Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    b3kat_BV044457984
    Umfang: xxvi, 528 Seiten , Illustrationen, Diagramme, Karten
    ISBN: 9780128122822 , 012812282X
    In: 2
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-0-12-812299-0
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, PDF ISBN 978-0-12-812299-0
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Finanzdienstleistung ; Finanztechnologie ; Blockchain ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almafu_9960161394002883
    Umfang: 1 online resource (529 pages)
    Ausgabe: 1st ed.
    ISBN: 1-78785-024-2 , 0-12-812299-4 , 0-12-812282-X
    Anmerkung: Front Cover -- Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 -- Copyright -- Contents -- List of Contributors -- Preface -- Background -- Purpose -- Themes -- Acknowledgment by David LEE Kuo Chuen -- Acknowledgment by Robert Deng -- 1 The Game of Dian Fu: The Rise of Chinese Finance -- 1.1 Introduction: What Is Dianfu é è ? -- 1.2 Dian Fu One: Dian Fu in the Equity Market -- 1.2.1 Rise of China's GDP -- 1.2.2 Rise of China's Stock Market -- 1.2.3 Market Capitalization of the World's Top Stock Exchanges -- 1.2.4 National Equities Exchange and Quotations (NEEQ) -- 1.2.5 Private Equity and Venture Capital -- 1.2.6 Variable Interest Entity (VIE) -- 1.2.7 Investment Abroad -- 1.3 Dian Fu Two: Dian Fu in China's Peer-to-Peer Lending -- 1.4 Dian Fu Three: Dian Fu in Crowdfunding -- 1.5 Dian Fu Four: Dian Fu in the People's Currency -- 1.6 Dian Fu Five: Dian Fu in Banking -- 1.7 Conclusion -- 1.7.1 Financial Inclusion and Fintech -- 1.7.2 Expanding to the ASEAN Region -- Appendix: Acquisitions of Alibaba -- Acknowledgments -- References -- Notes -- 2 Balancing Innovation and Risks in Digital Financial Inclusion-Experiences of Ant Financial Services Group -- 2.1 Introduction -- 2.2 De nition -- 2.2.1 Digital Financial Inclusion -- 2.3 Experiences of Ant Financial -- 2.3.1 Financial Innovation at Ant Financial -- 2.3.2 Risk Management at Ant Financial -- References -- 3 Regulating FinTech in China: From Permissive to Balanced -- 3.1 Introduction -- 3.2 The Evolution of Digital Financial Services in China -- 3.2.1 Evolution of Traditional DFS -- 3.2.2 Evolution of Non-traditional DFS -- 3.3 Regulation of Digital Financial Services in China -- 3.3.1 DFS Regulation Before 2015 -- 3.3.2 DFS Regulation After 2015 -- 3.4 Conclusion -- Notes -- 4 Big Data Technology: Application and Cases -- 4.1 Why Big Data Technology Matters?. , 4.1.1 Introduction to Big Data Technology -- 4.1.2 Problems and Obstacles of Traditional Financial Service -- 4.2 How Big Data Technology Helps Improving Credit Performance -- 4.2.1 Big Data Technology Empowers Digital Finance to Innovate -- 4.2.2 Big Data Credit Investigation -- 4.3 Brief Introduction of CreditEase: Better Technology, Better Finance -- 4.4 An Instance of Big Data Technology: CreditEase Financial Cloud -- 4.4.1 Ultra Large Data Scale -- 4.4.2 Leading Data Processing Technique -- 4.4.3 Advance Knowledge Map Technology -- 4.4.4 Expert Experience and Data Closed-Loop -- 4.5 Cases and Application Scenarios for CreditEase Financial Cloud -- 4.5.1 E-Commerce Platform Cooperation -- 4.5.2 ERP (Enterprise Resource Planning) Software Platform Cooperation -- 4.5.3 Car Rental by Credit -- 4.5.4 Instant Installments -- References -- Notes -- 5 Trust Management in Mobile Platforms -- 5.1 Introduction -- 5.2 Trust, Trust Modeling, and Trust Management -- 5.2.1 Perspective of Trust and Its Characteristics -- 5.2.1.1 Perception of Trust Concept -- 5.2.1.2 Factors That In uence Trust -- 5.2.1.3 Characteristics of Trust -- 5.2.2 Trust Modeling -- 5.2.2.1 Taxonomy of Trust Models -- 5.2.2.2 Trust Evaluation Technologies -- 5.2.3 Trust Management and Its Main Technologies -- 5.2.4 Trusted Computing -- 5.2.5 Reputation Systems -- 5.2.6 Hybrid Trust Management Solution -- 5.3 Trust Management in Mobile Platforms -- 5.3.1 Mobile Trusted Computing Platform -- 5.3.1.1 Mobile Computing Platform -- 5.3.1.2 Trusted Computing Platform -- 5.3.1.3 Mobile Trusted Computing Platform -- 5.3.1.4 Perspectives of MTCP -- 5.3.2 Trust Management on Mobile Software Components -- 5.3.2.1 Trust Challenges of Mobile Software Components -- 5.3.2.2 Existing Trust Models of Components Based Software System. , 5.3.2.3 Autonomic Trust Management for a Component-Based Software System -- 5.3.3 Trust Evaluation on Mobile Applications -- 5.3.3.1 Challenges of Mobile Application Trust Management -- 5.3.3.2 Existing Trust Evaluation Models of Mobile Applications -- 5.3.3.3 A Trust-Behavior-Based Reputation System for Mobile Applications: TruBeRepec -- 5.3.4 Mobile Malware Detection -- 5.3.4.1 Evolution and Classi cation of Malware -- 5.3.4.2 Malware Detection and Analysis -- 5.4 Further Discussions -- 5.4.1 Open Issues and Challenges -- 5.4.2 Future Research Trends -- 5.5 Conclusions -- Acknowledgments -- References -- 6 Security Issues of In-Store Mobile Payment -- 6.1 Introduction -- 6.2 Background on In-Store Card Payment -- 6.2.1 Magnetic Stripe Payment Cards -- 6.2.2 EMV Payment Cards -- 6.3 In-Store Mobile Payment Network Models -- 6.3.1 Overview of In-Store Mobile Payment Services -- 6.3.2 Network Model of PTB Payment Services -- 6.3.2.1 Token Provision -- 6.3.2.2 Token Usage -- 6.3.3 Network Model of STB Payment Services -- 6.4 Issues Related to Token Service Provider -- 6.4.1 Role of Token Service Provider -- 6.4.2 Security Challenges -- 6.4.2.1 ID & -- V Methods -- 6.4.2.2 Token Assurance -- 6.4.2.3 Domain Restriction Controls -- 6.4.2.4 Token Vault Secure Storage -- 6.5 Issues Related to Mobile Payment Service Provider / Token Requestor -- 6.5.1 Security Issues of Token Requestor -- 6.5.2 Security Issues of Mobile Payment Service Provider -- 6.5.2.1 Service Account Credential Security -- 6.5.2.2 Payment Credential Security -- 6.6 On-Device Level Issues -- 6.6.1 Payment Card Emulation -- 6.6.1.1 Secure Element (SE)-Enabled Card Emulation -- 6.6.1.2 Host Card Emulation (HCE) -- 6.6.1.3 Comparison Between SE and HCE -- 6.6.2 User Authentication -- 6.6.2.1 Non-biometric User Authentication -- 6.6.2.2 Biometric User Authentication. , 6.6.2.3 Free Authentication Transaction -- 6.7 Conclusion -- References -- 7 Blockchain - From Public to Private -- 7.1 Introduction -- 7.2 Terminology -- 7.3 Overview of the Bitcoin Blockchain -- 7.4 Characteristics of Blockchain -- 7.4.1 Distributed Consensus Protocols -- 7.4.2 Liveness and Safety -- 7.4.3 No Correlation Between Nodes Failures -- 7.4.4 Resiliency -- 7.4.5 Types of Fault -- 7.4.6 Synchrony -- 7.4.7 Authentication and Non-repudiation -- 7.4.8 Scalability and Performance -- 7.4.9 Turing-Complete -- 7.4.10 Smart Contracts -- 7.4.11 Smart Contract Oracle -- 7.5 Types of Blockchains -- 7.5.1 Token-Based Consensus Protocol Blockchains (With Mining) -- 7.5.1.1 Ethereum -- 7.5.1.2 Proof-of-Stake -- 7.5.2 Token-Based Consensus Protocol Blockchains (Without Mining) -- 7.5.2.1 Tendermint -- 7.5.2.2 Ripple Protocol Consensus Algorithm (RPCA) -- 7.5.3 Token-Less Blockchain Technologies -- 7.5.3.1 Practical Byzantine Fault Tolerance (PBFT) -- 7.5.3.2 Hyperledger -- 7.5.3.3 R3 Corda -- 7.6 Conclusion -- 7.6.1 Step 1: Decide if Blockchain is the Right Solution for the Problem -- 7.6.2 Step 2: Assess the Bene ts and Caveats -- 7.6.3 Step 3: Assess the Technical Design Considerations -- 7.6.4 Step 4: Assess the Functional Design Considerations -- 7.6.5 Step 5: Assess the Non-functional and Operational Considerations -- 7.6.5.1 Identity and Key Management -- 7.6.5.2 Privacy and Con dentiality -- 7.6.5.3 Existing Systems Integration and Interoperability -- 7.6.5.4 Regulations -- 7.6.5.5 Production Rollout and Testing -- 7.6.5.6 Operational Readiness -- Appendix 1: The Six Layers of Blockchain -- Appendix 2: Notable Blockchain and Distributed Ledger Technologies -- References -- Notes -- 8 Blockchain 101: An Introduction to the Future -- 8.1 Two Factors to Achieve Trust -- 8.2 What Problems Do Blockchains Solve?. , 8.2.1 The Perfect Storm of the Permissionless Network -- 8.3 What Problems Do Blockchains Create? -- 8.4 In Conclusion: The 9 Factors of Blockchain -- References -- 9 Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology -- 9.1 Introduction -- 9.2 The Paper Crisis and the National Market System -- 9.2.1 The Paperwork Crisis -- 9.2.2 SEC Response -- 9.2.3 Securities Act Amendments of 1975 -- 9.3 Blockchain Technologies -- 9.3.1 What Is Blockchain Technology? -- 9.3.2 Blockchain and Traditional Financial Services Technology -- 9.3.3 Restricted and Unrestricted Blockchains -- 9.4 SEC Regulation of Blockchain Technology -- 9.4.1 What Is a Security? -- 9.4.2 Securities Exchanges -- 9.4.3 ATS -- 9.4.4 Broker-Dealers -- 9.4.4.1 Engaged in the Business -- 9.4.4.2 "For the Account of Others -- 9.4.4.3 Role of Compensation in Analysis -- 9.4.4.4 Effecting Transactions in Securities -- 9.5 BTC Trading Corp -- 9.5.1 Clearing Agencies -- 9.5.1.1 Clearing Corporations -- 9.5.1.2 Depositories -- 9.5.2 Transfer Agents -- 9.6 CFTC Regulation of Blockchain Technology -- 9.6.1 Introduction -- 9.6.2 Facts -- 9.6.3 CFTC Jurisdiction -- 9.6.4 The Actual Delivery Exception -- 9.6.5 Section 4(a) of the CEA -- 9.6.6 Section 4(d) of the CEA -- 9.6.7 Analysis -- 9.7 Conclusions -- References -- Note -- 10 Global Financial Institutions 2.0 -- 10.1 Blockchain -- 10.2 Global Financial Institutions -- 10.3 Frameworks and Antecedents of Change -- 10.3.1 International Organizations: Core Components -- 10.3.2 Framework for Dynamic, Iterative Change of Global Financial Institutions -- 10.4 Blockchain and Global Financial Institutions 2.0 -- 10.5 Needs That Change Post-Global Financial Institutions Blockchain Adoption -- 10.6 The Innovation Ahead -- References -- Notes. , 11 Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures?.
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    edoccha_BV047505731
    Umfang: 1 Online-Ressource.
    ISBN: 9780128122990
    In: Handbook of blockchain, digital finance, and inclusion.
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-0-12-812282-2
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Blockchain ; Finanzdienstleistung ; Finanztechnologie ; Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almafu_BV047505731
    Umfang: 1 Online-Ressource.
    ISBN: 9780128122990
    In: Handbook of blockchain, digital finance, and inclusion.
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-0-12-812282-2
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Blockchain ; Finanzdienstleistung ; Finanztechnologie ; Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    gbv_1009337076
    Umfang: xxvi, 528 Seiten , Illustrationen, Diagramme
    ISBN: 9780128122822
    Serie: Handbook of blockchain, digital finance, and inclusion volume 2
    Anmerkung: Auf dem Umschlag: Edited by David Lee Kuo Chuen and Robert H. Deng , Enthält 22 Beiträge
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 London : Academic Press, 2017 ISBN 9780128122990
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Handbook of blockchain, digital finance, and inclusion, Volume 2 London : Academic Press, an imprint of Elsevier, 2018 ISBN 9780128122990
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    Schlagwort(e): Finanzdienstleistung ; Finanztechnologie ; Blockchain ; Digitalisierung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almafu_BV044457984
    Umfang: xxvi, 528 Seiten : , Illustrationen, Diagramme, Karten.
    ISBN: 978-0-12-812282-2 , 0-12-812282-X
    In: Handbook of blockchain, digital finance, and inclusion.
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-0-12-812299-0
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, PDF ISBN 978-0-12-812299-0
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Finanzdienstleistung ; Finanztechnologie ; Blockchain ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    UID:
    almahu_BV044457984
    Umfang: xxvi, 528 Seiten : , Illustrationen, Diagramme, Karten.
    ISBN: 978-0-12-812282-2 , 0-12-812282-X
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, EPUB ISBN 978-0-12-812299-0
    Weitere Ausg.: Erscheint auch als Online-Ausgabe, PDF ISBN 978-0-12-812299-0
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Finanzdienstleistung ; Finanztechnologie ; Blockchain ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    UID:
    edocfu_BV047505731
    Umfang: 1 Online-Ressource.
    ISBN: 9780128122990
    In: Handbook of blockchain, digital finance, and inclusion.
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-0-12-812282-2
    Sprache: Englisch
    Fachgebiete: Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Blockchain ; Finanzdienstleistung ; Finanztechnologie ; Electronic Banking ; Elektronischer Zahlungsverkehr ; Virtuelle Währung ; Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    almahu_9949697306902882
    Umfang: 1 online resource (529 pages)
    Ausgabe: 1st ed.
    ISBN: 1-78785-024-2 , 0-12-812299-4 , 0-12-812282-X
    Anmerkung: Front Cover -- Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 -- Copyright -- Contents -- List of Contributors -- Preface -- Background -- Purpose -- Themes -- Acknowledgment by David LEE Kuo Chuen -- Acknowledgment by Robert Deng -- 1 The Game of Dian Fu: The Rise of Chinese Finance -- 1.1 Introduction: What Is Dianfu é è ? -- 1.2 Dian Fu One: Dian Fu in the Equity Market -- 1.2.1 Rise of China's GDP -- 1.2.2 Rise of China's Stock Market -- 1.2.3 Market Capitalization of the World's Top Stock Exchanges -- 1.2.4 National Equities Exchange and Quotations (NEEQ) -- 1.2.5 Private Equity and Venture Capital -- 1.2.6 Variable Interest Entity (VIE) -- 1.2.7 Investment Abroad -- 1.3 Dian Fu Two: Dian Fu in China's Peer-to-Peer Lending -- 1.4 Dian Fu Three: Dian Fu in Crowdfunding -- 1.5 Dian Fu Four: Dian Fu in the People's Currency -- 1.6 Dian Fu Five: Dian Fu in Banking -- 1.7 Conclusion -- 1.7.1 Financial Inclusion and Fintech -- 1.7.2 Expanding to the ASEAN Region -- Appendix: Acquisitions of Alibaba -- Acknowledgments -- References -- Notes -- 2 Balancing Innovation and Risks in Digital Financial Inclusion-Experiences of Ant Financial Services Group -- 2.1 Introduction -- 2.2 De nition -- 2.2.1 Digital Financial Inclusion -- 2.3 Experiences of Ant Financial -- 2.3.1 Financial Innovation at Ant Financial -- 2.3.2 Risk Management at Ant Financial -- References -- 3 Regulating FinTech in China: From Permissive to Balanced -- 3.1 Introduction -- 3.2 The Evolution of Digital Financial Services in China -- 3.2.1 Evolution of Traditional DFS -- 3.2.2 Evolution of Non-traditional DFS -- 3.3 Regulation of Digital Financial Services in China -- 3.3.1 DFS Regulation Before 2015 -- 3.3.2 DFS Regulation After 2015 -- 3.4 Conclusion -- Notes -- 4 Big Data Technology: Application and Cases -- 4.1 Why Big Data Technology Matters?. , 4.1.1 Introduction to Big Data Technology -- 4.1.2 Problems and Obstacles of Traditional Financial Service -- 4.2 How Big Data Technology Helps Improving Credit Performance -- 4.2.1 Big Data Technology Empowers Digital Finance to Innovate -- 4.2.2 Big Data Credit Investigation -- 4.3 Brief Introduction of CreditEase: Better Technology, Better Finance -- 4.4 An Instance of Big Data Technology: CreditEase Financial Cloud -- 4.4.1 Ultra Large Data Scale -- 4.4.2 Leading Data Processing Technique -- 4.4.3 Advance Knowledge Map Technology -- 4.4.4 Expert Experience and Data Closed-Loop -- 4.5 Cases and Application Scenarios for CreditEase Financial Cloud -- 4.5.1 E-Commerce Platform Cooperation -- 4.5.2 ERP (Enterprise Resource Planning) Software Platform Cooperation -- 4.5.3 Car Rental by Credit -- 4.5.4 Instant Installments -- References -- Notes -- 5 Trust Management in Mobile Platforms -- 5.1 Introduction -- 5.2 Trust, Trust Modeling, and Trust Management -- 5.2.1 Perspective of Trust and Its Characteristics -- 5.2.1.1 Perception of Trust Concept -- 5.2.1.2 Factors That In uence Trust -- 5.2.1.3 Characteristics of Trust -- 5.2.2 Trust Modeling -- 5.2.2.1 Taxonomy of Trust Models -- 5.2.2.2 Trust Evaluation Technologies -- 5.2.3 Trust Management and Its Main Technologies -- 5.2.4 Trusted Computing -- 5.2.5 Reputation Systems -- 5.2.6 Hybrid Trust Management Solution -- 5.3 Trust Management in Mobile Platforms -- 5.3.1 Mobile Trusted Computing Platform -- 5.3.1.1 Mobile Computing Platform -- 5.3.1.2 Trusted Computing Platform -- 5.3.1.3 Mobile Trusted Computing Platform -- 5.3.1.4 Perspectives of MTCP -- 5.3.2 Trust Management on Mobile Software Components -- 5.3.2.1 Trust Challenges of Mobile Software Components -- 5.3.2.2 Existing Trust Models of Components Based Software System. , 5.3.2.3 Autonomic Trust Management for a Component-Based Software System -- 5.3.3 Trust Evaluation on Mobile Applications -- 5.3.3.1 Challenges of Mobile Application Trust Management -- 5.3.3.2 Existing Trust Evaluation Models of Mobile Applications -- 5.3.3.3 A Trust-Behavior-Based Reputation System for Mobile Applications: TruBeRepec -- 5.3.4 Mobile Malware Detection -- 5.3.4.1 Evolution and Classi cation of Malware -- 5.3.4.2 Malware Detection and Analysis -- 5.4 Further Discussions -- 5.4.1 Open Issues and Challenges -- 5.4.2 Future Research Trends -- 5.5 Conclusions -- Acknowledgments -- References -- 6 Security Issues of In-Store Mobile Payment -- 6.1 Introduction -- 6.2 Background on In-Store Card Payment -- 6.2.1 Magnetic Stripe Payment Cards -- 6.2.2 EMV Payment Cards -- 6.3 In-Store Mobile Payment Network Models -- 6.3.1 Overview of In-Store Mobile Payment Services -- 6.3.2 Network Model of PTB Payment Services -- 6.3.2.1 Token Provision -- 6.3.2.2 Token Usage -- 6.3.3 Network Model of STB Payment Services -- 6.4 Issues Related to Token Service Provider -- 6.4.1 Role of Token Service Provider -- 6.4.2 Security Challenges -- 6.4.2.1 ID & -- V Methods -- 6.4.2.2 Token Assurance -- 6.4.2.3 Domain Restriction Controls -- 6.4.2.4 Token Vault Secure Storage -- 6.5 Issues Related to Mobile Payment Service Provider / Token Requestor -- 6.5.1 Security Issues of Token Requestor -- 6.5.2 Security Issues of Mobile Payment Service Provider -- 6.5.2.1 Service Account Credential Security -- 6.5.2.2 Payment Credential Security -- 6.6 On-Device Level Issues -- 6.6.1 Payment Card Emulation -- 6.6.1.1 Secure Element (SE)-Enabled Card Emulation -- 6.6.1.2 Host Card Emulation (HCE) -- 6.6.1.3 Comparison Between SE and HCE -- 6.6.2 User Authentication -- 6.6.2.1 Non-biometric User Authentication -- 6.6.2.2 Biometric User Authentication. , 6.6.2.3 Free Authentication Transaction -- 6.7 Conclusion -- References -- 7 Blockchain - From Public to Private -- 7.1 Introduction -- 7.2 Terminology -- 7.3 Overview of the Bitcoin Blockchain -- 7.4 Characteristics of Blockchain -- 7.4.1 Distributed Consensus Protocols -- 7.4.2 Liveness and Safety -- 7.4.3 No Correlation Between Nodes Failures -- 7.4.4 Resiliency -- 7.4.5 Types of Fault -- 7.4.6 Synchrony -- 7.4.7 Authentication and Non-repudiation -- 7.4.8 Scalability and Performance -- 7.4.9 Turing-Complete -- 7.4.10 Smart Contracts -- 7.4.11 Smart Contract Oracle -- 7.5 Types of Blockchains -- 7.5.1 Token-Based Consensus Protocol Blockchains (With Mining) -- 7.5.1.1 Ethereum -- 7.5.1.2 Proof-of-Stake -- 7.5.2 Token-Based Consensus Protocol Blockchains (Without Mining) -- 7.5.2.1 Tendermint -- 7.5.2.2 Ripple Protocol Consensus Algorithm (RPCA) -- 7.5.3 Token-Less Blockchain Technologies -- 7.5.3.1 Practical Byzantine Fault Tolerance (PBFT) -- 7.5.3.2 Hyperledger -- 7.5.3.3 R3 Corda -- 7.6 Conclusion -- 7.6.1 Step 1: Decide if Blockchain is the Right Solution for the Problem -- 7.6.2 Step 2: Assess the Bene ts and Caveats -- 7.6.3 Step 3: Assess the Technical Design Considerations -- 7.6.4 Step 4: Assess the Functional Design Considerations -- 7.6.5 Step 5: Assess the Non-functional and Operational Considerations -- 7.6.5.1 Identity and Key Management -- 7.6.5.2 Privacy and Con dentiality -- 7.6.5.3 Existing Systems Integration and Interoperability -- 7.6.5.4 Regulations -- 7.6.5.5 Production Rollout and Testing -- 7.6.5.6 Operational Readiness -- Appendix 1: The Six Layers of Blockchain -- Appendix 2: Notable Blockchain and Distributed Ledger Technologies -- References -- Notes -- 8 Blockchain 101: An Introduction to the Future -- 8.1 Two Factors to Achieve Trust -- 8.2 What Problems Do Blockchains Solve?. , 8.2.1 The Perfect Storm of the Permissionless Network -- 8.3 What Problems Do Blockchains Create? -- 8.4 In Conclusion: The 9 Factors of Blockchain -- References -- 9 Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology -- 9.1 Introduction -- 9.2 The Paper Crisis and the National Market System -- 9.2.1 The Paperwork Crisis -- 9.2.2 SEC Response -- 9.2.3 Securities Act Amendments of 1975 -- 9.3 Blockchain Technologies -- 9.3.1 What Is Blockchain Technology? -- 9.3.2 Blockchain and Traditional Financial Services Technology -- 9.3.3 Restricted and Unrestricted Blockchains -- 9.4 SEC Regulation of Blockchain Technology -- 9.4.1 What Is a Security? -- 9.4.2 Securities Exchanges -- 9.4.3 ATS -- 9.4.4 Broker-Dealers -- 9.4.4.1 Engaged in the Business -- 9.4.4.2 "For the Account of Others -- 9.4.4.3 Role of Compensation in Analysis -- 9.4.4.4 Effecting Transactions in Securities -- 9.5 BTC Trading Corp -- 9.5.1 Clearing Agencies -- 9.5.1.1 Clearing Corporations -- 9.5.1.2 Depositories -- 9.5.2 Transfer Agents -- 9.6 CFTC Regulation of Blockchain Technology -- 9.6.1 Introduction -- 9.6.2 Facts -- 9.6.3 CFTC Jurisdiction -- 9.6.4 The Actual Delivery Exception -- 9.6.5 Section 4(a) of the CEA -- 9.6.6 Section 4(d) of the CEA -- 9.6.7 Analysis -- 9.7 Conclusions -- References -- Note -- 10 Global Financial Institutions 2.0 -- 10.1 Blockchain -- 10.2 Global Financial Institutions -- 10.3 Frameworks and Antecedents of Change -- 10.3.1 International Organizations: Core Components -- 10.3.2 Framework for Dynamic, Iterative Change of Global Financial Institutions -- 10.4 Blockchain and Global Financial Institutions 2.0 -- 10.5 Needs That Change Post-Global Financial Institutions Blockchain Adoption -- 10.6 The Innovation Ahead -- References -- Notes. , 11 Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures?.
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    UID:
    edocfu_9960161394002883
    Umfang: 1 online resource (529 pages)
    Ausgabe: 1st ed.
    ISBN: 1-78785-024-2 , 0-12-812299-4 , 0-12-812282-X
    Anmerkung: Front Cover -- Handbook of Blockchain, Digital Finance, and Inclusion, Volume 2 -- Copyright -- Contents -- List of Contributors -- Preface -- Background -- Purpose -- Themes -- Acknowledgment by David LEE Kuo Chuen -- Acknowledgment by Robert Deng -- 1 The Game of Dian Fu: The Rise of Chinese Finance -- 1.1 Introduction: What Is Dianfu é è ? -- 1.2 Dian Fu One: Dian Fu in the Equity Market -- 1.2.1 Rise of China's GDP -- 1.2.2 Rise of China's Stock Market -- 1.2.3 Market Capitalization of the World's Top Stock Exchanges -- 1.2.4 National Equities Exchange and Quotations (NEEQ) -- 1.2.5 Private Equity and Venture Capital -- 1.2.6 Variable Interest Entity (VIE) -- 1.2.7 Investment Abroad -- 1.3 Dian Fu Two: Dian Fu in China's Peer-to-Peer Lending -- 1.4 Dian Fu Three: Dian Fu in Crowdfunding -- 1.5 Dian Fu Four: Dian Fu in the People's Currency -- 1.6 Dian Fu Five: Dian Fu in Banking -- 1.7 Conclusion -- 1.7.1 Financial Inclusion and Fintech -- 1.7.2 Expanding to the ASEAN Region -- Appendix: Acquisitions of Alibaba -- Acknowledgments -- References -- Notes -- 2 Balancing Innovation and Risks in Digital Financial Inclusion-Experiences of Ant Financial Services Group -- 2.1 Introduction -- 2.2 De nition -- 2.2.1 Digital Financial Inclusion -- 2.3 Experiences of Ant Financial -- 2.3.1 Financial Innovation at Ant Financial -- 2.3.2 Risk Management at Ant Financial -- References -- 3 Regulating FinTech in China: From Permissive to Balanced -- 3.1 Introduction -- 3.2 The Evolution of Digital Financial Services in China -- 3.2.1 Evolution of Traditional DFS -- 3.2.2 Evolution of Non-traditional DFS -- 3.3 Regulation of Digital Financial Services in China -- 3.3.1 DFS Regulation Before 2015 -- 3.3.2 DFS Regulation After 2015 -- 3.4 Conclusion -- Notes -- 4 Big Data Technology: Application and Cases -- 4.1 Why Big Data Technology Matters?. , 4.1.1 Introduction to Big Data Technology -- 4.1.2 Problems and Obstacles of Traditional Financial Service -- 4.2 How Big Data Technology Helps Improving Credit Performance -- 4.2.1 Big Data Technology Empowers Digital Finance to Innovate -- 4.2.2 Big Data Credit Investigation -- 4.3 Brief Introduction of CreditEase: Better Technology, Better Finance -- 4.4 An Instance of Big Data Technology: CreditEase Financial Cloud -- 4.4.1 Ultra Large Data Scale -- 4.4.2 Leading Data Processing Technique -- 4.4.3 Advance Knowledge Map Technology -- 4.4.4 Expert Experience and Data Closed-Loop -- 4.5 Cases and Application Scenarios for CreditEase Financial Cloud -- 4.5.1 E-Commerce Platform Cooperation -- 4.5.2 ERP (Enterprise Resource Planning) Software Platform Cooperation -- 4.5.3 Car Rental by Credit -- 4.5.4 Instant Installments -- References -- Notes -- 5 Trust Management in Mobile Platforms -- 5.1 Introduction -- 5.2 Trust, Trust Modeling, and Trust Management -- 5.2.1 Perspective of Trust and Its Characteristics -- 5.2.1.1 Perception of Trust Concept -- 5.2.1.2 Factors That In uence Trust -- 5.2.1.3 Characteristics of Trust -- 5.2.2 Trust Modeling -- 5.2.2.1 Taxonomy of Trust Models -- 5.2.2.2 Trust Evaluation Technologies -- 5.2.3 Trust Management and Its Main Technologies -- 5.2.4 Trusted Computing -- 5.2.5 Reputation Systems -- 5.2.6 Hybrid Trust Management Solution -- 5.3 Trust Management in Mobile Platforms -- 5.3.1 Mobile Trusted Computing Platform -- 5.3.1.1 Mobile Computing Platform -- 5.3.1.2 Trusted Computing Platform -- 5.3.1.3 Mobile Trusted Computing Platform -- 5.3.1.4 Perspectives of MTCP -- 5.3.2 Trust Management on Mobile Software Components -- 5.3.2.1 Trust Challenges of Mobile Software Components -- 5.3.2.2 Existing Trust Models of Components Based Software System. , 5.3.2.3 Autonomic Trust Management for a Component-Based Software System -- 5.3.3 Trust Evaluation on Mobile Applications -- 5.3.3.1 Challenges of Mobile Application Trust Management -- 5.3.3.2 Existing Trust Evaluation Models of Mobile Applications -- 5.3.3.3 A Trust-Behavior-Based Reputation System for Mobile Applications: TruBeRepec -- 5.3.4 Mobile Malware Detection -- 5.3.4.1 Evolution and Classi cation of Malware -- 5.3.4.2 Malware Detection and Analysis -- 5.4 Further Discussions -- 5.4.1 Open Issues and Challenges -- 5.4.2 Future Research Trends -- 5.5 Conclusions -- Acknowledgments -- References -- 6 Security Issues of In-Store Mobile Payment -- 6.1 Introduction -- 6.2 Background on In-Store Card Payment -- 6.2.1 Magnetic Stripe Payment Cards -- 6.2.2 EMV Payment Cards -- 6.3 In-Store Mobile Payment Network Models -- 6.3.1 Overview of In-Store Mobile Payment Services -- 6.3.2 Network Model of PTB Payment Services -- 6.3.2.1 Token Provision -- 6.3.2.2 Token Usage -- 6.3.3 Network Model of STB Payment Services -- 6.4 Issues Related to Token Service Provider -- 6.4.1 Role of Token Service Provider -- 6.4.2 Security Challenges -- 6.4.2.1 ID & -- V Methods -- 6.4.2.2 Token Assurance -- 6.4.2.3 Domain Restriction Controls -- 6.4.2.4 Token Vault Secure Storage -- 6.5 Issues Related to Mobile Payment Service Provider / Token Requestor -- 6.5.1 Security Issues of Token Requestor -- 6.5.2 Security Issues of Mobile Payment Service Provider -- 6.5.2.1 Service Account Credential Security -- 6.5.2.2 Payment Credential Security -- 6.6 On-Device Level Issues -- 6.6.1 Payment Card Emulation -- 6.6.1.1 Secure Element (SE)-Enabled Card Emulation -- 6.6.1.2 Host Card Emulation (HCE) -- 6.6.1.3 Comparison Between SE and HCE -- 6.6.2 User Authentication -- 6.6.2.1 Non-biometric User Authentication -- 6.6.2.2 Biometric User Authentication. , 6.6.2.3 Free Authentication Transaction -- 6.7 Conclusion -- References -- 7 Blockchain - From Public to Private -- 7.1 Introduction -- 7.2 Terminology -- 7.3 Overview of the Bitcoin Blockchain -- 7.4 Characteristics of Blockchain -- 7.4.1 Distributed Consensus Protocols -- 7.4.2 Liveness and Safety -- 7.4.3 No Correlation Between Nodes Failures -- 7.4.4 Resiliency -- 7.4.5 Types of Fault -- 7.4.6 Synchrony -- 7.4.7 Authentication and Non-repudiation -- 7.4.8 Scalability and Performance -- 7.4.9 Turing-Complete -- 7.4.10 Smart Contracts -- 7.4.11 Smart Contract Oracle -- 7.5 Types of Blockchains -- 7.5.1 Token-Based Consensus Protocol Blockchains (With Mining) -- 7.5.1.1 Ethereum -- 7.5.1.2 Proof-of-Stake -- 7.5.2 Token-Based Consensus Protocol Blockchains (Without Mining) -- 7.5.2.1 Tendermint -- 7.5.2.2 Ripple Protocol Consensus Algorithm (RPCA) -- 7.5.3 Token-Less Blockchain Technologies -- 7.5.3.1 Practical Byzantine Fault Tolerance (PBFT) -- 7.5.3.2 Hyperledger -- 7.5.3.3 R3 Corda -- 7.6 Conclusion -- 7.6.1 Step 1: Decide if Blockchain is the Right Solution for the Problem -- 7.6.2 Step 2: Assess the Bene ts and Caveats -- 7.6.3 Step 3: Assess the Technical Design Considerations -- 7.6.4 Step 4: Assess the Functional Design Considerations -- 7.6.5 Step 5: Assess the Non-functional and Operational Considerations -- 7.6.5.1 Identity and Key Management -- 7.6.5.2 Privacy and Con dentiality -- 7.6.5.3 Existing Systems Integration and Interoperability -- 7.6.5.4 Regulations -- 7.6.5.5 Production Rollout and Testing -- 7.6.5.6 Operational Readiness -- Appendix 1: The Six Layers of Blockchain -- Appendix 2: Notable Blockchain and Distributed Ledger Technologies -- References -- Notes -- 8 Blockchain 101: An Introduction to the Future -- 8.1 Two Factors to Achieve Trust -- 8.2 What Problems Do Blockchains Solve?. , 8.2.1 The Perfect Storm of the Permissionless Network -- 8.3 What Problems Do Blockchains Create? -- 8.4 In Conclusion: The 9 Factors of Blockchain -- References -- 9 Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology -- 9.1 Introduction -- 9.2 The Paper Crisis and the National Market System -- 9.2.1 The Paperwork Crisis -- 9.2.2 SEC Response -- 9.2.3 Securities Act Amendments of 1975 -- 9.3 Blockchain Technologies -- 9.3.1 What Is Blockchain Technology? -- 9.3.2 Blockchain and Traditional Financial Services Technology -- 9.3.3 Restricted and Unrestricted Blockchains -- 9.4 SEC Regulation of Blockchain Technology -- 9.4.1 What Is a Security? -- 9.4.2 Securities Exchanges -- 9.4.3 ATS -- 9.4.4 Broker-Dealers -- 9.4.4.1 Engaged in the Business -- 9.4.4.2 "For the Account of Others -- 9.4.4.3 Role of Compensation in Analysis -- 9.4.4.4 Effecting Transactions in Securities -- 9.5 BTC Trading Corp -- 9.5.1 Clearing Agencies -- 9.5.1.1 Clearing Corporations -- 9.5.1.2 Depositories -- 9.5.2 Transfer Agents -- 9.6 CFTC Regulation of Blockchain Technology -- 9.6.1 Introduction -- 9.6.2 Facts -- 9.6.3 CFTC Jurisdiction -- 9.6.4 The Actual Delivery Exception -- 9.6.5 Section 4(a) of the CEA -- 9.6.6 Section 4(d) of the CEA -- 9.6.7 Analysis -- 9.7 Conclusions -- References -- Note -- 10 Global Financial Institutions 2.0 -- 10.1 Blockchain -- 10.2 Global Financial Institutions -- 10.3 Frameworks and Antecedents of Change -- 10.3.1 International Organizations: Core Components -- 10.3.2 Framework for Dynamic, Iterative Change of Global Financial Institutions -- 10.4 Blockchain and Global Financial Institutions 2.0 -- 10.5 Needs That Change Post-Global Financial Institutions Blockchain Adoption -- 10.6 The Innovation Ahead -- References -- Notes. , 11 Open-Source Operational Risk: Should Public Blockchains Serve as Financial Market Infrastructures?.
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz