"uuid","repository link","title","author","contributor","publication year","abstract","subject topic","language","publication type","publisher","isbn","issn","patent","patent status","bibliographic note","access restriction","embargo date","faculty","department","research group","programme","project","coordinates" "uuid:2b34c1a6-afb0-4894-ac07-0d6b93bfc33b","http://resolver.tudelft.nl/uuid:2b34c1a6-afb0-4894-ac07-0d6b93bfc33b","Design of a software architecture supporting business-to-government information sharing to improve public safety and security: Combining business rules, Events and blockchain technology","van Engelenburg, S.H. (TU Delft Information and Communication Technology); Janssen, M.F.W.H.A. (TU Delft Information and Communication Technology); Klievink, A.J. (TU Delft Organisation & Governance)","","2017","Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi- tional information for fear of sharing competitively sensitive information, becoming liable and not being compliant with the law. These reasons are often overlooked in the design of software architectures for information sharing. In the present research, we followed a design science approach to develop a software architecture for business-to-government information sharing. Based on literature and a case study, we elicited the requirements an architecture that provides for the sharing of information should meet to make it acceptable to businesses. We then developed the architecture and evaluated it against the requirements. The architec- ture consists of a blockchain that stores events and rules for information sharing that are controlled by businesses. For each event, two parties use their private keys to encrypt its Merkle root to confirm that they know the data are correct. This makes it easy to check whether information is reliable and whether an event should be accepted. Access control, metadata and context information enable the context-based sharing of information. This is combined with the encryption and decryption of data to provide access to certain data within an organisation.","Software architecture; Blockchain; Information sharing; Safety; Security; Willingness; Business rules; Access control; Encryption; Supply chain; Customs; ICT architecture","en","journal article","","","","","","","","","","","Organisation & Governance","","",""