Leistungen
An abstract framework and easy-to-use cookbook for principles of decentralized and rights-preserving protocol design that finalizes the solutions found to the hard problems of Internet Science for decentralized systems given in D2.1.
Review 2 AssessmentThis deliverable will review and assess the activities, results, and progresses for the second review period, with a focus on privacy-enhanced collective intelligence and privacy-preserving messaging. This will provide a basis for each consortium member and engaged stakeholder (including other CAPS projects) to engage in further projects with increased performance and efficiency, but most importantly lay the scientific groundwork for a truly distributed and decentralized architecture for Europe.
Yearly Technical and Dissemination Assessment 1First yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.
Draft Decentralized Case-studiesThis subset of the list of case-studies will be finalized, and initial analysis completed over the communities to feed into the fundamental science of protocol design in WP2.
Privacy-Enhanced Analytics for Wisdom of the Crowds SimulationSimulation-based evaluation of the scalability of privacy-enhanced crowd-sourcing analytics built on a private information retrieval framework. Depends on D2.4
Publication-ready Philosophy of the InternetDue to discussion with NEXTLEAP and a to-be-chosen publisher (one that should enable 'green' access), the book on the Philosophy of the Internet should by the end of the project be publication-ready.
– Draft of Philosophy of the Internet and web hermeneutics bookThis will list chapters and general philosophical theses, to be discussed among the NEXTLEAP project partners. The history of the Internet and Web section should be completed by then.
Identifying communities, Use cases, Development flowsThis deliverable will select the projects (including but not limited to other CAPS projects) where we aim to integrate the decentralized protocols, describe accordingly their various use cases for these protocols, and outline development guidelines and roles within the development and validation processes.
Yearly Technical and Dissemination Assessment 2Second yearly update on technical progress and dissemination, focus on the privacy-preserving messaging use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.
Privacy Preserving Messaging Scalability SimulationsSimulation-based evaluation showing the scalability of NEXTLEAP private messaging protocols, with a key focus on quality of performance in comparison to centralized systems, in terms of properties like decentralization, privacy, security, or anonymity.
Dissemination PlanA dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1. The advisory board will be notified for input. The dissemination plan will also set objectives for each of the target audiences and develop a communication strategy tailored to the audience. Each of the target areas of outreach will have a champion from the Advisory Board.
– Principles of Decentralized Internet GovernanceThe principles of internet governance will be explored using the standpoint of science technology studies, with a focus on how to improve citizen participation and decentralization, as well as “fundamental rights” inspired by Berners-Lee's concept of a “magna carta” for the Web.
Initial Decentralization Case-studiesThis list of case-studies will be an initial list of up to 30 communities that could be investigated with ethnographic and social scientific methods. These communities will include ideally the open-source projects that will implement the NEXTLEAP protocols and existing CAPS projects.
Finalized Decentralized Case-studiesThe final analysis completed over the communities, including understanding the impact of any new protocols from NEXTLEAP into these communities.
Preliminary Education Plan and Draft Net RightsIn this deliverable the first version of education plan will be presented with topics and speakers on the philosophy of collective intelligence, Net Rights, the 'magna carta' for the Web, user privacy and encryption, contributive categorization, and more. It will be aligned with a seminar series focussed on a unified internet science around digital studies, rights, and protocols as well as an in-face summer school. A draft list of net rights will be selected for crowd-sourcing support.
Exploitation Plan for Decentralization Sustainability ModelsFinal update of the exploitation plan that takes into account first and foremost the long-term sustainability of decentralized Internet eco-systems. A focus will exist on commons-based non-market solutions and other metrics outside of profit, although the potential for profit-making enterprises, public-private partnerships, and the “privacy market” will also be assessed. This will be presented and a list of exploitation activities performed during the last year of the project will be reported.
Formal Modelling of Federated IdentityFormal definitions of decentralization, privacy, security, and anonymity properties will be developed and proven using automatic proof-proving on the federated identity protocol. Results will be validated against open-source code. Depends on D2.2.
Yearly Technical and Dissemination Assessment 3Third yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.
Policy Recommendations for Decentralized SystemsThis deliverable describes in a more 'easy-to-understand' language on a high-level the results on the previous deliverables on formal methods and simulations and so provides recommendations on a policy level for those wishing to support decentralization within an institutional framework in order to achieve data sovereignty.
Internet Science Vocabulary and Key QuestionsA list of key questions facing decentralized systems and initial agreed-upon common interdisciplinary vocabulary terms based on Internet Science.
Review 1 AssessmentThis deliverable will review and assess the activities, results, and progress of the first review period. This will provide a basis for moving into the second review period and examine where the consortium was successful and where improvements are needed for the following review period. This deliverable will focus on assessing the progress made on the sociological case studies for decentralization and the secure address-book.
Standardization ReportThe standardization-related efforts and achievements will be collected in this report, with a focus on federated identity, secure asynchronous messaging (email), synchronous messaging, and privacy-enhanced crowd-sourcing for collective intelligence via privacy-enhanced cloud analytics. The state of the standardization of each of these deliverables and their uptake by both grassroots-activists, governments, and industry will be assessed.
Scalability Simulations for Federated IdentitySimulation-based evaluation showing the scalability of NEXTLEAP federated identity protocols in terms of properties like decentralization, privacy, security, or anonymity.
Privacy Preserving Messaging Formal ModellingModels of messaging protocols from WP2 with respect to a number of possible primitives for properties related to decentralization, privacy, security, and anonymity.
Complete Education Report and Finalized Net RightsWe will update D6.4 with exploitation activities already performed and results from the online categorization and participatory contributions in the seminar series. The list of net rights, based on crowd-sourced support, will be finalized.
A module producing code for private information retrieval for crowd-sourcing analytics will be produced. Since the module will be used primarily to ask questions of users, a “lean design” round will not be needed proof-proving results.
Releasing Initial PrototypesInitial prototypes for protocols for identity and privacy-preserving are released to the public and communicated to previously identified communities.
Privacy-Preserving End-to-End Encrypted MessagingTwo protocols, with an upgrade path, for both secure and privacy-preserving end-to-end encrypted synchronous and asynchronous messaging across decentralized systems. A revised federated secure identity protocol may be included based on feedback.
Federated Secure Identity ProtocolAn initial design of a federated identity system that protects the user's social graph using a secure address-book and associates an identity with key material across different systems in a privacy-preserving manner.
Privacy-Preserving Analytics for Wisdom of CrowdsA protocol for privacy-preserving analytics that allow collective intelligence tasks based on machine-learning to be accomplished over end-to-end encrypted and decentralized systems.
Validated modules for Federated Identity and Privacy-Preserving End-to-End Encrypted MessagingBased on feedback and user-experience “lean design” rounds prototypes with the selected user-bases will be refactored and improved to the point of being ready for integration with real-life projects.
A public webpage, including a repository of all videos, contributions, seminars, and will be created and updated throughout the duration of the project.
Veröffentlichungen
Autoren:
Sparrow, Elijah; Halpin, Harry; Kaneko, Kali; Pollan, Ruben
Veröffentlicht in:
Proceedings of the Cryptography and Applied Network Security Conference, Ausgabe 6, 2016
Herausgeber:
Springer
DOI:
10.1007/978-3-319-48965-0_11
Autoren:
Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
Veröffentlicht in:
2017 IEEE European Symposium on Security and Privacy (EuroS&P), Ausgabe 2017, 2017, Seite(n) 435-450, ISBN 978-1-5090-5762-7
Herausgeber:
IEEE
DOI:
10.1109/EuroSP.2017.38
Autoren:
Ksenia Ermoshina, Francesca Musiani, Harry Halpin
Veröffentlicht in:
Proceedings of the Internet Science Conference, Ausgabe 2016, 2016, Seite(n) 244-254
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-319-45982-0_22
Autoren:
Fiore, Dario; Nitulescu, Anca
Veröffentlicht in:
TCC 2016-B - Fourteenth IACR Theory of Cryptography Conference, Ausgabe 7, 2016, Seite(n) 138-144
Herausgeber:
Springer
DOI:
10.1007/978-3-662-53641-4_5
Autoren:
Marios Isaakidis, Harry Halpin, George Danezis
Veröffentlicht in:
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society - WPES'16, Ausgabe 2016, 2016, Seite(n) 139-142, ISBN 9781-450345699
Herausgeber:
ACM Press
DOI:
10.1145/2994620.2994637
Autoren:
Halpin, Harry
Veröffentlicht in:
Proceedings of Hot Topics in Privacy Enhancing Technolgies, Ausgabe 10, 2016, Seite(n) https://www.petsymposium.org/2016/hotpets.php
Herausgeber:
Online
Autoren:
Kelsey Cairns, Harry Halpin, Graham Steel
Veröffentlicht in:
Proceedings of the Security Standardisation Research Conference, Ausgabe 2016, 2016, Seite(n) 112-140
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-319-49100-4_5
Autoren:
Iness Ben Guirat, Harry Halpin
Veröffentlicht in:
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security - HoTSoS '18, Ausgabe 6, 2018, Seite(n) 1-10, ISBN 9781-450364553
Herausgeber:
ACM Press
DOI:
10.1145/3190619.3190640
Autoren:
Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso
Veröffentlicht in:
Proceedings of the 2018 Workshop on Privacy in the Electronic Society - WPES'18, Ausgabe 2018, 2018, Seite(n) 86-103, ISBN 9781-450359894
Herausgeber:
ACM Press
DOI:
10.1145/3267323.3268947
Autoren:
Harry Halpin, Alexandre Monnin
Veröffentlicht in:
First Monday, Ausgabe 21/12, 2016, ISSN 1396-0466
Herausgeber:
Munksgaard International Publishers
DOI:
10.5210/fm.v21i12.7109
Autoren:
Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
Veröffentlicht in:
Proceedings on Privacy Enhancing Technologies, Ausgabe 2017/4, 2017, Seite(n) 404-426, ISSN 2299-0984
Herausgeber:
DeGruyter Press
DOI:
10.1515/popets-2017-0056
Autoren:
Francesca Musiani, Ksenia Ermoshina
Veröffentlicht in:
Westminster Papers in Communication and Culture, Ausgabe 12/3, 2017, Seite(n) 51-71, ISSN 1744-6716
Herausgeber:
University of Westminister
DOI:
10.16997/wpcc.265
Autoren:
Ksenia Ermoshina, Francesca Musiani
Veröffentlicht in:
Media and Communication, Ausgabe 5/1, 2017, Seite(n) 42, ISSN 2183-2439
Herausgeber:
Cogitatio Press
DOI:
10.17645/mac.v5i1.816
Autoren:
Harry Halpin, Ksenia Ermoshina, Francesca Musiani
Veröffentlicht in:
Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings, Ausgabe 11322, 2018, Seite(n) 56-75, ISBN 978-3-030-04761-0
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-030-04762-7_4
Autoren:
Harry Halpin
Veröffentlicht in:
Security, Privacy, and Applied Cryptography Engineering, Ausgabe 10662, 2017, Seite(n) 10-29, ISBN 978-3-319-71500-1
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-319-71501-8_2
Autoren:
Bernard Stiegler
Veröffentlicht in:
Critical Climate Chaos, 2018, Seite(n) 349, ISBN 978-1-78542-049-8
Herausgeber:
Open Humanities Press
Suche nach OpenAIRE-Daten ...
Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten
Es liegen keine Ergebnisse vor