Trust, Privacy and Security in Digital Business: 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14–17, 2020, Proceedings

Recently, academics and professionals proposed a substantial number of identity management solutions based on blockchain technology. Among them, uPort appeared promising, being considered for both personal and administrative operations. This paper analyzes the opensource version uPort Open in terms of risk delegation and private key recovery of the mobile application, smart contract security of the uPort identity registry, and usage and on-chain transaction analytics.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[3]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[4]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[5]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[6]  Lakhmi C. Jain,et al.  Introduction to fuzzy systems , 1995, Proceedings Electronic Technology Directions to the Year 2000.

[7]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[8]  Lars Rasmusson,et al.  Simulated social control for secure Internet commerce , 1996, NSPW '96.

[9]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[10]  R. Hes,et al.  Privacy-Enhancing Technologies: The Path to Anonymity , 1998 .

[11]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[12]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[13]  Ulf Öberg,et al.  EU Citizens’ Right to Know: The Improbable Adoption of a European Freedom of Information Act , 1999, Cambridge Yearbook of European Legal Studies.

[14]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[15]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[16]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[17]  Martin C. Maguire,et al.  Methods to support human-centred design , 2001, Int. J. Hum. Comput. Stud..

[18]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[19]  L. Goodwin,et al.  A Pilot Study: Patients’ Perceptions About the Privacy of Their Medical Records , 2002 .

[20]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[21]  Richard E Scott,et al.  Telehealth policy: Looking for global complementarity , 2002, Journal of telemedicine and telecare.

[22]  A. Hoffman,et al.  A Conceptualization of Trust in International Relations , 2002 .

[23]  Julita Vassileva,et al.  Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).

[24]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[25]  HarrisTim,et al.  Xen and the art of virtualization , 2003 .

[26]  H. Flynn,et al.  Patients' concerns about and perceptions of electronic psychiatric records. , 2003, Psychiatric services.

[27]  Philip Robinson,et al.  Privacy, Security and Trust within the Context of Pervasive Computing (The Kluwer International Series in Engineering and Computer Science) , 2004 .

[28]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[29]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[30]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[31]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[32]  N. Shadbolt,et al.  Developing an integrated trust and reputation model for open multi-agent systems , 2004 .

[33]  Tamara Dinev,et al.  Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact , 2005, Int. J. Electron. Commer..

[34]  Brian Randell,et al.  A systematic classification of cheating in online games , 2005, NetGames '05.

[35]  Samia Nefti-Meziani,et al.  A fuzzy trust model for e-commerce , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[36]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[37]  A. Jadad,et al.  What Is eHealth (3): A Systematic Review of Published Definitions , 2005, Journal of medical Internet research.

[38]  Roderick M. Kramer,et al.  Social Identity and Social Capital: The Collective Self at Work , 2006 .

[39]  Geoff Skinner,et al.  A framework of authentication and authorization for e-health services , 2006, SWS '06.

[40]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[41]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[42]  Bernard Volz,et al.  The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Client Fully Qualified Domain Name (FQDN) Option , 2006, RFC.

[43]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[44]  On securing open networks through trust and reputation - architecture, challenges and solutions , 2006 .

[45]  Dmitri Williams,et al.  On and Off the 'Net: Scales for Social Capital in an Online Era , 2006, J. Comput. Mediat. Commun..

[46]  Nathan Griffiths,et al.  A Fuzzy Approach to Reasoning with Trust, Distrust and Insufficient Trust , 2006, CIA.

[47]  Calton Pu,et al.  Fine-Grain, End-to-End Security for Web Service Compositions , 2007, IEEE International Conference on Services Computing (SCC 2007).

[48]  Ronald E. Rice,et al.  Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..

[49]  Adam N. Joinson,et al.  Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..

[50]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[51]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[52]  Audun Jøsang,et al.  Trust and Reputation Systems , 2007, FOSAD.

[53]  Michael A. Hogg,et al.  Attitudes in social context: A social identity perspective , 2007 .

[54]  M. A. Fleming,et al.  The Effects of Multiple Identities on Psychological Well-Being , 2008, Personality & social psychology bulletin.

[55]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[56]  Maike Gilliot,et al.  Automating Privacy Compliance with ExPDT , 2008, 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services.

[57]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[58]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[59]  Eduardo B. Fernández,et al.  Eliciting Security Requirements through Misuse Activities , 2008, 2008 19th International Workshop on Database and Expert Systems Applications.

[60]  Wu-chang Feng,et al.  Stealth measurements for cheat detection in on-line games , 2008, NETGAMES.

[61]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[62]  Simone A. Ludwig,et al.  Evaluation of trust in an ecommerce multi-agent system using fuzzy reasoning , 2009, 2009 IEEE International Conference on Fuzzy Systems.

[63]  Stathes Hadjiefthymiades,et al.  How can we trust agents in multi-agent environments? Techniques and challenges , 2009 .

[64]  Matthew Myron,et al.  What Is Privacy , 2009 .

[65]  Mohsen Lesani,et al.  FUZZY TRUST AGGREGATION AND PERSONALIZED TRUST INFERENCE IN VIRTUAL SOCIAL NETWORKS , 2009, Comput. Intell..

[66]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[67]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[68]  Matteo Turilli,et al.  The ethics of information transparency , 2009, Ethics and Information Technology.

[69]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[70]  Yi Mu,et al.  Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems , 2009, CT-RSA.

[71]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[72]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[73]  Alexander A. Morgan,et al.  Translational bioinformatics in the cloud: an affordable alternative , 2010, Genome Medicine.

[74]  Philip S. Yu,et al.  Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques , 2010 .

[75]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[76]  Rainer Böhme,et al.  Modeling Cyber-Insurance: Towards a Unifying Framework , 2010, WEIS.

[77]  N. Ch. S. N. Iyengar,et al.  Mobile Agent Based Trust Management Framework using Fuzzy Logic in B2C E-Business Environment , 2010 .

[78]  Zoran Bosnic,et al.  Extending applications using an advanced approach to DLL injection and API hooking , 2010, Softw. Pract. Exp..

[79]  Félix Gómez Mármol,et al.  Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed Networks , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[80]  H. Vincent Poor,et al.  A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.

[81]  Sabrina De Capitani di Vimercati,et al.  Protecting Privacy in Data Release , 2015, Advances in Information Security.

[82]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[83]  Jorge Gonçalves,et al.  Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours , 2011, INTERACT.

[84]  Christian Wagner,et al.  Enhance Data Privacy in Service Compositions through a Privacy Proxy , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[85]  Daniela Cimpean,et al.  Analysis of Cyber Security Aspects in the Maritime Sector , 2011 .

[86]  Jeff Kabachinski What's the forecast for cloud computing in healthcare? , 2011, Biomedical instrumentation & technology.

[87]  Sugata Sanyal,et al.  A Survey on Security Issues in Cloud Computing , 2011, 1109.5388.

[88]  A Min Tjoa,et al.  LiDSec- A Lightweight Pseudonymization Approach for Privacy-Preserving Publishing of Textual Personal Information , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[89]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[90]  Donald E. Eastlake,et al.  Transport Layer Security (TLS) Extensions: Extension Definitions , 2011, RFC.

[91]  Haralambos Mouratidis,et al.  Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper) , 2011, J. Softw..

[92]  Carmela Troncoso,et al.  PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance , 2007, IEEE Transactions on Dependable and Secure Computing.

[93]  Vitaly Shmatikov Anonymity is not privacy: technical perspective , 2011, CACM.

[94]  Gerome Miklau,et al.  An Adaptive Mechanism for Accurate Query Answering under Differential Privacy , 2012, Proc. VLDB Endow..

[95]  Marc'Aurelio Ranzato,et al.  Large Scale Distributed Deep Networks , 2012, NIPS.

[96]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[97]  Brent Waters,et al.  New Constructions and Proof Methods for Large Universe Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..

[98]  Jelena V. Misic,et al.  Performance Analysis of Cloud Computing Centers Using M/G/m/m+r Queuing Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[99]  Bashar Nuseibeh,et al.  Adaptive security and privacy in smart grids: A software engineering vision , 2012, 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids).

[100]  Cliff Lampe,et al.  Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook , 2012, ICWSM.

[101]  Frédéric Thiesse,et al.  Resolving the Misalignment between Consumer Privacy Concerns and Ubiquitous IS Design: The Case of Usage-based Insurance , 2012, ICIS.

[102]  Bridgette Wessels,et al.  Identification and the practices of identity and privacy in everyday digital communication , 2012, New Media Soc..

[103]  Pavol Zavarsky,et al.  Enhanced side-channel analysis method to detect hardware virtualization based rootkits , 2012, World Congress on Internet Security (WorldCIS-2012).

[104]  Michael Naehrig,et al.  ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.

[105]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[106]  Steve Blank The Four Steps to the Epiphany: Successful Strategies for Products that Win , 2013 .

[107]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[108]  Ralf De Wolf,et al.  Researching social privacy on SNS through developing and evaluating alternative privacy technologies , 2013, CSCW 2013.

[109]  T. Postmes,et al.  A single-item measure of social identification: reliability, validity, and utility. , 2013, The British journal of social psychology.

[110]  Junbeom Hur,et al.  Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.

[111]  Prasant Mohapatra,et al.  An adaptive privacy-preserving scheme for location tracking of a mobile user , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[112]  Karl Aberer,et al.  User-side adaptive protection of location privacy in participatory sensing , 2013, GeoInformatica.

[113]  Xiangyu Zhang,et al.  SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization , 2013, ACSAC.

[114]  Lilian Mitrou,et al.  Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[115]  H. Vincent Poor,et al.  Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach , 2011, IEEE Transactions on Information Forensics and Security.

[116]  Galen C. Hunt,et al.  Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.

[117]  Myriam Davidovici-Nora,et al.  Paid and Free Digital Business Models Innovations in the Video Game Industry , 2014 .

[118]  Sajal K. Das,et al.  Adaptive and context-aware privacy preservation exploiting user interactions in smart environments , 2014, Pervasive Mob. Comput..

[119]  Eva Lievens,et al.  Optimizing transparency for users in social networking sites , 2014 .

[120]  Somesh Jha,et al.  Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.

[121]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[122]  Monika Taddicken,et al.  The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..

[123]  Michael Weber,et al.  PriCal: context-adaptive privacy in ambient calendar displays , 2014, UbiComp.

[124]  Shay Gueron,et al.  Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.

[125]  Barbara Carminati,et al.  Secure Web Service Composition with Untrusted Broker , 2014, 2014 IEEE International Conference on Web Services.

[126]  Ralf De Wolf,et al.  Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook , 2014, Comput. Hum. Behav..

[127]  Danah Boyd,et al.  Networked privacy: How teenagers negotiate context in social media , 2014, New Media Soc..

[128]  Ashwin Machanavajjhala,et al.  Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.

[129]  Daniel Genkin,et al.  Get your hands off my laptop: physical side-channel key-extraction attacks on PCs , 2014, Journal of Cryptographic Engineering.

[130]  Mohamed Abid,et al.  Enhancing web services compositions with privacy capabilities , 2015, iiWAS.

[131]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[132]  Christos Gkantsidis,et al.  VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.

[133]  Michael Meier,et al.  Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification , 2015, ArXiv.

[134]  Julia M. Taylor,et al.  Poster : Syntactic Element Similarity for Phishing Detection , 2015 .

[135]  Thomas T. Tran,et al.  A Trust Establishment Model in Multi-Agent Systems , 2015, AAAI Workshop: Incentive and Trust in E-Communities.

[136]  Michael Weber,et al.  Context-Adaptive Privacy: Leveraging Context Awareness to Support Privacy Decision Making , 2015, IEEE Pervasive Computing.

[137]  Prateek Mittal,et al.  SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization , 2015, USENIX Security Symposium.

[138]  Costas Lambrinoudakis,et al.  Cloud Computing Security Requirements and a Methodology for Their Auditing , 2015, e-Democracy.

[139]  Shweta Shinde,et al.  Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks , 2015, ArXiv.

[140]  Mariusz Zytniewski Trust in software agent societies , 2015 .

[141]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[142]  Chen-Hung Chang New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory , 2015 .

[143]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[144]  Milos Prvulovic,et al.  Comparison of electromagnetic side-channel energy available to the attacker from different computer systems , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).

[145]  Somesh Jha,et al.  Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.

[146]  Rolf Oppliger Quantitative Risk Analysis in Information Security Management: A Modern Fairy Tale , 2015, IEEE Security & Privacy.

[147]  Shilpa Gite,et al.  CONTEXT AWARE FRAMEWORK IN IOT: A SURVEY , 2015 .

[148]  Hoang Long Nguyen,et al.  Privacy-Aware Framework for Matching Online Social Identities in Multiple Social Networking Services , 2015, Cybern. Syst..

[149]  Javier Echanobe,et al.  Driver identification and impostor detection based on driving behavior signals , 2016, 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC).

[150]  Tobias Pulls,et al.  Transparency, Privacy and Trust - Technology for Tracking and Controlling My Data Disclosures: Does This Work? , 2016, IFIPTM.

[151]  Matthew Goldman,et al.  Experiments as Instruments: Heterogeneous Position Effects in Sponsored Search Auctions , 2015, EAI Endorsed Trans. Serious Games.

[152]  Chris Hankin,et al.  Decision support approaches for cyber security investment , 2015, Decis. Support Syst..

[153]  Inah Omoronyia Reasoning with imprecise privacy preferences , 2016, SIGSOFT FSE.

[154]  Zhiqiang Lin,et al.  A Case for Protecting Computer Games With SGX , 2016, SysTEX@Middleware.

[155]  David M. Eyers,et al.  SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.

[156]  Jens Perch Nielsen,et al.  Improving automobile insurance ratemaking using telematics: incorporating mileage and driver behaviour data , 2019 .

[157]  Esther Keymolen Trust on the Line: A Philosophical Exploration of Trust in the Networked Era , 2016 .

[158]  Nouha Oualha,et al.  Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[159]  Geraint Rees,et al.  Automated analysis of retinal imaging using machine learning techniques for computer vision , 2016, F1000Research.

[160]  Daniele Sgandurra,et al.  Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems , 2016, ACM Comput. Surv..

[161]  Mark Allman,et al.  Towards a Model of DNS Client Behavior , 2016, PAM.

[162]  Jun Zhao,et al.  Privacy Languages: Are we there yet to enable user controls? , 2016, WWW.

[163]  Amir Hussain,et al.  Predicting Insulin Resistance in Children Using a Machine-Learning-Based Clinical Decision Support System , 2016, BICS.

[164]  Haralambos Mouratidis,et al.  Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach , 2016, Domain-Specific Conceptual Modeling.

[165]  Mohamed Abid,et al.  Towards Privacy-Aware Web Services Compositions , 2016, 2016 IEEE International Conference on Computer and Information Technology (CIT).

[166]  Nor Badrul Anuar,et al.  The role of big data in smart city , 2016, Int. J. Inf. Manag..

[167]  Sarvar Patel,et al.  Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.

[168]  Bashar Nuseibeh,et al.  Privacy Dynamics: Learning Privacy Norms for Social Software , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[169]  Stefanos Gritzalis,et al.  Self-disclosure, Privacy concerns and Social Capital benefits interaction in FB: A case study , 2016, PCI.

[170]  Kirsten E. Martin Understanding Privacy Online: Development of a Social Contract Approach to Privacy , 2016 .

[171]  Pankaj Rohatgi,et al.  Side-Channel Protections for Cryptographic Instruction Set Extensions , 2016, IACR Cryptol. ePrint Arch..

[172]  Zhiwei Wang,et al.  CP-ABE with outsourced decryption and directionally hidden policy , 2016, Secur. Commun. Networks.

[173]  J. Wohlwend ELLIPTIC CURVE CRYPTOGRAPHY: PRE AND POST QUANTUM , 2016 .

[174]  Zhenlong Li,et al.  Big Data and cloud computing: innovation opportunities and challenges , 2017, Int. J. Digit. Earth.

[175]  Fabio Roli,et al.  Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization , 2017, AISec@CCS.

[176]  Christos Kalloniatis Incorporating privacy in the design of cloud-based systems: a conceptual meta-model , 2017, Inf. Comput. Secur..

[177]  Hua Wang,et al.  Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.

[178]  Sadie Creese,et al.  Mapping the coverage of security controls in cyber insurance proposal forms , 2017, Journal of Internet Services and Applications.

[179]  Dejing Dou,et al.  Adaptive Laplace Mechanism: Differential Privacy Preservation in Deep Learning , 2017, 2017 IEEE International Conference on Data Mining (ICDM).

[180]  Merle Temme,et al.  Algorithms and Transparency in View of the New General Data Protection Regulation , 2017 .

[181]  Leszek Lilien,et al.  Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module , 2017, UCC.

[182]  Maxat Kassen,et al.  Understanding transparency of government from a Nordic perspective: open government and open data movement as a multidimensional collaborative phenomenon in Sweden , 2017 .

[183]  Yuan Feng,et al.  Applying machine learning to automated segmentation of head and neck tumour volumes and organs at risk on radiotherapy planning CT and MRI scans , 2017 .

[184]  Feng Bao,et al.  Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..

[185]  Costas Lambrinoudakis,et al.  Security policy rules and required procedures for two crucial cloud computing threats , 2017 .

[186]  Nikolaos Pitropakis,et al.  Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse , 2017, CCS.

[187]  Hal Hodson,et al.  Google DeepMind and healthcare in an age of algorithms , 2017, Health and Technology.

[188]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes: Theory and Implementation , 2017 .

[189]  Luciano Floridi,et al.  Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation , 2017 .

[190]  Dominic Abrams,et al.  Social identity: The role of self in group processes and intergroup relations , 2017 .

[191]  Valerio Schiavoni,et al.  X-search: revisiting private web search using intel SGX , 2017, Middleware.

[192]  GUOFENG LIN,et al.  A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing , 2017, IEEE Access.

[193]  Paul Voigt,et al.  The Eu General Data Protection Regulation (Gdpr): A Practical Guide , 2017 .

[194]  Xu Sun,et al.  Measuring attitude towards personal data for adaptive cybersecurity , 2017, Inf. Comput. Secur..

[195]  Bart P. Knijnenburg,et al.  Death to the Privacy Calculus? , 2017 .

[196]  M. Goddard The EU General Data Protection Regulation (GDPR): European Regulation that has a Global Impact , 2017 .

[197]  Monica Palmirani,et al.  A Visualization Approach for Adaptive Consent in the European Data Protection Framework , 2017, 2017 Conference for E-Democracy and Open Government (CeDEM).

[198]  Christoforos Ntantogian,et al.  RiSKi: A Framework for Modeling Cyber Threats to Estimate Risk for Data Breach Insurance , 2017, PCI.

[199]  Danny Weyns,et al.  Software Engineering of Self-Adaptive Systems: An Organised Tour and Future Challenges , 2017 .

[200]  Mohamed Amine Ferrag,et al.  Internet of Cloud: Security and Privacy issues , 2017, ArXiv.

[201]  George Yannis,et al.  Innovative motor insurance schemes: A review of current practices and emerging challenges. , 2017, Accident; analysis and prevention.

[202]  Vincent Thouvenot,et al.  Data-driven Anonymization Process Applied to Time Series , 2017, SIMBig.

[203]  Vitaly Shmatikov,et al.  Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).

[204]  Min Ji,et al.  CCA-secure ABE with outsourced decryption for fog computing , 2018, Future Gener. Comput. Syst..

[205]  Huan Liu,et al.  Personalized Privacy-Preserving Social Recommendation , 2018, AAAI.

[206]  Hans-Theo Normann,et al.  The Willingness to Sell Personal Data , 2018, The Scandinavian Journal of Economics.

[207]  Alfred Kobsa,et al.  Collective Privacy Management in Social Media , 2018, ACM Trans. Comput. Hum. Interact..

[208]  Jin Wang,et al.  Overview on DeepMind and Its AlphaGo Zero AI , 2018, ICBDE.

[209]  Mats Jirstrand,et al.  A Performance Evaluation of Federated Learning Algorithms , 2018, DIDL@Middleware.

[210]  Erdogan Dogdu,et al.  Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey , 2018, IEEE Internet of Things Journal.

[211]  Bart P. Knijnenburg,et al.  The Potential for User-Tailored Privacy on Facebook , 2018, 2018 IEEE Symposium on Privacy-Aware Computing (PAC).

[212]  Michael Veale,et al.  Enslaving the Algorithm: From a “Right to an Explanation” to a “Right to Better Decisions”? , 2018, IEEE Security & Privacy.

[213]  Farzaneh Karegar,et al.  Towards Improving Transparency, Intervenability, and Consent in HCI , 2018 .

[214]  Z. Sujon The Triumph of Social Privacy: Understanding the Privacy Logics of Sharing Behaviors Across Social Media , 2018 .

[215]  Jenna Wiens,et al.  Machine Learning for Healthcare: On the Verge of a Major Shift in Healthcare Epidemiology , 2018, Clinical infectious diseases : an official publication of the Infectious Diseases Society of America.

[216]  Mingwei Zhang,et al.  SGXElide: enabling enclave code secrecy via self-modification , 2018, CGO.

[217]  Shantanu Chakrabartty,et al.  Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things , 2018, IEEE Internet of Things Journal.

[218]  Konstantinos Demertzis,et al.  ADvoCATE: A Consent Management Platform for Personal Data Processing in the IoT Using Blockchain Technology , 2018, SecITC.

[219]  Anna Romanou,et al.  The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise , 2017, Comput. Law Secur. Rev..

[220]  Daniel Rueckert,et al.  A generic framework for privacy preserving deep learning , 2018, ArXiv.

[221]  Bart P. Knijnenburg Privacy in Social Information Access , 2018, Social Information Access.

[222]  F. Kreuter,et al.  Collecting Survey and Smartphone Sensor Data With an App: Opportunities and Challenges Around Privacy and Informed Consent , 2020, Social Science Computer Review.

[223]  Julia Powles,et al.  "Meaningful Information" and the Right to Explanation , 2017, FAT.

[224]  Stefan Rass,et al.  Risk Assessment Uncertainties in Cybersecurity Investments , 2018, Games.

[225]  Fabiano Hessel,et al.  Providing Context-Aware Security for IoT Environments Through Context Sharing Feature , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[226]  Tomasz Tuzel,et al.  Who watches the watcher? Detecting hypervisor introspection from unprivileged guests , 2018, Digit. Investig..

[227]  Jens Grossklags,et al.  An Options Approach to Cybersecurity Investment , 2018, IEEE Access.

[228]  Aron Laszka,et al.  Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits , 2018, GameSec.

[229]  Tilo Böhmann,et al.  Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors , 2018, AMCIS.

[230]  Kapil Vaswani,et al.  EnclaveDB: A Secure Database Using SGX , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[231]  Florian Schaub,et al.  Context-Adaptive Privacy Mechanisms , 2018, Handbook of Mobile Data Privacy.

[232]  S. Kate Devitt,et al.  Trustworthiness of Autonomous Systems , 2018, CDC 2018.

[233]  Georgios Kambourakis,et al.  Optimal Countermeasures Selection Against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks , 2018, IEEE Communications Surveys & Tutorials.

[234]  M. Kaminski The Right to Explanation, Explained , 2018 .

[235]  Yanfei Lu,et al.  Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing , 2018, Wirel. Commun. Mob. Comput..

[236]  Olha Drozd,et al.  I Agree: Customize Your Personal Data Processing with the CoRe User Interface , 2019, TrustBus.

[237]  Haralambos Mouratidis,et al.  Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform , 2019, CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS.

[238]  I. Mraković,et al.  Maritime Cyber Security Analysis – How to Reduce Threats? , 2019, Transactions on Maritime Science.

[239]  M. Horák,et al.  GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform , 2019, ARES.

[240]  Prateek Mittal,et al.  Analyzing Federated Learning through an Adversarial Lens , 2018, ICML.

[241]  Erik Buchmann,et al.  FANE: A Firewall Appliance for the Smart Home , 2019, 2019 Federated Conference on Computer Science and Information Systems (FedCSIS).

[242]  Niklas K. Steffens,et al.  Social identity mapping online. , 2019, Journal of personality and social psychology.

[243]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, MLSys.

[244]  Therese Jones,et al.  Content analysis of cyber insurance policies: how do carriers price cyber risk? , 2019, J. Cybersecur..

[245]  Stefanos Gritzalis,et al.  Toward Addressing Location Privacy Issues: New Affiliations with Social and Location Attributes , 2019, Future Internet.

[246]  Meng Xiangzhao,et al.  Dynamic social privacy protection based on graph mode partition in complex social network , 2019, Personal and Ubiquitous Computing.

[247]  Haralambos Mouratidis,et al.  DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance , 2019, TrustBus.

[248]  Sylvain Daronnat,et al.  Human-agent collaborations : trust in negotiating control , 2019 .

[249]  Tianjian Chen,et al.  Federated Machine Learning: Concept and Applications , 2019 .

[250]  Brett R. Gordon,et al.  A Comparison of Approaches to Advertising Measurement: Evidence from Big Field Experiments at Facebook , 2018, Mark. Sci..

[251]  John Mylopoulos,et al.  Design Thinking and Acceptance Requirements for Designing Gamified Software , 2019, 2019 13th International Conference on Research Challenges in Information Science (RCIS).

[252]  Hossein Pishro-Nik,et al.  Matching Anonymized and Obfuscated Time Series to Users’ Profiles , 2017, IEEE Transactions on Information Theory.

[253]  Hamed Haddadi,et al.  Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach , 2019, Internet Measurement Conference.

[254]  Armin Gerl,et al.  Layered Privacy Language Pseudonymization Extension for Health Care , 2019, MedInfo.

[255]  Inah Omoronyia,et al.  A Privacy Awareness System for Software Design , 2019, Int. J. Softw. Eng. Knowl. Eng..

[256]  Patrícia R. Sousa,et al.  Empowering Users Through a Privacy Middleware Watchdog , 2020, TrustBus.

[257]  Jian Zhai,et al.  Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX , 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst..

[258]  Bhaskar Krishnamachari,et al.  Demo Abstract: The Intelligent IoT Integrator Data Marketplace - Version 1 , 2020, 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI).

[259]  Haralambos Mouratidis,et al.  Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform , 2020, Inf. Comput. Secur..

[260]  Stefanos Gritzalis,et al.  Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing , 2020 .

[261]  George Loukas,et al.  Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users , 2020, From Lambda Calculus to Cybersecurity Through Program Analysis.

[262]  Dongxi Liu,et al.  Local Differential Privacy for Deep Learning , 2019, IEEE Internet of Things Journal.

[263]  Danail Stoyanov,et al.  Barriers and pitfalls for artificial intelligence in gastroenterology: Ethical and regulatory issues , 2020, Techniques and Innovations in Gastrointestinal Endoscopy.

[264]  Elmer Lastdrager,et al.  Protecting Home Networks From Insecure IoT Devices , 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium.

[265]  Gabriele Cosentino Social Media and the Post-Truth World Order , 2020 .

[266]  Alexander Nilsson,et al.  A Survey of Published Attacks on Intel SGX , 2020, ArXiv.

[267]  Insurance Economics , 2021, Classroom Companion: Economics.