Skip to main content

References

  • [1] E. Karvonen, Informational Societies: Understanding the Third Industrial Revolution. Tampere, Finland: Tampere University, 2001. I
  • [2] “Navigating the fourth industrial revolution to the bottom line,” Report, Manufacturing Institute, PWC, 1997. I
  • [3] L. L. Halse and B. Jæger, “Operationalizing industry 4.0: Understanding barriers of industry 4.0 and circular economy,” in Advances in Production Management Systems. Towards Smart Production Management Systems, F. Ameri, K. E. Stecke, G. von Cieminski, and D. Kiritsis, Eds. Cham: Springer International Publishing, 2019, pp. 135–142. I
  • [4] T. Economist. (2017, May) The world’s most valuable resource is no longer oil, but data. [Online]. Available: https://www.economist.com/leaders/2017/05/06/ the-worlds-most-valuable-resource-is-no-longer-oil-but-data I
  • [5] A. Pavaloiu, “The impact of artificial intelligence on global trends,” Journal of Multidisciplinary Developments, pp. 21–37, 12 2016. I
  • [6] “The impact of artificial intelligence on work. an evidence synthesis on implications for individuals, communities, and societies,” ISBN: 978- 0-85672-626-2., British Academy, The Royal Society, 2018. I
  • [7] A. D. C. Change, T. Blair, and R. Pachauri, Avoiding dangerous climate change. Cambridge University Press, 2006. I
  • [8] V. V. Quaschning, Renewable energy and climate change. John Wiley & Sons, 2019. I
  • [9] K. D. Miller, L. Nogueira, A. B. Mariotto, J. H. Rowland, K. R. Yabroff, C. M. Alfano, A. Jemal, J. L. Kramer, and R. L. Siegel, “Cancer treatment and survivorship statistics, 2019,” CA: a cancer journal for clinicians, vol. 69, no. 5, pp. 363–385, 2019. I
  • [10] “Tech trends. beyond the digital frontier,” Article, Deloitte insights,2019. I
  • [11] “The national artificial intelligence research and development strategic plan.” Article, USA - Select Committee On Artificial Intelligence Of The National Science and Technology Council, 2019. I
  • [12] “A european approach to artificial intelligence,” Report, European Commission, 2019. I
  • [13] D. A. Ferrucci, “Introduction to “this is watson”,” IBM Journal of Research and Development, vol. 56, no. 3.4, pp. 1:1–1:15, 2012. II-A
  • [14] (2019, January) Ibm watson. enterprise ready ai. [Online]. Available: https://www.ibm.com/watson/about II-A
  • [15] Google ai platform. [Online]. Available: https://cloud.google.com/ai-platform/ II-A
  • [16] B. Burns, B. Grant, D. Oppenheimer, E. Brewer, and J. Wilkes, “Borg, omega, and kubernetes,” Commun. ACM, vol. 59, no. 5, p. 50–57, Apr. 2016. [Online]. Available: https://doi.org/10.1145/2890784 II-A
  • [17] I. Guyon, L. Sun-Hosoya, M. Boulle, H. J. Escalante, S. Escalera, ´Z. Liu, D. Jajetic, B. Ray, M. Saeed, M. Sebag et al., “Analysis of the automl challenge series,” Automated Machine Learning, p. 177, 2019. II-A
  • [18] M. Salvaris, D. Dean, and W. H. Tok, “Microsoft ai platform,” in Deep Learning with Azure. Springer, 2018, pp. 79–98. II-A
  • [19] A. Del Sole, “Introducing microsoft cognitive services,” in Microsoft Computer Vision APIs Distilled. Springer, 2018, pp. 1–4. II-A
  • [20] “Machine learning lens,” aws, Amazon, 2020. [Online]. Available: https://d1.awsstatic.com/whitepapers/architecture/ wellarchitected-Machine-Learning-Lens.pdf II-A
  • [21] SingularityNET, “Singularitynet a decentralized, open market and network for ais,” 2019. [Online]. Available: https: //public.singularitynet.io/whitepaper.pdf II-B, IV-B
  • [22] “Singularity studio,” Extension, SingularityNET, 2020. [Online]. Available: https://public.singularitynet.io/whitepaper.pdf II-B
  • [23] “Neo ecosystem,” Website, NEO, 2020. [Online]. Available: https://neo.org/ II-B
  • [24] “Eos, the next-generation, open-source blockchain protocol with industry-leading transaction speed and flexible utility,” Website, EOS,2020. [Online]. Available: https://eos.io/ II-B
  • [25] “Effect ai,” Website, Effect Ai, 2018. [Online]. Available: https://effect.ai/download/effect whitepaper.pdf II-B
  • [26] O. P. Foundation, B. GmbH, and N. Circus, “Ocean protocol:a decentralized substrate for ai data & services - technical whitepaper,”2019. [Online]. Available: https://oceanprotocol.com/tech-whitepaper. pdf II-B, X-D
  • [27] C. DeepBrain, “Deepbrain chain artificial intelligence computing platform driven by blockchain,” Whitepaper,2019. [Online]. Available: https://deepbrainchain.org/assets/pdf/DeepBrainChainWhitepaper en.pdf II-B
  • [28] C. Zednik, “Solving the black box problem: A normative framework for explainable artificial intelligence,” Springer Philosophy & Technology, 2019. II-B
  • [29] T. N. Ltd, “Thought white paper,” 2018. [Online]. Available:https://thought.live/assets/thought-white-paper.pdf II-B
  • [30] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2009.[Online]. Available: http://www.bitcoin.org/bitcoin.pdf III-A
  • [31] K. Kaneiwa and R. Mizoguchi, “Distributed reasoning with ontologies and rules in order-sorted logic programming,” SSRN Electronic Journal,2009. [Online]. Available: https://doi.org/10.2139/ssrn.3199422 III-A
  • [32] D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to elliptic curve cryptography. Springer Science & Business Media, 2006. III-A
  • [33] U. C. Schreiber and C. Mayer, The First Cell. Springer International Publishing, 2020. [Online]. Available: https://doi.org/10. 1007/978-3-030-45381-7 III-A, III-A
  • [34] W. J. Yeager and R. Y. Chen, “Distributed trust mechanism for decentralized networks,” May 22 2007, uS Patent 7,222,187. III-A
  • [35] R. Aumann and A. Brandenburger, “Epistemic conditions for nash equilibrium,” Econometrica: Journal of the Econometric Society, pp. 1161–1180, 1995. III-B
  • [36] E. Maskin, “Nash equilibrium and welfare optimality,” The Review of Economic Studies, vol. 66, no. 1, pp. 23–38, 1999. III-B, IV-C
  • [37] A. Haeberlen, A. Mislove, and P. Druschel, “Glacier: Highly durable, decentralized storage despite massive correlated failures,” in Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2, 2005, pp. 143–158. III-E
  • [38] M. Steichen, B. Fiz, R. Norvill, W. Shbair, and R. State, “Blockchainbased, decentralized access control for ipfs,” in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018, pp. 1499–1506. III-E
  • [39] Q. Zheng, Y. Li, P. Chen, and X. Dong, “An innovative ipfs-based storage model for blockchain,” in 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE, 2018, pp. 704–708. III-E
  • [40] O. Lopez-Pintado, L. Garc ´ ´ıa-Banuelos, M. Dumas, and I. Weber, ˜ “Caterpillar: A blockchain-based business process management system.” in BPM (Demos), 2017. III-E
  • [41] Y. Lu, “The blockchain: State-of-the-art and research challenges,” Journal of Industrial Information Integration, vol. 15, pp. 80–90, 2019. III-E
  • [42] F. Baiardi and M. Vanneschi, “Design of highly decentralized operating systems,” in Distributed Operating Systems, Y. Paker, J.-P. Banatre, and M. Bozyigit, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, ˘ 1987, pp. 113–145. III-F
  • [43] A. S. Tanenbaum and R. Van Renesse, “Distributed operating systems,” ACM Comput. Surv., vol. 17, no. 4, p. 419–470, Dec. 1985. [Online]. Available: https://doi.org/10.1145/6041.6074 III-F
  • [44] J. Fitzer, P. F. Menna, F. Musse, and S. Seif, “Kubernetes as a distributed operating system for multitenancy/multiuser,” Jun. 11 2020, uS Patent App. 16/216,602. III-F
  • [45] O. A. Ismael and H. Tews, “Secure communications between peers using a verified virtual trusted platform module,” Mar. 17 2020, uS Patent 10,592,678. III-F
  • [46] A. Butean, E. Pournaras, A. Tara, H. Turesson, and K. Ivkushkin, “Dynamic consensus: Increasing blockchain adaptability to enterprise applications,” in Applied Informatics and Cybernetics in Intelligent Systems, R. Silhavy, Ed. Cham: Springer International Publishing, 2020, pp. 433–442. III-F, VII-C
  • [47] J. Benet, “Ipfs-content addressed, versioned, p2p file system,” arXiv preprint arXiv:1407.3561, 2014. III-F, VI-B
  • [48] R. Kurzweil, “The law of accelerating returns,” in Alan Turing: Life and legacy of a great thinker. Springer, 2004, pp. 381–416. IV
  • [49] C. F. Camerer, Behavioral game theory: Experiments in strategic interaction. Princeton University Press, 2011. IV
  • [50] X. Kong, Q. Xu, and T. Zhu, “Dynamic evolution of knowledge sharing behavior among enterprises in the cluster innovation network based on evolutionary game theory,” Sustainability, vol. 12, no. 1, p. 75, 2020. IV
  • [51] S. F. Mjølsnes and C. Rong, “On-line e-wallet system with decentralized credential keepers,” Mobile Networks and Applications, vol. 8, no. 1, pp. 87–99, 2003. IV-A
  • [52] A. Permenev, D. Dimitrov, P. Tsankov, D. Drachsler-Cohen, and M. Vechev, “Verx: Safety verification of smart contracts,” in 2020 IEEE Symposium on Security and Privacy, SP, 2020, pp. 18–20. IV-B
  • [53] C. Egger, P. Moreno-Sanchez, and M. Maffei, “Atomic multi-channel updates with constant collateral in bitcoin-compatible payment-channel networks,” in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 801–815. IV-B
  • [54] C. Lin, N. Ma, X. Wang, and J. Chen, “Rapido: Scaling blockchain with multi-path payment channels,” Neurocomputing, 2020. IV-B
  • [55] C. Burchert, C. Decker, and R. Wattenhofer, “Scalable funding of bitcoin micropayment channel networks,” Royal Society open science, vol. 5, no. 8, p. 180089, 2018. IV-B
  • [56] C. W. Bach and A. Perea, “Generalized nash equilibrium without common belief in rationality,” Economics Letters, vol. 186, p. 108526,2020. IV-C
  • [57] A. Ozment and S. E. Schechter, “Bootstrapping the adoption of internet security protocols.” in WEIS, 2006. IV-C
  • [58] Y. Lv and T. Moscibroda, “Fair and resilient incentive tree mechanisms,” Distributed Computing, vol. 29, no. 1, pp. 1–16, 2016. IV-C
  • [59] G. Pickard, W. Pan, I. Rahwan, M. Cebrian, R. Crane, A. Madan, and A. Pentland, “Time-critical social mobilization,” Science, vol. 334, no. 6055, pp. 509–512, 2011. IV-C
  • [60] J. R. Douceur and T. Moscibroda, “Lottery trees: motivational deployment of networked systems,” in Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, 2007, pp. 121–132. IV-C
  • [61] A. Tara, A. Butean, C. Zamfirescu, and R. Learney, “An ontology model for interoperability and multi-organization data exchange,” in Artificial Intelligence and Bioinspired Computational Methods, R. Silhavy, Ed. Cham: Springer International Publishing, 2020, pp. 284–296. V-A, V-B, V-C
  • [62] P. Hofferer, “Achieving business process model interoperability using metamodels and ontologies,” 2007. V-A, VIII-B
  • [63] O. Banouar and S. Raghay, “Interoperability of information systems through ontologies: State of art,” International Journal of Computer Science and Information Security, vol. 14, no. 8, p. 392, 2016. V-A
  • [64] X. Wang, H. Zhao, and J. Zhu, “Grpc: A communication cooperation mechanism in distributed systems,” SIGOPS Oper. Syst. Rev., vol. 27, no. 3, p. 75–86, Jul. 1993. [Online]. Available: https://doi.org/10.1145/155870.155881 V-C
  • [65] P. Sharma, L. Chaufournier, P. Shenoy, and Y. C. Tay, “Containers and virtual machines at scale: A comparative study,” in Proceedings of the 17th International Middleware Conference, ser. Middleware ’16. New York, NY, USA: Association for Computing Machinery, 2016. [Online]. Available: https://doi.org/10.1145/2988336.2988337 VI
  • [66] T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, “Terra: A virtual machine-based platform for trusted computing,” in Proceedings of the nineteenth ACM symposium on Operating systems principles, 2003, pp. 193–206. VI
  • [67] “The speed of containers, the security of vms,” accessed: 15 May 2020. [Online]. Available: https://katacontainers.io VI
  • [68] “A container sandbox runtime focused on security, efficiency, and ease of use,” accessed: 15 May 2020. [Online]. Available: https://gvisor.dev VI
  • [69] V. Costan and S. Devadas, “Intel sgx explained.” IACR Cryptol. ePrint Arch., vol. 2016, no. 86, pp. 1–118, 2016. VI-A
  • [70] S. Sultan, I. Ahmad, and T. Dimitriou, “Container security: Issues, challenges, and the road ahead,” IEEE Access, vol. 7, pp. 52 976– 52 996, 2019. VI-A
  • [71] S. Shinde, D. Le Tien, S. Tople, and P. Saxena, “Panoply: Low-tcb linux applications with sgx enclaves.” in NDSS, 2017. VI-A, VI-A
  • [72] A. Baumann, M. Peinado, and G. Hunt, “Shielding applications from an untrusted cloud with haven,” ACM Transactions on Computer Systems (TOCS), vol. 33, no. 3, pp. 1–26, 2015. VI-A
  • [73] S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin, C. Priebe, J. Lind, D. Muthukumaran, D. O’keeffe, M. L. Stillwell et al., “SCONE: Secure linux containers with intel SGX,” in 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), 2016, pp. 689–703. VI-A
  • [74] C.-C. Tsai, D. E. Porter, and M. Vij, “Graphene-sgx: A practical library OS for unmodified applications on SGX,” in 2017 USENIX Annual Technical Conference (USENIXATC 17), 2017, pp. 645–658. VI-A
  • [75] D. Merkel, “Docker: lightweight linux containers for consistent development and deployment,” Linux journal, vol. 2014, no. 239, p. 2, 2014. VI-A
  • [76] T. Knauth, M. Steiner, S. Chakrabarti, L. Lei, C. Xing, and M. Vij, “Integrating remote attestation with transport layer security,” arXiv preprint arXiv:1801.05863, 2018. VI-B
  • [77] S. Johnson, V. Scarlata, C. Rozas, E. Brickell, and F. Mckeen, “Intel® software guard extensions: Epid provisioning and attestation services,” White Paper, vol. 1, no. 1-10, p. 119, 2016. VI-B, X-C
  • [78] A. Bessani, J. Sousa, and E. E. Alchieri, “State machine replication for the masses with bft-smart,” in 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE, 2014, pp. 355–362. VII-C
  • [79] M. Castro and B. Liskov, “Practical byzantine fault tolerance and proactive recovery,” ACM Trans. Comput. Syst., vol. 20, no. 4, p. 398–461, Nov. 2002. [Online]. Available: https://doi.org/10.1145/ 571637.571640 VII-C, VII-C
  • [80] P. Thakkar, S. Nathan, and B. Viswanathan, “Performance benchmarking and optimizing hyperledger fabric blockchain platform,” in 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 2018, pp. 264–276. VII-C
  • [81] J. Li, N. Li, J. Peng, H. Cui, and Z. Wu, “Energy consumption of cryptocurrency mining: A study of electricity consumption in mining cryptocurrencies,” Energy, vol. 168, pp. 160–168, 2019. VII-C
  • [82] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem,” ACM Trans. Program. Lang. Syst., vol. 4, no. 3, p. 382–401, Jul. 1982. [Online]. Available: https://doi.org/10.1145/357172.357176 VII-C
  • [83] P. Regulation, “Regulation (eu) 2016/679 of the european parliament and of the council,” Official Journal of the European Union, 2016. VII-D
  • [84] M. Finck, “Blockchains and data protection in the european union,” Eur. Data Prot. L. Rev., vol. 4, p. 17, 2018. VII-D, VII-D
  • [85] G. Kondova and J. Erbguth, “Self-sovereign identity on public blockchains and the gdpr,” in Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, pp. 342–345. VII-D
  • [86] N. B. Truong, K. Sun, G. M. Lee, and Y. Guo, “Gdpr-compliant personal data management: A blockchain-based solution,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1746–1761,2019. VII-D, X-B
  • [87] F. Dai, Q. Mo, Z. Qiang, B. Huang, W. Kou, and H. Yang, “A choreography analysis approach for microservice composition in cyberphysical-social systems,” IEEE Access, vol. 8, pp. 53 215–53 222, 2020. VIII
  • [88] A. Marrella and M. Mecella, “Cognitive business process management for adaptive cyber-physical processes,” in International Conference on Business Process Management. Springer, 2017, pp. 429–439. VIII
  • [89] I. Nadareishvili, R. Mitra, M. McLarty, and M. Amundsen, Microservice Architecture: Aligning Principles, Practices, and Culture, 1st ed. O’Reilly Media, Inc., 2016. VIII
  • [90] P. Poizat and G. Salaun, “Checking the realizability of bpmn 2.0 choreographies,” in Proceedings of the 27th Annual ACM Symposium on Applied Computing, ser. SAC ’12. New York, NY, USA: Association for Computing Machinery, 2012, p. 1927–1934. [Online]. Available: https://doi.org/10.1145/2245276.2232095 VIII-B
  • [91] R. Song, J. Vanthienen, W. Cui, Y. Wang, and L. Huang, “Contextaware bpm using iot-integrated context ontologies and iot-enhanced decision models,” in 2019 IEEE 21st Conference on Business Informatics (CBI), vol. 1. IEEE, 2019, pp. 541–550. VIII-B
  • [92] A. Fuller, Z. Fan, C. Day, and C. Barlow, “Digital twin: Enabling technologies, challenges and open research,” IEEE Access, vol. 8, pp. 108 952–108 971, 2020. VIII-C
  • [93] Y. Lu, C. Liu, I. Kevin, K. Wang, H. Huang, and X. Xu, “Digital twin-driven smart manufacturing: Connotation, reference model, applications and research issues,” Robotics and Computer-Integrated Manufacturing, vol. 61, p. 101837, 2020. VIII-C
  • [94] F. Cornelli, E. Damiani, S. D. C. Di Vimercati, S. Paraboschi, and P. Samarati, “Choosing reputable servents in a p2p network,” in Proceedings of the 11th international conference on World Wide Web, 2002, pp. 376–386. IX
  • [95] A. Josang, “Trust-based decision making for electronic transactions,” in Proceedings of the Fourth Nordic Workshop on Secure Computer Systems (NORDSEC’99). Citeseer, 1999, pp. 496–502. IX
  • [96] C. Dellarocas, “Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior,” in Proceedings of the 2nd ACM conference on Electronic commerce, 2000, pp. 150–157. IX
  • [97] A. Whitby, A. Jøsang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation systems,” in Proc. 7th Int. Workshop on Trust in Agent Societies, vol. 6, 2004, pp. 106–117. IX
  • [98] C. Wirth and M. Kolain, “Privacy by blockchain design: a blockchainenabled gdpr-compliant approach for handling personal data,” in Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET), 2018. X-A
  • [99] G. Zyskind, O. Nathan et al., “Decentralizing privacy: Using blockchain to protect personal data,” in 2015 IEEE Security and Privacy Workshops. IEEE, 2015, pp. 180–184. X-A
  • [100] C. Allen, “The path to self-sovereign identity,” Life with Alacrity, 2016. X-B
  • [101] A. Tobin and D. Reed, “The inevitable rise of self-sovereign identity,” The Sovrin Foundation, vol. 29, no. 2016, 2016. X-B
  • [102] C. Lundkvist, R. Heck, J. Torstensson, Z. Mitton, and M. Sena, “Uport:A platform for self-sovereign identity,” URL: https://whitepaper. uport. me/uPort whitepaper DRAFT20170221. pdf, 2017. X-B
  • [103] A. Ebrahimi, “Identity management service using a blockchain providing certifying transactions between devices,” Aug. 1 2017, uS Patent 9,722,790. X-B
  • [104] “Secret store,” accessed: 13 Aug 2020. [Online]. Available: https://openethereum.github.io/wiki/Secret-Store X-D
  • [105] C. Tang, “Ecdkg: A distributed key generation protocol based on elliptic curve discrete logarithm,” sE· CURECOMM, pp. 353–364,2005. X-D, X-D, X-E
  • [106] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure distributed key generation for discrete-log based cryptosystems,” Journal of Cryptology, vol. 20, no. 1, pp. 51–83, 2007. X-D
OpenfabricAI Footer