Searched for: +
(1 - 20 of 20)
document
Kurteva, A.K. (author), Pandit, Harshvardhan J. (author)
Protecting and preserving individuals’ personal data is a legal obligation set out by the European Union’s General Data Protection Regulation (GDPR). However, the process of implementing data governance to support that, in a decentralised ecosystem, is still vague. Motivated by the need for lawful decentralised data processing, this paper...
conference paper 2023
document
Ofe, H.A. (author), Sandberg, Johan (author), Rudmark, Daniel (author), de Reuver, Mark (author)
conference paper 2023
document
Memar Zahedani, Armin (author), Vos, J.V. (author), Erkin, Z. (author)
Double auctions are procedures to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Buyers and sellers inform the auctioneer what quantity they want to buy or sell at specific prices. The auctioneer aggregates these offers into demand and supply curves and finds the intersection representing the...
conference paper 2023
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Bardi, Sara (author), Conti, M. (author), Pajola, L. (author), Tricomi, Pier Paolo (author)
Social Honeypots are tools deployed in Online Social Networks (OSN) to attract malevolent activities performed by spammers and bots. To this end, their content is designed to be of maximum interest to malicious users. However, by choosing an appropriate content topic, this attractive mechanism could be extended to any OSN users, rather than...
conference paper 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Ideally, secure user sessions should start and end with authentication and de-Authentication phases, respectively. While the user must pass the former to start a secure session, the latter's importance is often ignored or underestimated. Dangling or unattended sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, the...
conference paper 2022
document
Pascoal, Túlio (author), Decouchant, Jérémie (author), Völp, Marcus (author)
Genome-wide association studies (GWAS) identify correlations between the genetic variants and an observable characteristic such as a disease. Previous works presented privacy-preserving distributed algorithms for a federation of genome data holders that spans multiple institutional and legislative domains to securely compute GWAS results....
conference paper 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Wu, Han (author), Zhao, Z. (author), Chen, Lydia Y. (author), van Moorsel, Aad (author)
Federated Learning (FL) has emerged as a potentially powerful privacy-preserving machine learning method-ology, since it avoids exchanging data between participants, but instead exchanges model parameters. FL has traditionally been applied to image, voice and similar data, but recently it has started to draw attention from domains including...
conference paper 2022
document
Li, Meng (author), Zhang, Mingwei (author), Gao, Jianbo (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Location-Based Services (LBSs) depend on a Service Provider (SP) to store data owners’ geospatial data and to process data users’ queries. For example, a Yelp user queries the SP to retrieve the k nearest Starbucks by submitting her/his current location. It is well-acknowledged that location privacy is vital to users and several prominent...
conference paper 2022
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020
document
Strucks, Christopher (author), Slokom, M. (author), Larson, M.A. (author)
Past research has demonstrated that removing implicit gender information from the user-item matrix does not result in substantial performance losses. Such results point towards promising solutions for protecting users’ privacy without compromising prediction performance, which are of particular interest in multistakeholder environments. Here,...
conference paper 2019
document
Shishkov, Boris (author), Janssen, M.F.W.H.A. (author)
Networked physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity, allow for run-time acquisition of user data. This in turn can enable information systems which capture the “current” user state and act accordingly. The use of this data would result in context...
conference paper 2018
document
Yin, Y. (author), Zuiderwijk-van Eijk, A.M.G. (author), Van Ossenbruggen, Jacco (author), Jeffery, Keith (author), Luthfi, A. (author), Janssen, M.F.W.H.A. (author)
Governments and publicly-funded research institutions increasingly open up data collected and created through research. One way to share and use data obtained through research is through Virtual Research Environments (VREs). Insights obtained through open data use in VREs can subsequently provide input for policy making. However, this process...
conference paper 2018
document
Domanski, Rob (author), Estevez, Elsa (author), Styrin, Evgeny (author), Alfano, M.R. (author), Harrison, Teresa M. (author)
In this panel, scholars discuss involving data, computational analysis, and information technology that hasthe potential to present ethical quandaries in the course of decision making related to digital government. More specifically, the presentations focus on algorithm-based decision making, personally identifiable information, and the...
conference paper 2018
document
Dijkhuis, Sander (author), van Wijk, R. (author), Dorhout, Hidde (author), Bharosa, Nitesh (author)
As a frequent participant in eSociety, Willeke is often preoccupied with paperwork because there is no easy to use, affordable way to act as a qualified person in the digital world. Confidential interactions take place over insecure channels like e-mail and post. This situation poses risks and costs for service providers, civilians and...
conference paper 2018
document
Luthfi, A. (author), Janssen, M.F.W.H.A. (author), Crompvoets, Joep (author)
Open government data initiatives result in the expectation of having open data available. Nevertheless, some potential risks like sensitivity, privacy, ownership, misinterpretation, and misuse of the data result in the reluctance of governments to open their data. At this moment, there is no comprehensive overview nor a model to understand the...
conference paper 2018
document
Bierens, R.H. (author), Klievink, A.J. (author), van den Berg, Jan (author)
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the...
conference paper 2017
document
Blenn, N. (author), Doerr, C. (author), Shadravan, N. (author), Van Mieghem, P. (author)
After the early land rush and fast exponential growth of online social networking platforms, concerns about how data placed in online social networks may be exploited and abused have begun to appear among mainstream users. Social networking sites have responded to these new public sentiments by introducing privacy filters to their site, allowing...
conference paper 2012
Searched for: +
(1 - 20 of 20)