Skip to main content
European Commission logo print header

Safe Data Enabled Economic Development

Deliverables

Data Management Plan

Initial report of the data management plan.

Deliver Qualified Synthetic Data v2

Qualified Synthetic Data sets will be made available publicly A second version will be available at M24

Deliver Qualified Synthetic Data (v1/2)

Qualified Synthetic Data sets will be made available publicly. A second version will be available at M24

Updated Data Management Plan

The Data Management Plan will describe the data that Safe-DEED will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.

Protocols for privacy-preserving data analytics and secure lead-time based pricing v1/2

This document reports on the cryptographic protocols developed for privacy-preserving data analytics and confidential lead time based pricing for use in WP6 and WP7. Task 5.2 contributes to this document. A new version will be available at M30

Baseline prototypes for data valuation

Based on a high-level architectural design specified in D4.1, this deliverable will provide a skeleton of the component, including prototypes of the component’s layers using open source data.

Implementation of cryptographic building blocks and specialized protocols v3

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Release of the Big Data Valuation component version 1

The final version of the component will be submitted and deployed in the Data Market Austria

Protocols for privacy-preserving data analytics and secure lead-time based pricing v2

This document reports on the cryptographic protocols developed for privacypreserving data analytics and confidential lead time based pricing for use in WP6 and WP7 Task 52 contributes to this document A new version will be available at M30

Implementation of cryptographic building blocks and specialized protocols v2

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Business model decision support tool

An interactive web app that allows business managers to design datadriven privacypreserving business models through design choices solution patterns and examples

Release of the Big Data Valuation component version 2

The final version of the component will be submitted and deployed in the Data Market Austria

Implementation of cryptographic building blocks and specialized protocols

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 5.1 as well as the specialized protocols in Task 5.2. Task 5.3 contributes to this document. New versions will be available at M24 and M36

Dissemination, Communication and Engagement Report v2

Yearly reports on activities delivered at M12 M24 and M36

Trust in Data Markets v2

This deliverable will describe the coordinated theory of trust in the data economy based on existing literature in the field of law and ethics This will consider two particular issues commodification of personal data and the tradebetween protection and individual empowerment over data eg data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure The first iteration will be highlevel exploration and a setting out of the research methodology for the surveys and semistructured interviews The second iteration will present the results of the surveys and interviews make a more indepth analysis of selected topics based on those results and present concrete recommendations for all stakeholders to foster trust in data markets A Revised version of this deliverable will be available at M36

Business models for use cases and generic business models

Report that summarizes the developed business models for the specific use cases generalized into generic business model patterns and examples

Ethical and Normative Valuation in Data Markets

This deliverable will be specify a concrete list of steps and criteria eg through reusable flowcharts andor questionnaires in order to identify and qualify the broader value ie beyond economical value of specific data market constellations

Report on the context-aware & context-unaware valuation

The deliverable D43 will present the methods what will be used for assigning value to a data set

Trust in Data Markets

This deliverable will describe the coordinated theory of trust in the data economy, based on existing literature in the field of law and ethics. This will consider two particular issues: commodification of personal data and the trade-between protection and individual empowerment over data (e.g. data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure). The first iteration will be high-level exploration and a setting out of the research methodology for the surveys and semi-structured interviews. The second iteration will present the results of the surveys and interviews, make a more in-depth analysis of selected topics based on those results, and present concrete recommendations for all stakeholders to foster trust in data markets. A Revised version of this deliverable will be available at M36.

Dissemination, Communication and Engagement Plan

Based on the proposal plan, constitutes a living document where partners synchronize their communication and engagement strategy

Legal and Ethical Requirements for non-Personal Data Use Case

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the non-personal data use case in WP7. The main focus will be on intellectual property law, competition law, network security and relevant legislative proposals at EU level such as the proposed Regulation for the free flow of non-personal data

Report on the application of re-identifcation techniques on use-case data v2

The report on the application of reidentification techniques on usecase data M12M24 documents our efforts to deanonymize data made available by usecase partners

Dissemination, Communication and Engagement Report v3

Yearly reports on activities delivered at M12 M24 and M36

Personal data Trials report final version

This final deliverable is an extension of D62 containing the complete details about all pilots on data driven content production In the phase the final project implementations will be tested All WP6 tasks contribute to this deliverable

Legal Framework and Ethical Issues

High-level description of applicable EU legal frameworks and identification of key requirements for Safe- DEED’s work in WP’s 2, 4, 5 and the use cases in WPs 6 and 7.

Safe-DEED Volume

Provides a coherent and relatively brief view of the projects successes

Dissemination, Communication and Engagement Report

Yearly reports on activities, delivered at M12, M24 and M36.

Quantification of economic impact

Report on the quantified impact of the developed technologies on business model metrics as developed in WP2 as well as generic economic indicators of trust value creation adoption and turnover

Report on the Professional Partners Community

Summarizes the materials made available fortraining and the results of the series of workshops organized at M18 and M33

User experiment report

Summarizes the findings from user experiments on the developed technologies. Is updated at M24 and at M36.

Legal and Ethical Requirements for Personal Data Use Case

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the personal data use case in WP6. The main focus will be on legal frameworks such as the GDPR, and the proposals for an ePrivacy Regulation and Digital Content Directive.

Threat and incentive model

Report on threat and incentives for sharing and using data from multi-actor perspective, validated through expert interviews and use cases

Syllabus for Teaching Module

Coherent set of teaching materials including slides reading documentation etc for a 90minutes teaching module based on SafeDEED insights and aimed at students in different disciplines

User experiment report v3

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

User experiment report v2

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

Report on the requirements and design

This deliverable will summarize the list of functional and technological requirements imposed on the Big Data Valuation Component based on the results of interviews with stakeholders.

Sustainable Business Strategy and Report

Reports on the market analysis performed at the beginning of the project the exploitation strategies envision by the partners and their outcome by the end of the project

Report on the application of re-identification techniques on use-case data

The report on the application of re-identification techniques on use-case data (M12/M24) documents our efforts to deanonymize data made available by use-case partners.

Requirements for secure computation on large datasets with multiple owners

This document describes the requirements in terms of performance characteristics and functionality from MPC/PSI and multi- user data-aggregation protocols.. Task 5.1 contributes to this document.

Low complexity primitives v1/2

This document reports on the improvements to low complexity primitives optimized for metrics important for PSI/MPC protocols. Task 5.1 contributes to this document. A second version is available at M24

PSI/MPC and multi-user data aggregation protocols v1/2

This document reports on the improvements to private set intersection, multiparty computation and multi-user data aggregation protocols. Task 5.1 contributes to this document. A second version will be available at M24

PSI/MPC and multi-user data aggregation protocols v2

This document reports on the improvements to private set intersection multiparty computation and multiuser data aggregation protocols Task 51 contributes to this document A second version will be available at M24

Low complexity primitives v2

This document reports on the improvements to low complexity primitives optimized for metrics important for PSIMPC protocols Task 51 contributes to this document A second version is available at M24

Webpage

The main digital presence of the project

Publications

Business Data Sharing through Data Marketplaces: A Systematic Literature Review

Author(s): Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk , Mark de Reuver
Published in: Journal of Theoretical and Applied Electronic Commerce Research, Issue Volume 16, Issue 7, 2021, Page(s) 3321-3339, ISSN 0718-1876
Publisher: Editorial Universidad de Talca
DOI: 10.3390/jtaer16070180

Formal Analysis and Estimation of Chance in Datasets Based on Their Properties

Author(s): Taha, Abdel Aziz; Papariello, Luca; Alexandros, Bampoulidis; Knoth, Petr; Lupu, Mihai
Published in: IEEE Transactions on Knowledge and Data Engineering, Issue 1, 2021, ISSN 1041-4347
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tkde.2021.3068009

Toward a Complete Data Valuation Process. Challenges of Personal Data

Author(s): Mihnea Tufiș, Ludovico Boratto
Published in: Journal of Data and Information Quality, Issue Volume 13, Issue 4, 2021, ISSN 1936-1955
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3447269

The Role of Ecosystem Data Governance in Adoption of Data Platforms by Internet-of-Things Data Providers: Case of Dutch Horticulture Industry

Author(s): Fabian De Prieelle, Mark De Reuver, Jafar Rezaei
Published in: IEEE Transactions on Engineering Management, 2020, Page(s) 1-11, ISSN 0018-9391
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2020.2966024

Business model tooling: where research and practice meet

Author(s): Harry Bouwman, Mark de Reuver, Marikka Heikkilä, Erwin Fielt
Published in: Electronic Markets, 2020, ISSN 1019-6781
Publisher: Springer Verlag
DOI: 10.1007/s12525-020-00424-5

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

Author(s): Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
Published in: 2021
Publisher: in review

Business model implications of privacy-preserving technologies in data marketplaces

Author(s): Wirawan Agahari, Riccardo Dolci, Mark de Reuver
Published in: 29th European Conference on Information Systems – Human Values Crisis in a Digitizing World, 2021
Publisher: Association of the Information Systems (AIS)

Practice and Challenges of (De-)Anonymisation for Data Sharing

Author(s): Alexandros Bampoulidis, Alessandro Bruni, Ioannis Markopoulos, Mihai Lupu
Published in: RCIS 2020. Lecture Notes in Business Information Processing, vol 385, 2020, ISBN 978-3-030-50316-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-50316-1_32

Understanding how privacy-preserving technologies transform data marketplace platforms and ecosystems: the case of Multi-Party Computation

Author(s): Wirawan Agahari, Mark de Reuver, Tobias Fiebig
Published in: 6th Innovation in Information Infrastructure (III) Workshop, 2019
Publisher: N/A

The Data-Driven Business Value Matrix - A Classification Scheme for Data-Driven Business Models

Author(s): Gert Breitfuss ,Michael Fruhwirth,Viktoria Pammer-Schindler,Hermann Stern, Sebastian Dennerlein
Published in: BLED 2019 Proceedings, 2019, Page(s) 803 – 821
Publisher: AIS Electronic Library

PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers

Author(s): Alexandros Bampoulidis, Ioannis Markopoulos, Mihai Lupu
Published in: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Page(s) 314-317, ISBN 9781450369886
Publisher: ACM Press
DOI: 10.1145/3358695.3360918

Consumer studies on digital platforms adoption and continuance: A structured literature review

Author(s): Roel Faber, Mark de Reuver
Published in: 27th European Conference on Information Systems - Information Systems for a Sharing Society, 2019, Page(s) 151-171, ISBN 978-1-7336325-0-8
Publisher: AIS Electronic Library

A Horizontal Patent Test Collection

Author(s): Mihai Lupu, Alexandros Bampoulidis, Luca Papariello
Published in: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, Page(s) 1213-1216, ISBN 9781450361729
Publisher: ACM
DOI: 10.1145/3331184.3331346

Multi-Party Computation (MPC) as Control Mechanism and its Effect on Firms' Participation in Data Sharing via Data Marketplaces

Author(s): Wirawan Agahari
Published in: Bled 2020 eConference Proceedings, 2020, ISBN 978-961-286-362-3
Publisher: University of Maribor Press
DOI: 10.18690/978-961-286-362-3

Data Service Cards - A Supporting Tool For Data-Driven Business

Author(s): Breitfuß, G., Fruhwirth, M., Wolf-Brenner, C., Riedl, A., De Reuver, M., Ginthoer, R., Pimas, O.
Published in: Bled 2020 eConference Proceedings, 2020, Page(s) 599 – 614, ISBN 978-961-286-362-3
Publisher: University of Maribor Press
DOI: 10.18690/978-961-286-362-3.40

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC

Author(s): Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Published in: Asiacrypt 2020, 2020, ISBN 978-3-030-64837-4
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-64837-4_16

Multi-party Revocation in Sovrin: Performance through Distributed Trust

Author(s): Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
Published in: Topics in Cryptology – CT-RSA 2021, 2021, Page(s) 527-551
Publisher: Springer
DOI: 10.1007/978-3-030-75539-3_22

On the Replicability of Combining Word Embeddings and Retrieval Models

Author(s): Luca Papariello, Alexandros Bampoulidis, Mihai Lupu
Published in: Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II, Issue 12036, 2020, Page(s) 50-57, ISBN 978-3-030-45441-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45442-5_7

Feistel Structures for MPC, and More

Author(s): Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Published in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Issue 11736, 2019, Page(s) 151-171, ISBN 978-3-030-29961-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_8

Chance influence in datasets with a large number of features

Author(s): Abdel Aziz Taha, Alexandros Bampoulidis, Mihai Lupu
Published in: Data Science – Analytics and Applications - Proceedings of the 2nd International Data Science Conference – iDSC2019, 2019, Page(s) 21-26, ISBN 978-3-658-27494-8
Publisher: Springer Fachmedien Wiesbaden
DOI: 10.1007/978-3-658-27495-5_2

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available