2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS) 2019
DOI: 10.1109/dcoss.2019.00086
|View full text |Cite
|
Sign up to set email alerts
|

Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Systems

Abstract: Sharing Economy (SE) systems use technologies to provide individuals with information that enables the optimization of resources through the mutualization of excess capacity in goods and services; thus, SE systems contribute to the reuse phase of the Circular Economy. In this paper, we assess existing SE services and identify their weaknesses in areas that are not technically connected to their core functionality, but are essential in creating trust: information security, personal data protection and economic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Using mac() with [ K u c tag ] and [BD u o ,u c ] as inputs, each S i creates an authentication tag [AuthTag BD uo,uc ]. 4 Prior to posting on the PL, the VSSP servers utilize open([AuthTag BD uo,uc ]) to reconstruct 4 Recall that…”
Section: Hermes Operations In Four Stepsmentioning
confidence: 99%
See 1 more Smart Citation
“…Using mac() with [ K u c tag ] and [BD u o ,u c ] as inputs, each S i creates an authentication tag [AuthTag BD uo,uc ]. 4 Prior to posting on the PL, the VSSP servers utilize open([AuthTag BD uo,uc ]) to reconstruct 4 Recall that…”
Section: Hermes Operations In Four Stepsmentioning
confidence: 99%
“…V EHICLE sharing is an emerging smart mobility service leveraging intelligent transport systems (ITSs) and connectivity to enable users to share their vehicles with others [2]- [4]. Users can book in advance and access a vehicle, where digital keys naturally replace the physical ones.…”
Section: Introductionmentioning
confidence: 99%
“…The anonymity could be considered as a reward for users to go through the registration process. As rewarding transactions take place on a blockchain system to which participants are all connected, they can easily investigate the fairness of the share, thus, trust is ensured [19,20]. Further information regarding how this works will be demonstrated in section 5.…”
Section: Bountymentioning
confidence: 99%
“…Such data is highly privacy sensitive as it could reveal users' daily activities [6]. Existing work already highlighted the privacy risks in local electricity markets [7] (and SE systems in general [8]), however, the analysis has only focused on a generic, rather high-level, market without taking into account any emerging new roles in such markets.…”
Section: Introductionmentioning
confidence: 99%