<div dir="ltr"><div dir="ltr"><div dir="ltr"><p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Dear members of the
Liberationtech mailing list,</span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Regarding secure
information sharing as required in IoT and AI for supply chain management (e.g.
Industrie 4.0) and asked by regulations such as GDPR, please let me draw your
attention to this latest paper:</span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Competitive Compliance
with Blockchain</span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">It has been presented at
the 3<sup>rd</sup> Int. Workshop on Security, Privacy, and Trust in the
Internet of Things (SPT-IoT) in conjunction with IEEE PerCom 2019 in Kyoto,
Japan.</span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Abstract</span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Authentication is
essential for sharing information in IoT and its secondary use with AI-capable
machines. The aim is to support humans in optimizing risk of supply chains for
industrial manufacturing and service provisioning in a timely manner. The
ultimate aim is sustainability. The problem for deciding on authentication is
probably imperfect information on compliance. Its asymmetric implications of
the meaning of contracts for secure information sharing may cause
vulnerability of data breach and misuse. A traditional way to avoid harm
of that asymmetry requires authentic and consistent sharing of audit
information on violation of a certification policy to a centralized audit
intelligence. This information sharing is, however, subject to the problem
of single point of failure of the centralized audit intelligence. With our work
on Security by Design, we show a non-central approach of clarifying
accountability to reduce the risk caused by asymmetric implications of the
meaning of contracts on authentication. Our signaling and screening scheme
SK4SC provides personal digital evidences on compliance to multilateral
policies on using information or in other words on trustworthiness. Blockchains
are used to realize their symmetric distribution while users share risk on
accountability with competition on incentives in a privacy-enhancing manner.
Customer relationship management with royalty points, e.g., for eGovernment
with taxation, is an example for using SK4SC as digital platform. Keywords:
Security by design, risk management, accountability, identity management,
social innovation Online available @ <a href="https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fh-suwa.github.io%2Fpercomworkshops2019%2Fpapers%2Fp967-wohlgemuth.pdf&data=02%7C01%7C%7Ccb39603432eb4fd7f32308d6a90ca235%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636882269049449651&sdata=1sSHHnhqcemCJiEdinhP02d67Gq4ebuDVy5ZYwchTCE%3D&reserved=0" style="color:blue">https://h-suwa.github.io/percomworkshops2019/papers/p967-wohlgemuth.pdf</a></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Slides @ <a href="https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F331672930_Competitive_Compliance_with_Blockchain&data=02%7C01%7C%7Ccb39603432eb4fd7f32308d6a90ca235%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636882269049459655&sdata=3vvoiDuckT3EAR%2BT5h%2FxIKaqaBeVQbgThPDOwZkvjOE%3D&reserved=0" style="color:blue">https://www.researchgate.net/publication/331672930_Competitive_Compliance_with_Blockchain</a></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Paper via SPT-IoT @ <a href="https://eur04.safelinks.protection.outlook.com/?url=https%3A%2F%2Fh-suwa.github.io%2Fpercomworkshops2019%2Fsptiot2019.html&data=02%7C01%7C%7Ccb39603432eb4fd7f32308d6a90ca235%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636882269049459655&sdata=TlcOj2y07BwIWBCa%2FynEdSy9Qo1KvBCxyRhvzBQRf1w%3D&reserved=0" style="color:blue">https://h-suwa.github.io/percomworkshops2019/sptiot2019.html</a></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">That's all.</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Thank you for your attention.</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black"><br></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Best regards,</span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black">Sven Wohlgemuth</span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-family:Arial,sans-serif;color:black"><br></span></p></div></div></div>