Skip to main content

Constructing an Alliance for Value-driven Cybersecurity

Deliverables

Final report, including dissemination and communication activities

Final report, including dissemination and communication activities by UZH. This report will also include first experiences with the main Deliverables that are expected to be disseminated 6 month earlier.

White Paper “Cybersecurity and Law”

White Paper “Cybersecurity and Law”. This paper will summarize the current state of discussion regarding value-driven cybersecurity and law at EU level with an emphasis on criminal law, privacy and personal data protection law. It serves as a planning instrument for the CANVAS workshops and provides a content base for the three main CANVAS output deliverables. Furthermore, it will inform the review papers that should emerge out of the workshops (see WP5).

Mid-term report on dissemination and communication activities

Mid-term report on dissemination and communication activities by UZH.

General Dissemination Plan

General Dissemination Plan. This includes planning who should join the CANVAS alliance, the conditions of collaboration, as well as the general communication strategy for the three main Deliverables of CANVAS.

White Paper “Cybersecurity and Ethics”

White Paper “Cybersecurity and Ethics”. This will summarize the current state of discussion regarding cybersecurity and ethics with a particular focus on the reference domains health, business and police/national security. It serves as a planning instrument for the CAN-VAS workshops as well as provides a content base for the three main CANVAS output deliverables. Furthermore, it will inform the review papers that should emerge out of the workshops (see WP5).

White Paper “Technological Challenges in Cybersecurity

White Paper “Technological Challenges in Cybersecurity”. This White Paper will summarize the current state of discussion regarding main technological challenges in cy-bersecurity. It will serve as a planning instrument for the CANVAS workshops as well as provide a content base for the three main CANVAS output deliverables. Furthermore, it will inform the review papers that should emerge out of the workshops (see WP5).

White Paper “Attitudes and Opinions on Cybersecurity

White Paper “Attitudes and Opinions regarding Cybersecurity”. This White Paper will summarize existing data on attitudes and opinions regarding cybersecurity from various Stakeholders with a particular focus on the three reference domains “Health”, “Business” and “Police/National Security”. It will serve as a planning instrument for the CANVAS workshops as well as provide a content base for the three main CANVAS output deliverables. Furthermore, it will inform the review papers that should emerge out of the workshops (see WP5).

Briefing Packages

Briefing Packages. The Briefing Packages will summarize the main findings of CANVAS using didactically prepared and appealing texts in the form of presentations, short summary texts, case studies and commented literature lists. The material will be available electronically in English, French, and German.

Reference Curriculum

Reference Curriculum. A curriculum design, guided by the identification of good practices of teaching ethics, responsible science, technology and engineering, and design in the field of cybersecurity. M30 is the due date for the preliminary version, M36 is the due date for the final version.

MOOC

MOOC. To be offered on the Coursera or edX platform for free. Expected duration 6-8 week (study load around 40hrs), to be specified. The course will remain available as an archived course after the completion of the project. M30 is the due date for the preliminary version, M36 is the due date for the final version.

Consolidation Conference

Consolidation Conference. The conference will provide an integrative view on the main questions and issues of CANVAS. First versions of the main Deliverables will be presented as well to get feedback from the audience. Additional events are planned for the european Cybersecurity Month in October 2019.

Workshop 2 social sphere “Business”

Workshop 2 social sphere “Business”. The workshop will discuss ethical, legal, and technological issues of cybersecurity with a particular focus on business applications and is informed by the White Papers that have been produced in phase 1 of the project. The Workshop will be organized by UZH in close collaboration with other involved consortium partners, in particular DCU. Scientific papers will result from this workshop.

Workshop 3 social sphere “Police & National Security”

Workshop 3 social sphere “Police / National Security”. The workshop will discuss ethical, legal, and technological issues of cybersecurity with a particular focus on police and national security questions and is informed by the White Papers that have been produced in phase 1 of the project. The Workshop will be organized by UZH in close collaboration with other involved consortium partners, in particular BFH. Scientific papers will result from this workshop.

Workshop 1 social sphere “Health”

Workshop 1 social sphere “Health”. The workshop will discuss ethical, legal, and technological issues of cybersecurity with a particular focus on the health system and is in-formed by the White Papers that have been produced in phase 1 of the project. The Workshop will be organized by UZH in close collaboration with other involved consortium partners, in particular BTU. Scientific papers will result from this workshop.

Project website and internal communication infrastructure

Project website and internal communication infrastructure. The execution of this Deliverable will be supported by UH.

Searching for OpenAIRE data...

Publications

Informationelle Selbstbestimmung im digitalen Wandel

Author(s): Max-R. Ulbricht, Karsten Weber
Published in: 2017, Page(s) 265-286
DOI: 10.1007/978-3-658-17662-4_16

Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees

Author(s): Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez, David Megias
Published in: IEEE Transactions on Information Forensics and Security, Issue 12/6, 2017, Page(s) 1418-1429, ISSN 1556-6013
DOI: 10.1109/tifs.2017.2663337

A semantic framework for noise addition with nominal data

Author(s): Mercedes Rodriguez-Garcia, Montserrat Batet, David Sánchez
Published in: Knowledge-Based Systems, Issue 122, 2017, Page(s) 103-118, ISSN 0950-7051
DOI: 10.1016/j.knosys.2017.01.032

Toward sensitive document release with privacy guarantees

Author(s): David Sánchez, Montserrat Batet
Published in: Engineering Applications of Artificial Intelligence, Issue 59, 2017, Page(s) 23-34, ISSN 0952-1976
DOI: 10.1016/j.engappai.2016.12.013

Privacy-preserving data outsourcing in the cloud via semantic data splitting

Author(s): David Sánchez, Montserrat Batet
Published in: Computer Communications, Issue 110, 2017, Page(s) 187-201, ISSN 0140-3664
DOI: 10.1016/j.comcom.2017.06.012

Co-Utility: Self-Enforcing protocols for the mutual benefit of participants

Author(s): Josep Domingo-Ferrer, Sergio Martínez, David Sánchez, Jordi Soria-Comas
Published in: Engineering Applications of Artificial Intelligence, Issue 59, 2017, Page(s) 148-158, ISSN 0952-1976
DOI: 10.1016/j.engappai.2016.12.023

Klinische Register im 21. Jahrhundert

Author(s): C.-A. Behrendt, H. Pridöhl, K. Schaar, H. Federrath, E. S. Debus
Published in: Der Chirurg, Issue 88/11, 2017, Page(s) 944-949, ISSN 0009-4722
DOI: 10.1007/s00104-017-0542-9

Methods for Practising Ethics in Research and Innovation: A Literature Review, Critical Analysis and Recommendations

Author(s): Wessel Reijers, David Wright, Philip Brey, Karsten Weber, Rowena Rodrigues, Declan O’Sullivan, Bert Gordijn
Published in: Science and Engineering Ethics, 2017, ISSN 1353-3452
DOI: 10.1007/s11948-017-9961-8

Technik zur Unterstützung von Citizen Science und Open Science

Author(s): Karsten Weber, Nadine Kleine, Frank Pallas, Max-R. Ulbricht
Published in: TATuP Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis, Issue 26/1-2, 2017, Page(s) 25-30, ISSN 2199-9201
DOI: 10.14512/tatup.26.1-2.25

Book Review

Author(s): L. Jasmontaite-Zaniewicz
Published in: European Data Protection Law Review, Issue 5/3, 2019, Page(s) 458-460, ISSN 2364-2831
DOI: 10.21552/edpl/2019/3/24

Outsourcing analyses on privacy-protected multivariate categorical data stored in untrusted clouds

Author(s): Josep Domingo-Ferrer, David Sánchez, Sara Ricci, Mónica Muñoz-Batista
Published in: Knowledge and Information Systems, 2019, ISSN 0219-1377
DOI: 10.1007/s10115-019-01424-4

Cybersecurity in health – disentangling value tensions

Author(s): Michele Loi, Markus Christen, Nadine Kleine, Karsten Weber
Published in: Journal of Information, Communication and Ethics in Society, Issue 17/2, 2019, Page(s) 229-245, ISSN 1477-996X
DOI: 10.1108/jices-12-2018-0095

Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges

Author(s): Julián Salas, Josep Domingo-Ferrer
Published in: Mathematics in Computer Science, Issue 12/3, 2018, Page(s) 263-274, ISSN 1661-8270
DOI: 10.1007/s11786-018-0344-6

A semantic-preserving differentially private method for releasing query logs

Author(s): David Sánchez, Montserrat Batet, Alexandre Viejo, Mercedes Rodríguez-García, Jordi Castellà-Roca
Published in: Information Sciences, Issue 460-461, 2018, Page(s) 223-237, ISSN 0020-0255
DOI: 10.1016/j.ins.2018.05.046

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

Author(s): Josep Domingo-Ferrer, Oriol Farràs, Jordi Ribes-González, David Sánchez
Published in: Computer Communications, Issue 140-141, 2019, Page(s) 38-60, ISSN 0140-3664
DOI: 10.1016/j.comcom.2019.04.011

Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph

Author(s): Josep Domingo-Ferrer Alberto Blanco-Justicia
Published in: Science and Engineering Ethics, 2019, ISSN 1471-5546
DOI: 10.1007/s11948-019-00138-8

Outsourcing scalar products and matrix products on privacy-protected unencrypted data stored in untrusted clouds

Author(s): Josep Domingo-Ferrer, Sara Ricci, Carles Domingo-Enrich
Published in: Information Sciences, Issue 436-437, 2018, Page(s) 320-342, ISSN 0020-0255
DOI: 10.1016/j.ins.2018.01.024

Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship

Author(s): Karsten Weber, Michele Loi, Markus Christen, Nadine Kleine
Published in: The American Journal of Bioethics, Issue 18/9, 2018, Page(s) 52-53, ISSN 1526-5161
DOI: 10.1080/15265161.2018.1498935

Co-utile disclosure of private data in social networks

Author(s): David Sánchez, Josep Domingo-Ferrer, Sergio Martínez
Published in: Information Sciences, Issue 441, 2018, Page(s) 50-65, ISSN 0020-0255
DOI: 10.1016/j.ins.2018.02.010

Efficient privacy-preserving implicit authentication

Author(s): Alberto Blanco-Justicia, Josep Domingo-Ferrer
Published in: Computer Communications, Issue 125, 2018, Page(s) 13-23, ISSN 0140-3664
DOI: 10.1016/j.comcom.2018.04.011

Steered Microaggregation as a Unified Primitive to Anonymize Data Sets and Data Streams

Author(s): Josep Domingo-Ferrer, Jordi Soria-Comas, Rafael Mulero-Vellido
Published in: IEEE Transactions on Information Forensics and Security, Issue 14/12, 2019, Page(s) 3298-3311, ISSN 1556-6013
DOI: 10.1109/tifs.2019.2914832

A Review of Value-Conflicts in Cybersecurity

Author(s): Markus Christen, Bert Gordijn, Karsten Weber, Ibo Van de Poel, Emad Yaghmaei
Published in: ORBIT Journal, Issue 1/1, 2017, ISSN 2515-8562
DOI: 10.29297/orbit.v1i1.28

A Methodology to Compare Anonymization Methods Regarding Their Risk-Utility Trade-off

Author(s): Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas
Published in: Modeling Decisions for Artificial Intelligence, Issue 10571, 2017, Page(s) 132-143
DOI: 10.1007/978-3-319-67422-3_12

Privacy-Preserving and Co-utile Distributed Social Credit

Author(s): Josep Domingo-Ferrer
Published in: Combinatorial Algorithms, Issue 10765, 2018, Page(s) 371-382
DOI: 10.1007/978-3-319-78825-8_30

A Security Union In Full Respect Of Fundamental Rights: But How Effectively Respectful?

Author(s): González Fuster, G.
Published in: Constitutionalising the Security Union: Effectiveness, Rule of Law and Rights on Countering Terrorism and Crime, 2017, Page(s) 87-92

Privatsphäre als inhärente Eigenschaft eines Kommunikationsnetzes am Beispiel einer Anonymisierungslösung für IPv6

Author(s): Matthias Marx, Maximilian Blochberger, Christian Burkert, Dominik Herrmann, Hannes Federrath
Published in: Die Fortentwicklung des Datenschutzes - Zwischen Systemgestaltung und Selbstregulierung, 2018, Page(s) 209-223
DOI: 10.1007/978-3-658-23727-1_12

Efficient Near-Optimal Variable-Size Microaggregation

Author(s): Jordi Soria-Comas, Josep Domingo-Ferrer, Rafael Mulero
Published in: Modeling Decisions for Artificial Intelligence - 16th International Conference, MDAI 2019, Milan, Italy, September 4–6, 2019, Proceedings, Issue 11676, 2019, Page(s) 333-345
DOI: 10.1007/978-3-030-26773-5_29

On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective

Author(s): Nicolas Ruiz, Krishnamurty Muralidhar, Josep Domingo-Ferrer
Published in: Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedings, Issue 11126, 2018, Page(s) 59-74
DOI: 10.1007/978-3-319-99771-1_5

Mitigating the Curse of Dimensionality in Data Anonymization

Author(s): Jordi Soria-Comas, Josep Domingo-Ferrer
Published in: Modeling Decisions for Artificial Intelligence - 16th International Conference, MDAI 2019, Milan, Italy, September 4–6, 2019, Proceedings, Issue 11676, 2019, Page(s) 346-355
DOI: 10.1007/978-3-030-26773-5_30

Discussing Ethical Impacts in Research and Innovation: The Ethics Canvas

Author(s): Wessel Reijers, Kevin Koidl, David Lewis, Harshvardhan J. Pandit, Bert Gordijn
Published in: This Changes Everything – ICT and Climate Change: What Can We Do? - 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 19–21, 2018, Proceedings, Issue 537, 2018, Page(s) 299-313
DOI: 10.1007/978-3-319-99605-9_23

Differentially Private Data Sets Based on Microaggregation and Record Perturbation

Author(s): Jordi Soria-Comas, Josep Domingo-Ferrer
Published in: Modeling Decisions for Artificial Intelligence, Issue 10571, 2017, Page(s) 119-131
DOI: 10.1007/978-3-319-67422-3_11

Personal Big Data, GDPR and Anonymization

Author(s): Josep Domingo-Ferrer
Published in: Flexible Query Answering Systems - 13th International Conference, FQAS 2019, Amantea, Italy, July 2–5, 2019, Proceedings, Issue 11529, 2019, Page(s) 7-10
DOI: 10.1007/978-3-030-27629-4_2

Machine Learning Explainability Through Comprehensible Decision Trees

Author(s): Alberto Blanco-Justicia, Josep Domingo-Ferrer
Published in: Machine Learning and Knowledge Extraction - Third IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2019, Canterbury, UK, August 26–29, 2019, Proceedings, Issue 11713, 2019, Page(s) 15-26
DOI: 10.1007/978-3-030-29726-8_2

Multiparty Computation with Statistical Input Confidentiality via Randomized Response

Author(s): Josep Domingo-Ferrer, Rafael Mulero-Vellido, Jordi Soria-Comas
Published in: Privacy in Statistical Databases - UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedings, Issue 11126, 2018, Page(s) 175-186
DOI: 10.1007/978-3-319-99771-1_12

Integrating Privacy-Enhancing Technologies into the Internet Infrastructure

Author(s): Harborth, David, Dominik Herrmann, Stefan Köpsell, Sebastian Pape, Christian Roth, Hannes Federrath, Dogan Kesdogan, and Kai Rannenberg
Published in: 2017

Tracked Without a Trace - Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic

Author(s): Matthias Kirchler, Dominik Herrmann, Jens Lindemann, Marius Kloft
Published in: Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security - ALSec '16, 2016, Page(s) 23-34
DOI: 10.1145/2996758.2996770

PrivacyScore: Analyse von Webseiten auf Sicherheits- und Privatheitsprobleme – Konzept und rechtliche Zulässigkeit

Author(s): Maass, Max, Anne Laubach, and Dominik Herrmann
Published in: Proceedings of INFORMATIK 2017, Workshop “Recht und Technik”, 2017

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

Author(s): Max Maass, Pascal Wichmann, Henning Pridöhl, Dominik Herrmann
Published in: 2017, Page(s) 178-191
DOI: 10.1007/978-3-319-67280-9_10

Automatic Anonymization of Textual Documents: Detecting Sensitive Information via Word Embeddings

Author(s): Fadi Hassan, David Sanchez, Jordi Soria-Comas, Josep Domingo-Ferrer
Published in: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2019, Page(s) 358-365
DOI: 10.1109/trustcom/bigdatase.2019.00055

AppPETs - a framework for privacy-preserving apps

Author(s): Erik Sy, Tobias Mueller, Matthias Marx, Dominik Herrmann
Published in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Page(s) 1179-1182
DOI: 10.1145/3167132.3167415

Collaborative Explanation of Deep Models with Limited Interaction for Trade Secret and Privacy Preservation

Author(s): Josep Domingo-Ferrer, Cristina Pérez-Solà, Alberto Blanco-Justicia
Published in: Companion Proceedings of The 2019 World Wide Web Conference on - WWW '19, 2019, Page(s) 501-507
DOI: 10.1145/3308560.3317586

Building a cybersecurity culture in the EU through mandatory notification of data breaches and incidents