Georgy Ishmaev

Georgy Ishmaev
Delft University of Technology | TU · Department of Software and Computer Technology

Doctor of Philosophy

About

28
Publications
6,765
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
294
Citations

Publications

Publications (28)
Article
Full-text available
Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the concept...
Article
Full-text available
The landscape of electronic marketplaces has been monopolized by a handful of market operators that have accumulated tremendous power during the last decades. This trend raises concerns about fairness and market manipulation by these operators acting as gatekeepers. These concerns have recently been outlined in the EU Digital Markets Act (DMA). In...
Preprint
Full-text available
Catalyzed by the popularity of blockchain technology, there has recently been a renewed interest in the design, implementation and evaluation of decentralized systems. Most of these systems are intended to be deployed at scale and in heterogeneous environments with real users and unpredictable workloads. Nevertheless, most research in this field ev...
Conference Paper
Full-text available
Existing digital identity management systems fail to deliver the desirable properties of control by the users of their own identity data, credibility of disclosed identity data, and network-level anonymity. The recently proposed Self-Sovereign Identity (SSI) approach promises to give users these properties. However, we argue that without addressing...
Conference Paper
Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. Fair distribution of rewards, however, is still a persistent problem in the current generation of decentralized applications using token-based incentives. They are often dispro-portionally concentrated with small nu...
Preprint
Full-text available
Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. The challenge is to conceive incentives that are fair in regard to the income distribution among peers. Despite many systems using tokens to incentivize forwarding data, like Swarm, little is known about the interpl...
Preprint
Full-text available
Possible manipulation of user transactions by miners in a permissionless blockchain systems is a growing concern. This problem is a pervasive and systemic issue, known as Miner Extractable Value (MEV), incurs highs costs on users of decentralised applications. Furthermore, transaction manipulations create other issues in blockchain systems such as...
Article
Full-text available
This paper aims to address the research gap in ethical design frameworks for self-sovereign identity (SSI) solutions. We present a case study of value sensitive design (VSD) conceptual investigation applied in the context of SSI-based solutions for the sharing of medical credentials uNLock. We evaluate the applicability and quality of VSD applicati...
Chapter
Full-text available
The costs of the COVID-19 pandemic are yet to be calculated, but they include the loss of millions of lives and the destruction of countless livelihoods. What is certain is that the SARS-CoV-2 virus has changed the way we live for the foreseeable future. It has forced many to live in ways they would have previously thought impossible. As well as ch...
Preprint
Full-text available
The growing number of implementations of blockchain systems stands in stark contrast with still limited research on a systematic comparison of performance characteristics of these solutions. Such research is crucial for evaluating fundamental trade-offs introduced by novel consensus protocols and their implementations. These performance limitations...
Preprint
Full-text available
Decentralized reputation schemes present a promising area of experimentation in blockchain applications. These solutions aim to overcome the shortcomings of simple monetary incentive mechanisms of naive tokenomics. However, there is a significant research gap regarding the limitations and benefits of such solutions. We formulate these trade-offs as...
Book
Full-text available
The design and management of digital identity is a complex challenge. On the one hand, it requires a clear understanding of the parameters that are involved in identity management. On the other hand, it requires the cooperation of many stakeholders. In particular, this involves those public authorities and private organisations that need to be alig...
Technical Report
Full-text available
LEESWIJZER In de introductie (hoofdstuk1) wordt het beeld geschetst van Safety-by-Design (SbD) binnen het kader van verantwoorde wetenschappelijk innovatie en de belemmeringen die wetenschappers in een wetenschappelijke setting tegenkomen bij het vooruitdenken over veilige producten. Vervolgens worden de centrale bevindingen (hoofdstuk 2) genoemd e...
Article
Full-text available
In this paper, we explore solution directions for the implementation of Safe by Design (SbD) in safety regimes for academic experimentation. SbD is a dynamic and anticipatory strategy for safety regulation in academic research. In this strategy, safety is taken in a broader sense including not only issues of technical precaution of avoiding risks o...
Article
Full-text available
This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest present solutions aimed at reorganizing data flows in the Internet of Things (IoT) architectures, enabling the secure and decentralized exchang...
Article
Full-text available
The paper examines some of the competing normative claims surrounding the development of Identity Management (IM) systems in general and Self-Sovereign Identity (SSI) systems in particular. It is argued that SSI developments should be assessed against the backdrop of IMs attempting to implement a global identity layer based on aggregated singular i...
Thesis
The moral significance of blockchain technologies is a highly debated and polarised topic, ranging from accusations that cryptocurrencies are tools serving only nefarious purposes such as cybercrime and money laundering, to the assessment of blockchain technology as an enabler for revolutionary positive social transformations of all kinds. Such tec...
Article
Full-text available
New network technologies are framed as eliminating ‘transaction costs’, a notion first developed in economic theory that now drives the design of market systems. However, the actual promise of the elimination of transaction costs seems unfeasible, because of a cyclical pattern in which network technologies that make that promise create processes of...
Chapter
Full-text available
This chapter argues that the choice of trust conceptu- alizations in the context of consumer Internet of Things (IoT) can have a significant impact on the understanding and implementations of a user’s private data protection. Narrow instrumental interpreta- tions of trust as a mere precondition for technology acceptance may obscure important moral...
Article
Full-text available
This paper argues that the practical implementation of blockchain technology can be considered an institution of property similar to legal institutions. Invoking Penner's theory of property and Hegel's system of property rights, and using the example of bitcoin, it is possible to demonstrate that blockchain effectively implements all necessary and...

Network

Cited By