578
20. A programmable distributed environment
Input encoded data.
Smart Contract
Account
13/09/2023
Claudio Di Ciccio
23
New
Smart Contract
Account
New address
Smart contract code to be deployed
Invoking a smart
contract function
Deploying a new
smart contract
Execution is not
externally
stoppable!
21. From high-level code to bytecode to bits and bytes
13/09/2023
Claudio Di Ciccio
24
22. A programmable distributed environment
Input encoded data.
Smart Contract
Account
13/09/2023
Claudio Di Ciccio
25
New
Smart Contract
Account
New address
Smart contract code to be deployed
Invoking a smart
contract function
Deploying a new
smart contract
Execution is not
externally
stoppable!
23. Execution is not for free
(most of all, in public blockchains)
13/09/2023
Claudio Di Ciccio
26
Wood , “Ethereum: A secure decentralised generalised transaction ledger” (2014), https://ethereum.github.com/yellowpaper/paper.pdf
24. A programmable distributed environment
Input encoded data.
Smart Contract
Account
13/09/2023
Claudio Di Ciccio
27
New
Smart Contract
Account
New address
Smart contract code to be deployed
Invoking a smart
contract function
Deploying a new
smart contract
Execution is not
externally
stoppable!
Gas price (execution costs)
Gas price (execution costs)
28. Advantages and connection to processes
• Smart contracts → Programmability → Process rule enforcing
• Transactions → Asset transfer & function invocation → Process execution
• Distributed store → Data persistency → Process monitoring
• Ledger → Transaction ordering → Logging
• Hashing → Robustness → Secure storage
• Signatures → Authentication → Non-repudiability
• Consensus → Eventual consistency → Traceability
13/09/2023
Claudio Di Ciccio
32
Images: Left: https://doi.org/10.1145/3183367; right: https://www.dagstuhl.de/en/seminars/seminar-calendar/seminar-details/18332
Layer of trust
even in a
regime of
partial trust
among actors
29. Executing inter-organisational processes on the
Blockchain: A model-driven approach
D.C, Cecconi, A., Dumas, M., et al. (2019), “Blockchain support for collaborative business processes”
13/09/2023
Claudio Di Ciccio
33
30. Executing inter-organisational processes on the
Blockchain: A model-driven approach
Caterpillar Lorikeet
13/09/2023
Claudio Di Ciccio
34
ChorChain
D.C, Cecconi, Dumas et al. Blockchain support for collaborative business processes. Informatik Spektrum pp. 1–9 (May 2019)
López-Pintado, García-Bañuelos, Dumas, Weber. Caterpillar: A blockchain-based business process management system. In: BPM Demos. CEUR.ws, 2017.
Tran, Lu, Weber. Lorikeet: A Model-Driven Engineering Tool for Blockchain-Based Business Process Execution and Asset. In: BPM Demos. CEUR.ws, 2018.
Corradini, Marcelletti, Morichetta, Polini, Re, Tiezzi: Engineering Trustable and Auditable Choreography-based Systems Using Blockchain. ACM TMIS 13(3), 2022.
31. Tracking execution
13/09/2023
Claudio Di Ciccio
35
D.C. et al. Blockchain-Based Traceability of Inter-organisational Business Processes. In: BMSD. Springer, 2018.
40. Objects are central in process management
13/09/2023
Claudio Di Ciccio
46
Screenshots captured from: https://www.tf-pm.org/resources/oced-standard; https://www.ocel-standard.org/; https://objects2023.github.io/
44. The order matters in blockchain-enabled processes
13/09/2023
Claudio Di Ciccio
50
Marco Montali presents “Reasoning about Knowledge in BPM: A Systematic Approach” at FM-BPM 2023 (BPM 2023, Utrecht)
46. How about the real world?
Oracles: From on-chain to off-chain and vice versa
13/09/2023
52
Claudio
Di
Ciccio
47. The Oracle
13/09/2023
Claudio Di Ciccio
53
Foundational Oracle Patterns: Connecting Blockchain to the Off-Chain World. BPM (Blockchain and RPA Forum) 2020: 35-51
DB
48. The Oracle
13/09/2023
Claudio Di Ciccio
56
Foundational Oracle Patterns: Connecting Blockchain to the Off-Chain World. BPM (Blockchain and RPA Forum) 2020: 35-51
DB
ISO/TC 307, ISO/TR 2345: “[A] DLT Oracle [is a] service that updates a distributed
ledger using data from outside the distributed ledger system”. (2019)
Previous literature: oracles as off-chain information providers.
We see oracles as a bridge
between the on-chain and off-chain worlds.
49. Oracle patterns: Overview
13/09/2023
Claudio Di Ciccio
57
Foundational Oracle Patterns: Connecting Blockchain to the Off-Chain World. BPM (Blockchain and RPA Forum) 2020: 35-51
50. Decentralised oracles
13/09/2023
Claudio Di Ciccio
58
Enhancing Blockchain-Based Processes with Decentralized Oracles. In: BPM Blockchain and RPA Forum 2021, 102-118, Springer.
51. Decentralised oracles (example: pull-in)
13/09/2023
Claudio Di Ciccio
59
Enhancing Blockchain-Based Processes with Decentralized Oracles. In: BPM Blockchain and RPA Forum 2021, 102-118, Springer.
52. Decentralised oracles (example: pull-in)
13/09/2023
Claudio Di Ciccio
60
Enhancing Blockchain-Based Processes with Decentralized Oracles. In: BPM Blockchain and RPA Forum 2021, 102-118, Springer.
Credit institute 1
Decentralized
oracle
Credit institute 3
Credit institute 2
Smart
contract
53. About privity
• Albeit very costly, we could inject all the
information we need on-chain.
• Even if we were able to inject all the data
in the world on chain, would we like the
idea?
• “Privity strives for limiting the sharing of
information within a contract to those
parties of a contract who have a
contractual need to know”
13/09/2023
Claudio Di Ciccio
61
Köpke, Franceschetti, Eder: Balancing Privity and Enforceability of BPM-Based Smart Contracts on Blockchains. BPM (Blockchain and CEE Forum) 2019: 87-102
54. While collaborators cooperate…
13/09/2023
Claudio Di Ciccio
62
Signing of the Peace Protocol Between Spain and the United States, August 12, 1898
(source: https://library.whitehousehistory.org/fotoweb/archives/5017-Digital-Library/Main%20Index/Artwork/520.tif.info)
55. … the whole network observes
13/09/2023
Claudio Di Ciccio
63
Scene from The Truman Show (1998). Image source: https://redeemingculture.com/film/drama/4106-the-truman-show-empathy-and-reality
57. Fix this image in your memory
13/09/2023
Claudio Di Ciccio
65
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
58. Is this the same image?
13/09/2023
Claudio Di Ciccio
66
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
59. Validation v. understanding
13/09/2023
Claudio Di Ciccio
67
Image source: https://www.makinggameofthrones.com/production-diary/2013/5/29/leeches-dragons-and-a-bear-behind-the-scenes-of-episodes-307.html
60. Business Process Model and Notation (BPMN)
collaboration diagram
13/09/2023
Claudio Di Ciccio
68
anufacturer
Production order
set up
Order parts
ill of materials
echanical
parts
supplier
ill of materials
received
Electronic
parts
supplier
ill of materials
received
61. The message, in clear
(as seen by the manufacturer)
13/09/2023
Claudio Di Ciccio
69
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
62. The message
(as seen by external parties)
13/09/2023
Claudio Di Ciccio
70
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
63. The message
(as seen by the electronic parts supplier)
13/09/2023
Claudio Di Ciccio
71
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
64. The message
(as seen by the mechanical parts supplier)
13/09/2023
Claudio Di Ciccio
72
0xfd9ffe3578a42d81c4684bd47e6575d9a8f10cc6dab984bd7e19ee0dbacb6287
Hash:
65. Hence the name: CAKE
13/09/2023
Claudio Di Ciccio
73
Image source: https://heriots.co.uk/products/pistachio
67. InterPlanetary File System (IPFS)
13/09/2023
Claudio Di Ciccio
76
Distributed system for the storage and access to files
Content-addressing to uniquely identify each file in the network
The resource locator is derived from the content hash
Files scattered among several nodes
Distributed Hash Table (DHT) at its core
68. CP-ABE
• Attribute-Based Encryption (ABE): type of public-key encryption
• Ciphertext-Policy ABE (CP):
We associate roles and process instance ID with attributes
(propositional literals)
Messages are associated with policies
(propositional formulae on attributes)
• Attributes:
14548487, Supplier, Electronics, Electronics, Manufacturer
• Policy:
14548487 AND (Manufacturer OR (Supplier AND Electronics))
13/09/2023
Claudio Di Ciccio
77
Process
instance ID
Roles
78. Q&A
• Why a certifier?
With signatures, you can prove that “you are you”
Without a certifier, you cannot prove that what you say is true
• Who forges the keys?
A delegated key manager
• One certifier, one key manager. What about decentralisation?
Right…
• Can you integrate your technique with a BPMS?
Not yet but…
13/09/2023
Claudio Di Ciccio
87
Marangone, D.C:, Weber: Fine-Grained Data Access Control for Collaborative Process Execution on Blockchain. BPM (Blockchain and RPA Forum) 2022: 51-67
79. Room for improvement
13/09/2023
Claudio Di Ciccio
88
Marangone, D.C., Friolo, Nemmi, Venturi, Weber: MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution (2023)
Multi-Authority Approach to Transaction Systems for Interoperating Applications
80. The new architecture: MARTSIA
13/09/2023
Claudio Di Ciccio
89
Marangone, D.C., Friolo, Nemmi, Venturi, Weber: MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution (2023)
1. Key management 2. Data exchange
0. Initialisation
Push-
inbound
oracle
Pull-
outbound
oracle
82. More expressive policies
13/09/2023
Claudio Di Ciccio
91
Only authority A
can release the
decryption key part
that enable
Customs
At least two
authorities are
necessary to forge
the key part of an
actor involved in
case 43175279
Any authority
can generate
the key part
for a
Supplier
83. Room for improvement
13/09/2023
Claudio Di Ciccio
92
[14] Marangone, D.C., Friolo, Nemmi, Venturi, Weber: MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution (2023)
Next: Marangone, D.C., Friolo, Nemmi, Venturi, Weber: Enabling Data Confidentiality with Public Blockchains (2023)
• Who deploys the smart contracts? Does this work only with Ethereum?
Huh…
84. The attribute certifier should not be a single node!
13/09/2023
Claudio Di Ciccio
93
Marangone, D.C., Friolo, Nemmi, Venturi, Weber: Enabling Data Confidentiality with Public Blockchains (2023)
2. Init 3. Key management
1. System boot 4. Data exchange
87. Why are prices in Gwei?
13/09/2023
Claudio Di Ciccio
96
ETH/EUR exchange Gas price on the Ropsten testnet
88. 13/09/2023
Claudio Di Ciccio
97
Open challenges
• Revoke access to data
Check out the InterPlanetary Name System
• Let Smart Contracts use with off-chain data via pull-inbound oracles
• Test with real-world multi-party business processes in production
• Extending the policy language with primitives for aggregating and
manipulating data
• …
89. Look but don’t touch:
On the impalpable bond
between blockchain and
process
Claudio Di Ciccio | claudio.diciccio.net | claudio@diciccio.net
Presented works were funded by the SmartDeFi project, Spoke 09, SERICS (PE00000014), under
the NRRP MUR program funded by the EU – NextGenerationEU; project PINPOINT
(B87G22000450001), under the PRIN MUR program; the Cyber 4.0 project BRIE.