Print Email Facebook Twitter Design of a software architecture supporting business-to-government information sharing to improve public safety and security Title Design of a software architecture supporting business-to-government information sharing to improve public safety and security: Combining business rules, Events and blockchain technology Author van Engelenburg, S.H. (TU Delft Information and Communication Technology) Janssen, M.F.W.H.A. (TU Delft Information and Communication Technology) Klievink, A.J. (TU Delft Organisation & Governance) Date 2017 Abstract Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi- tional information for fear of sharing competitively sensitive information, becoming liable and not being compliant with the law. These reasons are often overlooked in the design of software architectures for information sharing. In the present research, we followed a design science approach to develop a software architecture for business-to-government information sharing. Based on literature and a case study, we elicited the requirements an architecture that provides for the sharing of information should meet to make it acceptable to businesses. We then developed the architecture and evaluated it against the requirements. The architec- ture consists of a blockchain that stores events and rules for information sharing that are controlled by businesses. For each event, two parties use their private keys to encrypt its Merkle root to confirm that they know the data are correct. This makes it easy to check whether information is reliable and whether an event should be accepted. Access control, metadata and context information enable the context-based sharing of information. This is combined with the encryption and decryption of data to provide access to certain data within an organisation. Subject Software architectureBlockchainInformation sharingSafetySecurityWillingnessBusiness rulesAccess controlEncryptionSupply chainCustomsICT architecture To reference this document use: http://resolver.tudelft.nl/uuid:2b34c1a6-afb0-4894-ac07-0d6b93bfc33b DOI https://doi.org/10.1007/s10844-017-0478-z ISSN 1573-7675 Source Journal of Intelligent Information Systems, 52, 595-618 Part of collection Institutional Repository Document type journal article Rights © 2017 S.H. van Engelenburg, M.F.W.H.A. Janssen, A.J. Klievink Files PDF Engelenburg_et_al_2017_Jo ... ystems.pdf 1009.94 KB Close viewer /islandora/object/uuid:2b34c1a6-afb0-4894-ac07-0d6b93bfc33b/datastream/OBJ/view