Skip to main content
Aller à la page d’accueil de la Commission européenne (s’ouvre dans une nouvelle fenêtre)
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Safe Data Enabled Economic Development

CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.

Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .

Livrables

Data Management Plan (s’ouvre dans une nouvelle fenêtre)

Initial report of the data management plan.

Deliver Qualified Synthetic Data v2 (s’ouvre dans une nouvelle fenêtre)

Qualified Synthetic Data sets will be made available publicly A second version will be available at M24

Deliver Qualified Synthetic Data (v1/2) (s’ouvre dans une nouvelle fenêtre)

Qualified Synthetic Data sets will be made available publicly. A second version will be available at M24

Updated Data Management Plan (s’ouvre dans une nouvelle fenêtre)

The Data Management Plan will describe the data that Safe-DEED will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.

Protocols for privacy-preserving data analytics and secure lead-time based pricing v1/2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the cryptographic protocols developed for privacy-preserving data analytics and confidential lead time based pricing for use in WP6 and WP7. Task 5.2 contributes to this document. A new version will be available at M30

Baseline prototypes for data valuation (s’ouvre dans une nouvelle fenêtre)

Based on a high-level architectural design specified in D4.1, this deliverable will provide a skeleton of the component, including prototypes of the component’s layers using open source data.

Implementation of cryptographic building blocks and specialized protocols v3 (s’ouvre dans une nouvelle fenêtre)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Release of the Big Data Valuation component version 1 (s’ouvre dans une nouvelle fenêtre)

The final version of the component will be submitted and deployed in the Data Market Austria

Protocols for privacy-preserving data analytics and secure lead-time based pricing v2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the cryptographic protocols developed for privacypreserving data analytics and confidential lead time based pricing for use in WP6 and WP7 Task 52 contributes to this document A new version will be available at M30

Implementation of cryptographic building blocks and specialized protocols v2 (s’ouvre dans une nouvelle fenêtre)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36

Business model decision support tool (s’ouvre dans une nouvelle fenêtre)

An interactive web app that allows business managers to design datadriven privacypreserving business models through design choices solution patterns and examples

Release of the Big Data Valuation component version 2 (s’ouvre dans une nouvelle fenêtre)

The final version of the component will be submitted and deployed in the Data Market Austria

Implementation of cryptographic building blocks and specialized protocols (s’ouvre dans une nouvelle fenêtre)

This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 5.1 as well as the specialized protocols in Task 5.2. Task 5.3 contributes to this document. New versions will be available at M24 and M36

Dissemination, Communication and Engagement Report v2 (s’ouvre dans une nouvelle fenêtre)

Yearly reports on activities delivered at M12 M24 and M36

Trust in Data Markets v2 (s’ouvre dans une nouvelle fenêtre)

This deliverable will describe the coordinated theory of trust in the data economy based on existing literature in the field of law and ethics This will consider two particular issues commodification of personal data and the tradebetween protection and individual empowerment over data eg data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure The first iteration will be highlevel exploration and a setting out of the research methodology for the surveys and semistructured interviews The second iteration will present the results of the surveys and interviews make a more indepth analysis of selected topics based on those results and present concrete recommendations for all stakeholders to foster trust in data markets A Revised version of this deliverable will be available at M36

Business models for use cases and generic business models (s’ouvre dans une nouvelle fenêtre)

Report that summarizes the developed business models for the specific use cases generalized into generic business model patterns and examples

Ethical and Normative Valuation in Data Markets (s’ouvre dans une nouvelle fenêtre)

This deliverable will be specify a concrete list of steps and criteria eg through reusable flowcharts andor questionnaires in order to identify and qualify the broader value ie beyond economical value of specific data market constellations

Report on the context-aware & context-unaware valuation (s’ouvre dans une nouvelle fenêtre)

The deliverable D43 will present the methods what will be used for assigning value to a data set

Trust in Data Markets (s’ouvre dans une nouvelle fenêtre)

This deliverable will describe the coordinated theory of trust in the data economy, based on existing literature in the field of law and ethics. This will consider two particular issues: commodification of personal data and the trade-between protection and individual empowerment over data (e.g. data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure). The first iteration will be high-level exploration and a setting out of the research methodology for the surveys and semi-structured interviews. The second iteration will present the results of the surveys and interviews, make a more in-depth analysis of selected topics based on those results, and present concrete recommendations for all stakeholders to foster trust in data markets. A Revised version of this deliverable will be available at M36.

Dissemination, Communication and Engagement Plan (s’ouvre dans une nouvelle fenêtre)

Based on the proposal plan, constitutes a living document where partners synchronize their communication and engagement strategy

Legal and Ethical Requirements for non-Personal Data Use Case (s’ouvre dans une nouvelle fenêtre)

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the non-personal data use case in WP7. The main focus will be on intellectual property law, competition law, network security and relevant legislative proposals at EU level such as the proposed Regulation for the free flow of non-personal data

Report on the application of re-identifcation techniques on use-case data v2 (s’ouvre dans une nouvelle fenêtre)

The report on the application of reidentification techniques on usecase data M12M24 documents our efforts to deanonymize data made available by usecase partners

Dissemination, Communication and Engagement Report v3 (s’ouvre dans une nouvelle fenêtre)

Yearly reports on activities delivered at M12 M24 and M36

Personal data Trials report final version (s’ouvre dans une nouvelle fenêtre)

This final deliverable is an extension of D62 containing the complete details about all pilots on data driven content production In the phase the final project implementations will be tested All WP6 tasks contribute to this deliverable

Legal Framework and Ethical Issues (s’ouvre dans une nouvelle fenêtre)

High-level description of applicable EU legal frameworks and identification of key requirements for Safe- DEED’s work in WP’s 2, 4, 5 and the use cases in WPs 6 and 7.

Safe-DEED Volume (s’ouvre dans une nouvelle fenêtre)

Provides a coherent and relatively brief view of the projects successes

Dissemination, Communication and Engagement Report (s’ouvre dans une nouvelle fenêtre)

Yearly reports on activities, delivered at M12, M24 and M36.

Quantification of economic impact (s’ouvre dans une nouvelle fenêtre)

Report on the quantified impact of the developed technologies on business model metrics as developed in WP2 as well as generic economic indicators of trust value creation adoption and turnover

Report on the Professional Partners Community (s’ouvre dans une nouvelle fenêtre)

Summarizes the materials made available fortraining and the results of the series of workshops organized at M18 and M33

User experiment report (s’ouvre dans une nouvelle fenêtre)

Summarizes the findings from user experiments on the developed technologies. Is updated at M24 and at M36.

Legal and Ethical Requirements for Personal Data Use Case (s’ouvre dans une nouvelle fenêtre)

Concrete specification of the legal and ethical requirements that need to be taken into account for the development of the personal data use case in WP6. The main focus will be on legal frameworks such as the GDPR, and the proposals for an ePrivacy Regulation and Digital Content Directive.

Threat and incentive model (s’ouvre dans une nouvelle fenêtre)

Report on threat and incentives for sharing and using data from multi-actor perspective, validated through expert interviews and use cases

Syllabus for Teaching Module (s’ouvre dans une nouvelle fenêtre)

Coherent set of teaching materials including slides reading documentation etc for a 90minutes teaching module based on SafeDEED insights and aimed at students in different disciplines

User experiment report v3 (s’ouvre dans une nouvelle fenêtre)

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

User experiment report v2 (s’ouvre dans une nouvelle fenêtre)

Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36

Report on the requirements and design (s’ouvre dans une nouvelle fenêtre)

This deliverable will summarize the list of functional and technological requirements imposed on the Big Data Valuation Component based on the results of interviews with stakeholders.

Sustainable Business Strategy and Report (s’ouvre dans une nouvelle fenêtre)

Reports on the market analysis performed at the beginning of the project the exploitation strategies envision by the partners and their outcome by the end of the project

Report on the application of re-identification techniques on use-case data (s’ouvre dans une nouvelle fenêtre)

The report on the application of re-identification techniques on use-case data (M12/M24) documents our efforts to deanonymize data made available by use-case partners.

Requirements for secure computation on large datasets with multiple owners (s’ouvre dans une nouvelle fenêtre)

This document describes the requirements in terms of performance characteristics and functionality from MPC/PSI and multi- user data-aggregation protocols.. Task 5.1 contributes to this document.

Low complexity primitives v1/2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the improvements to low complexity primitives optimized for metrics important for PSI/MPC protocols. Task 5.1 contributes to this document. A second version is available at M24

PSI/MPC and multi-user data aggregation protocols v1/2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the improvements to private set intersection, multiparty computation and multi-user data aggregation protocols. Task 5.1 contributes to this document. A second version will be available at M24

PSI/MPC and multi-user data aggregation protocols v2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the improvements to private set intersection multiparty computation and multiuser data aggregation protocols Task 51 contributes to this document A second version will be available at M24

Low complexity primitives v2 (s’ouvre dans une nouvelle fenêtre)

This document reports on the improvements to low complexity primitives optimized for metrics important for PSIMPC protocols Task 51 contributes to this document A second version is available at M24

Publications

Business Data Sharing through Data Marketplaces: A Systematic Literature Review (s’ouvre dans une nouvelle fenêtre)

Auteurs: Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk , Mark de Reuver
Publié dans: Journal of Theoretical and Applied Electronic Commerce Research, Numéro Volume 16, Numéro 7, 2021, Page(s) 3321-3339, ISSN 0718-1876
Éditeur: Editorial Universidad de Talca
DOI: 10.3390/jtaer16070180

Formal Analysis and Estimation of Chance in Datasets Based on Their Properties (s’ouvre dans une nouvelle fenêtre)

Auteurs: Taha, Abdel Aziz; Papariello, Luca; Alexandros, Bampoulidis; Knoth, Petr; Lupu, Mihai
Publié dans: IEEE Transactions on Knowledge and Data Engineering, Numéro 1, 2021, ISSN 1041-4347
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tkde.2021.3068009

Toward a Complete Data Valuation Process. Challenges of Personal Data (s’ouvre dans une nouvelle fenêtre)

Auteurs: Mihnea Tufiș, Ludovico Boratto
Publié dans: Journal of Data and Information Quality, Numéro Volume 13, Numéro 4, 2021, ISSN 1936-1955
Éditeur: Association for Computing Machinary, Inc.
DOI: 10.1145/3447269

The Role of Ecosystem Data Governance in Adoption of Data Platforms by Internet-of-Things Data Providers: Case of Dutch Horticulture Industry (s’ouvre dans une nouvelle fenêtre)

Auteurs: Fabian De Prieelle, Mark De Reuver, Jafar Rezaei
Publié dans: IEEE Transactions on Engineering Management, 2020, Page(s) 1-11, ISSN 0018-9391
Éditeur: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tem.2020.2966024

Business model tooling: where research and practice meet (s’ouvre dans une nouvelle fenêtre)

Auteurs: Harry Bouwman, Mark de Reuver, Marikka Heikkilä, Erwin Fielt
Publié dans: Electronic Markets, 2020, ISSN 1019-6781
Éditeur: Springer Verlag
DOI: 10.1007/s12525-020-00424-5

Privately Connecting Mobility to Infectious Diseases via Applied Cryptography

Auteurs: Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
Publié dans: 2021
Éditeur: in review

Business model implications of privacy-preserving technologies in data marketplaces

Auteurs: Wirawan Agahari, Riccardo Dolci, Mark de Reuver
Publié dans: 29th European Conference on Information Systems – Human Values Crisis in a Digitizing World, 2021
Éditeur: Association of the Information Systems (AIS)

Practice and Challenges of (De-)Anonymisation for Data Sharing (s’ouvre dans une nouvelle fenêtre)

Auteurs: Alexandros Bampoulidis, Alessandro Bruni, Ioannis Markopoulos, Mihai Lupu
Publié dans: RCIS 2020. Lecture Notes in Business Information Processing, vol 385, 2020, ISBN 978-3-030-50316-1
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-50316-1_32

Understanding how privacy-preserving technologies transform data marketplace platforms and ecosystems: the case of Multi-Party Computation

Auteurs: Wirawan Agahari, Mark de Reuver, Tobias Fiebig
Publié dans: 6th Innovation in Information Infrastructure (III) Workshop, 2019
Éditeur: N/A

The Data-Driven Business Value Matrix - A Classification Scheme for Data-Driven Business Models

Auteurs: Gert Breitfuss ,Michael Fruhwirth,Viktoria Pammer-Schindler,Hermann Stern, Sebastian Dennerlein
Publié dans: BLED 2019 Proceedings, 2019, Page(s) 803 – 821
Éditeur: AIS Electronic Library

PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers (s’ouvre dans une nouvelle fenêtre)

Auteurs: Alexandros Bampoulidis, Ioannis Markopoulos, Mihai Lupu
Publié dans: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Page(s) 314-317, ISBN 9781450369886
Éditeur: ACM Press
DOI: 10.1145/3358695.3360918

Consumer studies on digital platforms adoption and continuance: A structured literature review

Auteurs: Roel Faber, Mark de Reuver
Publié dans: 27th European Conference on Information Systems - Information Systems for a Sharing Society, 2019, Page(s) 151-171, ISBN 978-1-7336325-0-8
Éditeur: AIS Electronic Library

A Horizontal Patent Test Collection (s’ouvre dans une nouvelle fenêtre)

Auteurs: Mihai Lupu, Alexandros Bampoulidis, Luca Papariello
Publié dans: Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, Page(s) 1213-1216, ISBN 9781450361729
Éditeur: ACM
DOI: 10.1145/3331184.3331346

Multi-Party Computation (MPC) as Control Mechanism and its Effect on Firms' Participation in Data Sharing via Data Marketplaces (s’ouvre dans une nouvelle fenêtre)

Auteurs: Wirawan Agahari
Publié dans: Bled 2020 eConference Proceedings, 2020, ISBN 978-961-286-362-3
Éditeur: University of Maribor Press
DOI: 10.18690/978-961-286-362-3

Data Service Cards - A Supporting Tool For Data-Driven Business (s’ouvre dans une nouvelle fenêtre)

Auteurs: Breitfuß, G., Fruhwirth, M., Wolf-Brenner, C., Riedl, A., De Reuver, M., Ginthoer, R., Pimas, O.
Publié dans: Bled 2020 eConference Proceedings, 2020, Page(s) 599 – 614, ISBN 978-961-286-362-3
Éditeur: University of Maribor Press
DOI: 10.18690/978-961-286-362-3.40

An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC (s’ouvre dans une nouvelle fenêtre)

Auteurs: Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Publié dans: Asiacrypt 2020, 2020, ISBN 978-3-030-64837-4
Éditeur: Springer, Cham
DOI: 10.1007/978-3-030-64837-4_16

Multi-party Revocation in Sovrin: Performance through Distributed Trust (s’ouvre dans une nouvelle fenêtre)

Auteurs: Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
Publié dans: Topics in Cryptology – CT-RSA 2021, 2021, Page(s) 527-551
Éditeur: Springer
DOI: 10.1007/978-3-030-75539-3_22

On the Replicability of Combining Word Embeddings and Retrieval Models (s’ouvre dans une nouvelle fenêtre)

Auteurs: Luca Papariello, Alexandros Bampoulidis, Mihai Lupu
Publié dans: Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II, Numéro 12036, 2020, Page(s) 50-57, ISBN 978-3-030-45441-8
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-45442-5_7

Feistel Structures for MPC, and More (s’ouvre dans une nouvelle fenêtre)

Auteurs: Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Publié dans: Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Numéro 11736, 2019, Page(s) 151-171, ISBN 978-3-030-29961-3
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-29962-0_8

Chance influence in datasets with a large number of features (s’ouvre dans une nouvelle fenêtre)

Auteurs: Abdel Aziz Taha, Alexandros Bampoulidis, Mihai Lupu
Publié dans: Data Science – Analytics and Applications - Proceedings of the 2nd International Data Science Conference – iDSC2019, 2019, Page(s) 21-26, ISBN 978-3-658-27494-8
Éditeur: Springer Fachmedien Wiesbaden
DOI: 10.1007/978-3-658-27495-5_2

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible

Mon livret 0 0