Difference between revisions of "A computable framework for accountable data assets"

From PKC
Jump to navigation Jump to search
Line 5: Line 5:
# A [[web-based workflow]] that ensures only authenticated participants and [[machine-executable contract]]s may conduct changes to a cryptographically verified ledger for any ownership transactions.
# A [[web-based workflow]] that ensures only authenticated participants and [[machine-executable contract]]s may conduct changes to a cryptographically verified ledger for any ownership transactions.


This computational framework can be thought of as an automated accounting system for transacting data assets on the web. In other words, this article will define the data capture and data verification procedure as an algebraically-formulated accounting process, so that it can leverage the mathematical rigor to reason about data integrity. Moreover, this article prescribes an implementation roadmap to construct an open-source [[Enterprise Resource Planning]] ([[ERP]]) system utilizing decentralized security system, so that small and large organizations can utilize the same data processing infrastructure to conduct business. This will significantly reduce the cost of business transactions, therefore enabling more people to participate in the supply chain of data, products, and service on the Internet.
This computational framework can be thought of as an automated accounting system for transacting data assets on the web. In other words, this article will define the data capture and data verification procedure as an algebraically-formulated accounting process, so that it can leverage the mathematical rigor to reason about data integrity. Moreover, this article prescribes an implementation roadmap to construct an open-source [[Enterprise Resource Planning]] ([[ERP]]) system utilizing decentralized security system, so that small and large organizations can utilize the same data processing infrastructure to conduct business activities. This will significantly reduce the cost and accelerated the cycles of business transactions, therefore enabling more people to participate in the supply chain of data, products, and service on the Internet.


=Background=
=Background=

Revision as of 08:44, 12 May 2022

Synoposis

This article prescribes a systematic approach to manipulate data content in a unifying data abstraction framework. It unifies multiple domains of data representable knowledge in an extensible, yet universal data type: lattice, which includes the following:

  1. A computational framework that demonstrates algebraic closure properties (sound and complete) in three classes of data assets: information content, compilable source code, and executable binary files.
  2. A software architecture that maps industry-standard tools to the above-mentioned three data asset classes, information content, source code, and executable binaries.
  3. A web-based workflow that ensures only authenticated participants and machine-executable contracts may conduct changes to a cryptographically verified ledger for any ownership transactions.

This computational framework can be thought of as an automated accounting system for transacting data assets on the web. In other words, this article will define the data capture and data verification procedure as an algebraically-formulated accounting process, so that it can leverage the mathematical rigor to reason about data integrity. Moreover, this article prescribes an implementation roadmap to construct an open-source Enterprise Resource Planning (ERP) system utilizing decentralized security system, so that small and large organizations can utilize the same data processing infrastructure to conduct business activities. This will significantly reduce the cost and accelerated the cycles of business transactions, therefore enabling more people to participate in the supply chain of data, products, and service on the Internet.

Background

Since the appearance of World Wide Web in 1995, world affairs have been transformed by ever-faster electronic data transaction activities. In about 40 years[1], this data-driven phenomenon created an unprecedented global supply network that can be considered as an inter-connected web of data transaction activities, favoring organizations with deep pockets and access to late-breaking Information Technologies. This clear advantage distinguished by wealth and technology literacy induced many unfair practices and even un-ethical and/or illegal transaction activities at a global scale. To resolve this issue, globally-shared data transaction-processing platform, that reduces this unfair advantages and reduces the cost of system participation or system operation would be necessary to address many fundamental issues caused by information asymmetry.

 and a significant portion of these data transaction methods and tools have been made public as open sourced resources. With recent development in blockchain and Decentralized identifier technologies Products and services have been exposed to web-based applications and 4G/5G connected devices, so that anyone with access to these rather egalitarian communication/computation devices have been able to participate in the global supply network, however favoring participants with better access to Information Technologies and significant capital. , it is possible to create an open source turn-key solution, that allow almost every person on the web, a self-hosted Enterprise Resource Planning ,  This revolutionary software artifact presented many business opportunities and inspired many new technologies, however methods and tools to ensure their system integrity have not yet caught up with these changes.
  1. Complex software applications and business processes that have been serving a large portion of the society are searching for systematic ways to migrate to modern technical infrastructures.
these algebraic formulation of accounting systems has 

According to Rambaud and Pérez[2][3], an algebraically-defined accounting (data capture and verification) practice may systematically automate the decision procedures for the following activities:

  1. Decide how to classify the data collected and send the collected data to relevant data processing workflows.
  2. Whether a given data set is considered admissible or not. This is judged in terms of its data formats and legal value ranges.
  3. Whether a transaction process is allowable, or not. This include whether a given transaction is feasible, in relevant operational/business logics.


Ownership associated with Accounts

Data Content that represent Decision Procedures

The Control Structure(If/Then/Else)

Computable Data Types

It is been defined axiomatically that all computable data types are Partially-ordered sets.

Lattices and Partially Ordered Sets

Composition and Decomposition

The Notion of Closure offered by Algebra

Applications in ICT System Development

Conclusion

Ensure System Integrity at multiple temporal cycles

Rigorous practice in Constructing and Deconstructing Data-Intensive Systems

Boosting producitivy in Software Development

Direct societal-scale applications as Integrated Data Processing Workflows

References

  1. This document is revised on 5 12, 2022
  2. Rambaud, Salvador Cruz; Pérez, José García; Nehmer, Robert A.; Robinson, Derek J S Robinson (2010). Algebraic Models for Accounting Systems. local page: Cambridge at the University Press. ISBN 978-981-4287-11-1. 
  3. Rambaud, Salvador Cruz; Pérez, José García (2005). "The Accounting System as an Algebraic Automaton". INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS. local page: Wiley Periodicals, Inc. 20: 827–842. 

Related Pages