Risultati finali
Initial report of the data management plan.
Deliver Qualified Synthetic Data v2Qualified Synthetic Data sets will be made available publicly A second version will be available at M24
Deliver Qualified Synthetic Data (v1/2)Qualified Synthetic Data sets will be made available publicly. A second version will be available at M24
Updated Data Management PlanThe Data Management Plan will describe the data that Safe-DEED will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
This document reports on the cryptographic protocols developed for privacy-preserving data analytics and confidential lead time based pricing for use in WP6 and WP7. Task 5.2 contributes to this document. A new version will be available at M30
Baseline prototypes for data valuationBased on a high-level architectural design specified in D4.1, this deliverable will provide a skeleton of the component, including prototypes of the component’s layers using open source data.
Implementation of cryptographic building blocks and specialized protocols v3This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36
Release of the Big Data Valuation component version 1The final version of the component will be submitted and deployed in the Data Market Austria
Protocols for privacy-preserving data analytics and secure lead-time based pricing v2This document reports on the cryptographic protocols developed for privacypreserving data analytics and confidential lead time based pricing for use in WP6 and WP7 Task 52 contributes to this document A new version will be available at M30
Implementation of cryptographic building blocks and specialized protocols v2This document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 51 as well as the specialized protocols in Task 52 Task 53 contributes to this document New versions will be available at M24 and M36
Business model decision support toolAn interactive web app that allows business managers to design datadriven privacypreserving business models through design choices solution patterns and examples
Release of the Big Data Valuation component version 2The final version of the component will be submitted and deployed in the Data Market Austria
Implementation of cryptographic building blocks and specialized protocolsThis document describes the interface of the software library providing access to the cryptographic building blocks developed in Task 5.1 as well as the specialized protocols in Task 5.2. Task 5.3 contributes to this document. New versions will be available at M24 and M36
Yearly reports on activities delivered at M12 M24 and M36
Trust in Data Markets v2This deliverable will describe the coordinated theory of trust in the data economy based on existing literature in the field of law and ethics This will consider two particular issues commodification of personal data and the tradebetween protection and individual empowerment over data eg data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure The first iteration will be highlevel exploration and a setting out of the research methodology for the surveys and semistructured interviews The second iteration will present the results of the surveys and interviews make a more indepth analysis of selected topics based on those results and present concrete recommendations for all stakeholders to foster trust in data markets A Revised version of this deliverable will be available at M36
Business models for use cases and generic business modelsReport that summarizes the developed business models for the specific use cases generalized into generic business model patterns and examples
Ethical and Normative Valuation in Data MarketsThis deliverable will be specify a concrete list of steps and criteria eg through reusable flowcharts andor questionnaires in order to identify and qualify the broader value ie beyond economical value of specific data market constellations
Report on the context-aware & context-unaware valuationThe deliverable D43 will present the methods what will be used for assigning value to a data set
Trust in Data MarketsThis deliverable will describe the coordinated theory of trust in the data economy, based on existing literature in the field of law and ethics. This will consider two particular issues: commodification of personal data and the trade-between protection and individual empowerment over data (e.g. data protection by design measures such as homomorphic encryption may prevent empowerment as they prevent individuals from exercising their rights of access or erasure). The first iteration will be high-level exploration and a setting out of the research methodology for the surveys and semi-structured interviews. The second iteration will present the results of the surveys and interviews, make a more in-depth analysis of selected topics based on those results, and present concrete recommendations for all stakeholders to foster trust in data markets. A Revised version of this deliverable will be available at M36.
Dissemination, Communication and Engagement PlanBased on the proposal plan, constitutes a living document where partners synchronize their communication and engagement strategy
Legal and Ethical Requirements for non-Personal Data Use CaseConcrete specification of the legal and ethical requirements that need to be taken into account for the development of the non-personal data use case in WP7. The main focus will be on intellectual property law, competition law, network security and relevant legislative proposals at EU level such as the proposed Regulation for the free flow of non-personal data
Report on the application of re-identifcation techniques on use-case data v2The report on the application of reidentification techniques on usecase data M12M24 documents our efforts to deanonymize data made available by usecase partners
Dissemination, Communication and Engagement Report v3Yearly reports on activities delivered at M12 M24 and M36
Personal data Trials report final versionThis final deliverable is an extension of D62 containing the complete details about all pilots on data driven content production In the phase the final project implementations will be tested All WP6 tasks contribute to this deliverable
Legal Framework and Ethical IssuesHigh-level description of applicable EU legal frameworks and identification of key requirements for Safe- DEED’s work in WP’s 2, 4, 5 and the use cases in WPs 6 and 7.
Safe-DEED VolumeProvides a coherent and relatively brief view of the projects successes
Dissemination, Communication and Engagement ReportYearly reports on activities, delivered at M12, M24 and M36.
Quantification of economic impactReport on the quantified impact of the developed technologies on business model metrics as developed in WP2 as well as generic economic indicators of trust value creation adoption and turnover
Report on the Professional Partners CommunitySummarizes the materials made available fortraining and the results of the series of workshops organized at M18 and M33
User experiment reportSummarizes the findings from user experiments on the developed technologies. Is updated at M24 and at M36.
Legal and Ethical Requirements for Personal Data Use CaseConcrete specification of the legal and ethical requirements that need to be taken into account for the development of the personal data use case in WP6. The main focus will be on legal frameworks such as the GDPR, and the proposals for an ePrivacy Regulation and Digital Content Directive.
Threat and incentive modelReport on threat and incentives for sharing and using data from multi-actor perspective, validated through expert interviews and use cases
Syllabus for Teaching ModuleCoherent set of teaching materials including slides reading documentation etc for a 90minutes teaching module based on SafeDEED insights and aimed at students in different disciplines
User experiment report v3Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36
User experiment report v2Summarizes the findings from user experiments on the developed technologies Is updated at M24 and at M36
Report on the requirements and designThis deliverable will summarize the list of functional and technological requirements imposed on the Big Data Valuation Component based on the results of interviews with stakeholders.
Sustainable Business Strategy and ReportReports on the market analysis performed at the beginning of the project the exploitation strategies envision by the partners and their outcome by the end of the project
Report on the application of re-identification techniques on use-case dataThe report on the application of re-identification techniques on use-case data (M12/M24) documents our efforts to deanonymize data made available by use-case partners.
Requirements for secure computation on large datasets with multiple ownersThis document describes the requirements in terms of performance characteristics and functionality from MPC/PSI and multi- user data-aggregation protocols.. Task 5.1 contributes to this document.
This document reports on the improvements to low complexity primitives optimized for metrics important for PSI/MPC protocols. Task 5.1 contributes to this document. A second version is available at M24
PSI/MPC and multi-user data aggregation protocols v1/2This document reports on the improvements to private set intersection, multiparty computation and multi-user data aggregation protocols. Task 5.1 contributes to this document. A second version will be available at M24
PSI/MPC and multi-user data aggregation protocols v2This document reports on the improvements to private set intersection multiparty computation and multiuser data aggregation protocols Task 51 contributes to this document A second version will be available at M24
Low complexity primitives v2This document reports on the improvements to low complexity primitives optimized for metrics important for PSIMPC protocols Task 51 contributes to this document A second version is available at M24
The main digital presence of the project
Pubblicazioni
Autori:
Antragama Ewa Abbas, Wirawan Agahari, Montijn van de Ven, Anneke Zuiderwijk , Mark de Reuver
Pubblicato in:
Journal of Theoretical and Applied Electronic Commerce Research, Numero Volume 16, Numero 7, 2021, Pagina/e 3321-3339, ISSN 0718-1876
Editore:
Editorial Universidad de Talca
DOI:
10.3390/jtaer16070180
Autori:
Taha, Abdel Aziz; Papariello, Luca; Alexandros, Bampoulidis; Knoth, Petr; Lupu, Mihai
Pubblicato in:
IEEE Transactions on Knowledge and Data Engineering, Numero 1, 2021, ISSN 1041-4347
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tkde.2021.3068009
Autori:
Mihnea Tufiș, Ludovico Boratto
Pubblicato in:
Journal of Data and Information Quality, Numero Volume 13, Numero 4, 2021, ISSN 1936-1955
Editore:
Association for Computing Machinary, Inc.
DOI:
10.1145/3447269
Autori:
Fabian De Prieelle, Mark De Reuver, Jafar Rezaei
Pubblicato in:
IEEE Transactions on Engineering Management, 2020, Pagina/e 1-11, ISSN 0018-9391
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/tem.2020.2966024
Autori:
Harry Bouwman, Mark de Reuver, Marikka Heikkilä, Erwin Fielt
Pubblicato in:
Electronic Markets, 2020, ISSN 1019-6781
Editore:
Springer Verlag
DOI:
10.1007/s12525-020-00424-5
Autori:
Alexandros Bampoulidis, Alessandro Bruni, Lukas Helminger, Daniel Kales, Christian Rechberger, Roman Walch
Pubblicato in:
2021
Editore:
in review
Autori:
Wirawan Agahari, Riccardo Dolci, Mark de Reuver
Pubblicato in:
29th European Conference on Information Systems – Human Values Crisis in a Digitizing World, 2021
Editore:
Association of the Information Systems (AIS)
Autori:
Alexandros Bampoulidis, Alessandro Bruni, Ioannis Markopoulos, Mihai Lupu
Pubblicato in:
RCIS 2020. Lecture Notes in Business Information Processing, vol 385, 2020, ISBN 978-3-030-50316-1
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-50316-1_32
Autori:
Wirawan Agahari, Mark de Reuver, Tobias Fiebig
Pubblicato in:
6th Innovation in Information Infrastructure (III) Workshop, 2019
Editore:
N/A
Autori:
Gert Breitfuss ,Michael Fruhwirth,Viktoria Pammer-Schindler,Hermann Stern, Sebastian Dennerlein
Pubblicato in:
BLED 2019 Proceedings, 2019, Pagina/e 803 – 821
Editore:
AIS Electronic Library
Autori:
Alexandros Bampoulidis, Ioannis Markopoulos, Mihai Lupu
Pubblicato in:
IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Pagina/e 314-317, ISBN 9781450369886
Editore:
ACM Press
DOI:
10.1145/3358695.3360918
Autori:
Roel Faber, Mark de Reuver
Pubblicato in:
27th European Conference on Information Systems - Information Systems for a Sharing Society, 2019, Pagina/e 151-171, ISBN 978-1-7336325-0-8
Editore:
AIS Electronic Library
Autori:
Mihai Lupu, Alexandros Bampoulidis, Luca Papariello
Pubblicato in:
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019, Pagina/e 1213-1216, ISBN 9781450361729
Editore:
ACM
DOI:
10.1145/3331184.3331346
Autori:
Wirawan Agahari
Pubblicato in:
Bled 2020 eConference Proceedings, 2020, ISBN 978-961-286-362-3
Editore:
University of Maribor Press
DOI:
10.18690/978-961-286-362-3
Autori:
Breitfuß, G., Fruhwirth, M., Wolf-Brenner, C., Riedl, A., De Reuver, M., Ginthoer, R., Pimas, O.
Pubblicato in:
Bled 2020 eConference Proceedings, 2020, Pagina/e 599 – 614, ISBN 978-961-286-362-3
Editore:
University of Maribor Press
DOI:
10.18690/978-961-286-362-3.40
Autori:
Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Morten Øygarden, Christian Rechberger, Markus Schofnegger, Qingju Wang
Pubblicato in:
Asiacrypt 2020, 2020, ISBN 978-3-030-64837-4
Editore:
Springer, Cham
DOI:
10.1007/978-3-030-64837-4_16
Autori:
Lukas Helminger, Daniel Kales, Sebastian Ramacher, Roman Walch
Pubblicato in:
Topics in Cryptology – CT-RSA 2021, 2021, Pagina/e 527-551
Editore:
Springer
DOI:
10.1007/978-3-030-75539-3_22
Autori:
Luca Papariello, Alexandros Bampoulidis, Mihai Lupu
Pubblicato in:
Advances in Information Retrieval - 42nd European Conference on IR Research, ECIR 2020, Lisbon, Portugal, April 14–17, 2020, Proceedings, Part II, Numero 12036, 2020, Pagina/e 50-57, ISBN 978-3-030-45441-8
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-45442-5_7
Autori:
Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger
Pubblicato in:
Computer Security – ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II, Numero 11736, 2019, Pagina/e 151-171, ISBN 978-3-030-29961-3
Editore:
Springer International Publishing
DOI:
10.1007/978-3-030-29962-0_8
Autori:
Abdel Aziz Taha, Alexandros Bampoulidis, Mihai Lupu
Pubblicato in:
Data Science – Analytics and Applications - Proceedings of the 2nd International Data Science Conference – iDSC2019, 2019, Pagina/e 21-26, ISBN 978-3-658-27494-8
Editore:
Springer Fachmedien Wiesbaden
DOI:
10.1007/978-3-658-27495-5_2
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile