- document
-
Ishmaev, G. (author)Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the...journal article 2020
- document
-
Nandakumar, Lakshminarayanan (author), Tillem, G. (author), Erkin, Z. (author), Keviczky, T. (author)Smart grids promise a more reliable, efficient, economically viable, and environment-friendly electricity infrastructure for the future. State estimation in smart grids plays a pivotal role in system monitoring, reliable operation, automation, and grid stabilization. However, the power consumption data collected from the users during state...journal article 2019
- document
-
Allhoff, Fritz (author), Henschke, A.H. (author)This paper surveys foundational ethical issues that attach to the Internet of Things (IoT). In Section 1, we provide an overview of the technology, indicating both current and future applications. Subsequent sections consider particular ethical issues, including: informed consent (Section 2), privacy (Section 3), information security (Section...journal article 2018
- document
-
Slokom, M. (author), Hanjalic, A. (author), Larson, M.A. (author)In this paper, we propose a new privacy solution for the data used to train a recommender system, i.e., the user–item matrix. The user–item matrix contains implicit information, which can be inferred using a classifier, leading to potential privacy violations. Our solution, called Personalized Blurring (PerBlur), is a simple, yet effective,...journal article 2021
- document
-
Ofe, H.A. (author), Minnema, Harm (author), de Reuver, Mark (author)Purpose: This paper aims to propose a framework for how privacy-preserving technologies (PETs) create business value for organizations. The framework was developed by examining the literature on privacy and information technology’s impact (symbolic and function). The authors evaluate the framework’s applicability using multiparty computation ...journal article 2022
- document
-
Musick, Geoff (author), Duan, Wen (author), Najafian, S. (author), Sengupta, Subhasree (author), Flathmann, Christopher (author), Knijnenburg, Bart (author), McNeese, Nathan (author)Newly-formed teams often encounter the challenge of members coming together to collaborate on a project without prior knowledge of each other’s working and communication styles. This lack of familiarity can lead to conflicts and misunderstandings, hindering effective teamwork. Derived from research in social recommender systems, team...journal article 2024
- document
-
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...journal article 2023
- document
-
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart...journal article 2016
- document
-
Mahieu, R.L.P. (author), van Eck, Nees Jan (author), van Putten, D.C. (author), van den Hoven, M.J. (author)Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical problems emerge. The academic field that addresses these problems—which we tentatively call ‘digital ethics’—can be an important intellectual resource for policy making and regulation. This is why it is important to understand how the new...journal article 2018
- document
-
Bentinck, S.A. (author), van Oel, C.J. (author), van Dorst, M.J. (author)Informal face-to-face communication and chance encounters encourage knowledge sharing. This Post-Occupancy Evaluation (POE) examines how well a new building of a Dutch University Institute (DI) supported interaction and perceived privacy among faculty members. The study is designed as a qualitative research project with in-depth interviews...journal article 2020
- document
-
Ishmaev, G. (author)This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest presents solutions aimed at reorganizing data flows in the Internet of Things (IoT) architectures, enabling the secure and decentralized...journal article 2019
- document
-
Kraaij, Wessel (author), Verberne, Suzan (author), Koldijk, Saskia (author), de Korte, E.M. (author), van Dantzig, Saskia (author), Sappelli, Maya (author), Hulsebosch, Bob (author), Wabeke, Thymen (author), Neerincx, M.A. (author)Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...journal article 2019
- document
-
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...journal article 2023
- document
-
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...journal article 2023
- document
-
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...journal article 2023
- document
-
Ding, Aaron Yi (author), van den Boogert, R.J. (author)With rising numbers of people living in cities leading to increasing congestion and pollution, mobile crowdsensing applications form a potential solution to make transport systems smarter and more efficient. However, sharing data comes with the risk of private information being disclosed. Therefore, a clear incentive is necessary to motivate...journal article 2023
- document
-
Chiasson, David (author), Lin, Yuan (author), Kok, M. (author), Shull, Peter (author)Hyperbolic localization measures the time difference of arrivals (TDOAs) of signals to determine the location of a wireless source or receiver. Traditional methods depend on precise clock synchronization between nodes so that time measurements from independent devices can be meaningfully compared. Imperfect synchronization is often the dominant...journal article 2023
- document
-
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Martinelli, Fabio (author), Alazab, Mamoun (author)Security and privacy issues have become a major hindrance to the broad adoption of Ride-Hailing Services (RHSs). In this article, we introduce a new collusion attack initiated by the Ride-Hailing Service Provider (RHSP) and a driver that could easily link the real riders and their anonymous requests (credentials). Besides this attack,...journal article 2022
- document
-
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...journal article 2023
- document
-
Prasad, Nivedita (author)People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...master thesis 2019