Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Safe Data Enabled Economic Development

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Data Management Plan (öffnet in neuem Fenster)

Initial report of the data management plan.

Deliver Qualified Synthetic Data v2 (öffnet in neuem Fenster)

Qualified Synthetic Data sets will be made available publicly A second version will be available at M24

Deliver Qualified Synthetic Data (v1/2) (öffnet in neuem Fenster)

Qualified Synthetic Data sets will be made available publicly. A second version will be available at M24

Updated Data Management Plan (öffnet in neuem Fenster)

The Data Management Plan will describe the data that Safe-DEED will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.

Protocols for privacy-preserving data analytics and secure lead-time based pricing v1/2 (öffnet in neuem Fenster)

This document reports on the cryptographic protocols developed for privacy-preserving data analytics and confidential lead time based pricing for use in WP6 and WP7. Task 5.2 contributes to this document. A new version will be available at M30

Baseline prototypes for data valuation (öffnet in neuem Fenster)

Based on a high-level architectural design specified in D4.1, this deliverable will provide a skeleton of the component, including prototypes of the component’s layers using open source data.

Implementation of cryptographic building blocks and specialized protocols v3 (öffnet in neuem Fenster)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Release of the Big Data Valuation component version 1 (öffnet in neuem Fenster)

The final version of the component will be submitted and deployed in the Data Market Austria

Protocols for privacy-preserving data analytics and secure lead-time based pricing v2 (öffnet in neuem Fenster)

This document reports on the cryptographic protocols developed for privacypreserving data analytics and confidential lead time based pricing for use in WP6 and WP7 Task 52 contributes to this document A new version will be available at M30

Implementation of cryptographic building blocks and specialized protocols v2 (öffnet in neuem Fenster)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Business model decision support tool (öffnet in neuem Fenster)

An interactive web app that allows business managers to design datadriven privacypreserving business models through design choices solution patterns and examples

Release of the Big Data Valuation component version 2 (öffnet in neuem Fenster)

The final version of the component will be submitted and deployed in the Data Market Austria

Implementation of cryptographic building blocks and specialized protocols (öffnet in neuem Fenster)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 5.1 as well as the specialized protocols in Task 5.2. Task 5.3 contributes to this document. New versions will be available at M24 and M36

Dissemination, Communication and Engagement Report v2 (öffnet in neuem Fenster)

Yearly reports on activities delivered at M12 M24 and M36

Trust in Data Markets v2 (öffnet in neuem Fenster)

This deliverable will describe the coordinated theory of trust in the data economy based on existing literature in the field of law and ethics This will consider two particular issues commodification of personal data and the tradebetween protection and individual empowerment over data eg data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure The first iteration will be highlevel exploration and a setting out of the research methodology for the surveys and semistructured interviews The second iteration will present the results of the surveys and interviews make a more indepth analysis of selected topics based on those results and present concrete recommendations for all stakeholders to foster trust in data markets A Revised version of this deliverable will be available at M36

Business models for use cases and generic business models (öffnet in neuem Fenster)

Report that summarizes the developed business models for the specific use cases generalized into generic business model patterns and examples

Ethical and Normative Valuation in Data Markets (öffnet in neuem Fenster)

This deliverable will be specify a concrete list of steps and criteria eg through reusable flowcharts andor questionnaires in order to identify and qualify the broader value ie beyond economical value of specific data market constellations

Report on the context-aware & context-unaware valuation (öffnet in neuem Fenster)

The deliverable D43 will present the methods what will be used for assigning value to a data set

Trust in Data Markets (öffnet in neuem Fenster)

This deliverable will describe the coordinated theory of trust in the data economy, based on existing literature in the field of law and ethics. This will consider two particular issues: commodification of personal data and the trade-between protection and individual empowerment over data (e.g. data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure). The first iteration will be high-level exploration and a setting out of the research methodology for the surveys and semi-structured interviews. The second iteration will present the results of the surveys and interviews, make a more in-depth analysis of selected topics based on those results, and present concrete recommendations for all stakeholders to foster trust in data markets. A Revised version of this deliverable will be available at M36.

Dissemination, Communication and Engagement Plan (öffnet in neuem Fenster)

Based on the proposal plan, constitutes a living document where partners synchronize their communication and engagement strategy

Legal and Ethical Requirements for non-Personal Data Use Case (öffnet in neuem Fenster)

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the non-personal data use case in WP7. The main focus will be on intellectual property law, competition law, network security and relevant legislative proposals at EU level such as the proposed Regulation for the free flow of non-personal data

Report on the application of re-identifcation techniques on use-case data v2 (öffnet in neuem Fenster)

The report on the application of reidentification techniques on usecase data M12M24 documents our efforts to deanonymize data made available by usecase partners

Dissemination, Communication and Engagement Report v3 (öffnet in neuem Fenster)

Yearly reports on activities delivered at M12 M24 and M36

Personal data Trials report final version (öffnet in neuem Fenster)

This final deliverable is an extension of D62 containing the complete details about all pilots on data driven content production In the phase the final project implementations will be tested All WP6 tasks contribute to this deliverable

Legal Framework and Ethical Issues (öffnet in neuem Fenster)

High-level description of applicable EU legal frameworks and identification of key requirements for Safe- DEED’s work in WP’s 2, 4, 5 and the use cases in WPs 6 and 7.

Safe-DEED Volume (öffnet in neuem Fenster)

Provides a coherent and relatively brief view of the projects successes

Dissemination, Communication and Engagement Report (öffnet in neuem Fenster)

Yearly reports on activities, delivered at M12, M24 and M36.

Quantification of economic impact (öffnet in neuem Fenster)

Report on the quantified impact of the developed technologies on business model metrics as developed in WP2 as well as generic economic indicators of trust value creation adoption and turnover

Report on the Professional Partners Community (öffnet in neuem Fenster)

Summarizes the materials made available fortraining and the results of the series of workshops organized at M18 and M33

User experiment report (öffnet in neuem Fenster)

Summarizes the findings from user experiments on the developed technologies. Is updated at M24 and at M36.

Legal and Ethical Requirements for Personal Data Use Case (öffnet in neuem Fenster)

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the personal data use case in WP6. The main focus will be on legal frameworks such as the GDPR, and the proposals for an ePrivacy Regulation and Digital Content Directive.

Threat and incentive model (öffnet in neuem Fenster)

Report on threat and incentives for sharing and using data from multi-actor perspective, validated through expert interviews and use cases

Syllabus for Teaching Module (öffnet in neuem Fenster)

Coherent set of teaching materials including slides reading documentation etc for a 90minutes teaching module based on SafeDEED insights and aimed at students in different disciplines

User experiment report v3 (öffnet in neuem Fenster)

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

User experiment report v2 (öffnet in neuem Fenster)

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

Report on the requirements and design (öffnet in neuem Fenster)

This deliverable will summarize the list of functional and technological requirements imposed on the Big Data Valuation Component based on the results of interviews with stakeholders.

Sustainable Business Strategy and Report (öffnet in neuem Fenster)

Reports on the market analysis performed at the beginning of the project the exploitation strategies envision by the partners and their outcome by the end of the project

Report on the application of re-identification techniques on use-case data (öffnet in neuem Fenster)

The report on the application of re-identification techniques on use-case data (M12/M24) documents our efforts to deanonymize data made available by use-case partners.

Requirements for secure computation on large datasets with multiple owners (öffnet in neuem Fenster)

This document describes the requirements in terms of performance characteristics and functionality from MPC/PSI and multi- user data-aggregation protocols.. Task 5.1 contributes to this document.

Low complexity primitives v1/2 (öffnet in neuem Fenster)

This document reports on the improvements to low complexity primitives optimized for metrics important for PSI/MPC protocols. Task 5.1 contributes to this document. A second version is available at M24

PSI/MPC and multi-user data aggregation protocols v1/2 (öffnet in neuem Fenster)

This document reports on the improvements to private set intersection, multiparty computation and multi-user data aggregation protocols. Task 5.1 contributes to this document. A second version will be available at M24

PSI/MPC and multi-user data aggregation protocols v2 (öffnet in neuem Fenster)

This document reports on the improvements to private set intersection multiparty computation and multiuser data aggregation protocols Task 51 contributes to this document A second version will be available at M24

Low complexity primitives v2 (öffnet in neuem Fenster)

This document reports on the improvements to low complexity primitives optimized for metrics important for PSIMPC protocols Task 51 contributes to this document A second version is available at M24

Veröffentlichungen

Business Data Sharing through Data Marketplaces: A Systematic Literature Review (öffnet in neuem Fenster)

Autoren: Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk , Mark de Reuver
Veröffentlicht in: Journal of Theoretical and Applied Electronic Commerce Research, Ausgabe Volume 16, Ausgabe 7, 2021, Seite(n) 3321-3339, ISSN 0718-1876
Herausgeber: Editorial Universidad de Talca
DOI: 10.3390/jtaer16070180

Formal Analysis and Estimation of Chance in Datasets Based on Their Properties (öffnet in neuem Fenster)

Autoren: Taha, Abdel Aziz; Papariello, Luca; Alexandros, Bampoulidis; Knoth, Petr; Lupu, Mihai
Veröffentlicht in: IEEE Transactions on Knowledge and Data Engineering, Ausgabe 1, 2021, ISSN 1041-4347
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tkde.2021.3068009

Toward a Complete Data Valuation Process. Challenges of Personal Data (öffnet in neuem Fenster)

Autoren: Mihnea Tufiș, Ludovico Boratto
Veröffentlicht in: Journal of Data and Information Quality, Ausgabe Volume 13, Ausgabe 4, 2021, ISSN 1936-1955
Herausgeber: Association for Computing Machinary, Inc.
DOI: 10.1145/3447269

The Role of Ecosystem Data Governance in Adoption of Data Platforms by Internet-of-Things Data Providers: Case of Dutch Horticulture Industry (öffnet in neuem Fenster)

Autoren: Fabian De Prieelle, Mark De Reuver, Jafar Rezaei
Veröffentlicht in: IEEE Transactions on Engineering Management, 2020, Seite(n) 1-11, ISSN 0018-9391
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2020.2966024

Business model tooling: where research and practice meet (öffnet in neuem Fenster)

Autoren: Harry Bouwman, Mark de Reuver, Marikka Heikkilä, Erwin Fielt
Veröffentlicht in: Electronic Markets, 2020, ISSN 1019-6781
Herausgeber: Springer Verlag
DOI: 10.1007/s12525-020-00424-5

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

Autoren: Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
Veröffentlicht in: 2021
Herausgeber: in review

Business model implications of privacy-preserving technologies in data marketplaces

Autoren: Wirawan Agahari, Riccardo Dolci, Mark de Reuver
Veröffentlicht in: 29th European Conference on Information Systems – Human Values Crisis in a Digitizing World, 2021
Herausgeber: Association of the Information Systems (AIS)

Practice and Challenges of (De-)Anonymisation for Data Sharing (öffnet in neuem Fenster)

Autoren: Alexandros Bampoulidis, Alessandro Bruni, Ioannis Markopoulos, Mihai Lupu
Veröffentlicht in: RCIS 2020. Lecture Notes in Business Information Processing, vol 385, 2020, ISBN 978-3-030-50316-1
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-50316-1_32

Understanding how privacy-preserving technologies transform data marketplace platforms and ecosystems: the case of Multi-Party Computation

Autoren: Wirawan Agahari, Mark de Reuver, Tobias Fiebig
Veröffentlicht in: 6th Innovation in Information Infrastructure (III) Workshop, 2019
Herausgeber: N/A

The Data-Driven Business Value Matrix - A Classification Scheme for Data-Driven Business Models

Autoren: Gert Breitfuss ,Michael Fruhwirth,Viktoria Pammer-Schindler,Hermann Stern, Sebastian Dennerlein
Veröffentlicht in: BLED 2019 Proceedings, 2019, Seite(n) 803 – 821
Herausgeber: AIS Electronic Library

PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers (öffnet in neuem Fenster)

Autoren: Alexandros Bampoulidis, Ioannis Markopoulos, Mihai Lupu
Veröffentlicht in: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Seite(n) 314-317, ISBN 9781450369886
Herausgeber: ACM Press
DOI: 10.1145/3358695.3360918

Consumer studies on digital platforms adoption and continuance: A structured literature review

Autoren: Roel Faber, Mark de Reuver
Veröffentlicht in: 27th European Conference on Information Systems - Information Systems for a Sharing Society, 2019, Seite(n) 151-171, ISBN 978-1-7336325-0-8
Herausgeber: AIS Electronic Library

A Horizontal Patent Test Collection (öffnet in neuem Fenster)

Autoren: Mihai Lupu, Alexandros Bampoulidis, Luca Papariello
Veröffentlicht in: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, Seite(n) 1213-1216, ISBN 9781450361729
Herausgeber: ACM
DOI: 10.1145/3331184.3331346

Multi-Party Computation (MPC) as Control Mechanism and its Effect on Firms' Participation in Data Sharing via Data Marketplaces (öffnet in neuem Fenster)

Autoren: Wirawan Agahari
Veröffentlicht in: Bled 2020 eConference Proceedings, 2020, ISBN 978-961-286-362-3
Herausgeber: University of Maribor Press
DOI: 10.18690/978-961-286-362-3

Data Service Cards - A Supporting Tool For Data-Driven Business (öffnet in neuem Fenster)

Autoren: Breitfuß, G., Fruhwirth, M., Wolf-Brenner, C., Riedl, A., De Reuver, M., Ginthoer, R., Pimas, O.
Veröffentlicht in: Bled 2020 eConference Proceedings, 2020, Seite(n) 599 – 614, ISBN 978-961-286-362-3
Herausgeber: University of Maribor Press
DOI: 10.18690/978-961-286-362-3.40

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC (öffnet in neuem Fenster)

Autoren: Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Veröffentlicht in: Asiacrypt 2020, 2020, ISBN 978-3-030-64837-4
Herausgeber: Springer, Cham
DOI: 10.1007/978-3-030-64837-4_16

Multi-party Revocation in Sovrin: Performance through Distributed Trust (öffnet in neuem Fenster)

Autoren: Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
Veröffentlicht in: Topics in Cryptology – CT-RSA 2021, 2021, Seite(n) 527-551
Herausgeber: Springer
DOI: 10.1007/978-3-030-75539-3_22

On the Replicability of Combining Word Embeddings and Retrieval Models (öffnet in neuem Fenster)

Autoren: Luca Papariello, Alexandros Bampoulidis, Mihai Lupu
Veröffentlicht in: Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II, Ausgabe 12036, 2020, Seite(n) 50-57, ISBN 978-3-030-45441-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-45442-5_7

Feistel Structures for MPC, and More (öffnet in neuem Fenster)

Autoren: Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Veröffentlicht in: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Ausgabe 11736, 2019, Seite(n) 151-171, ISBN 978-3-030-29961-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_8

Chance influence in datasets with a large number of features (öffnet in neuem Fenster)

Autoren: Abdel Aziz Taha, Alexandros Bampoulidis, Mihai Lupu
Veröffentlicht in: Data Science – Analytics and Applications - Proceedings of the 2nd International Data Science Conference – iDSC2019, 2019, Seite(n) 21-26, ISBN 978-3-658-27494-8
Herausgeber: Springer Fachmedien Wiesbaden
DOI: 10.1007/978-3-658-27495-5_2

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0