منابع مشابه
Contracting with Third Parties
odels of bilateral contracting, such as the canonical holdup model, typically assume that third parties are not available. Given this assumption, the equilibrium outcome is not first-best efficient if contracts can be renegotiated. To be more specific, suppose an architect and a builder must cooperate to build a building. The quality of the building will depend on three things: the quality of t...
متن کاملTowards Tiny Trusted Third Parties
Many security protocols hypothesize the existence of a trusted third party (TTP) to ease handling of computation and data too sensitive for the other parties involved. Subsequent discussion usually dismisses these protocols as hypothetical or impractical, under the assumption that trusted third parties cannot exist. However, the last decade has seen the emergence of hardware-based devices that,...
متن کاملFaerieplay on Tiny Trusted Third Parties
Many security protocols refer to a trusted third party (TTP) as an ideal way of handling computation and data with conflicting stakeholders. Subsequent discussion usually dismisses a TTP as hypothetical or impractical. However, the last decade has seen the emergence of hardware-based devices like the IBM 4758 that, to high assurance, can carry out computation unmolested; TPM-based systems like ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hastings Center Report
سال: 2020
ISSN: 0093-0334
DOI: 10.1002/hast.1190