Kaja Schmidt, Gonzalo Munilla Garrido, Alexander Mühle, C. Meinel
{"title":"Mitigating Sovereign Data Exchange Challenges: A Mapping to Apply Privacy- and Authenticity-Enhancing Technologies","authors":"Kaja Schmidt, Gonzalo Munilla Garrido, Alexander Mühle, C. Meinel","doi":"10.48550/arXiv.2207.01513","DOIUrl":"https://doi.org/10.48550/arXiv.2207.01513","url":null,"abstract":"Harmful repercussions from sharing sensitive or personal data can hamper institutions' willingness to engage in data exchange. Thus, institutions consider Authenticity Enhancing Technologies (AETs) and Privacy-Enhancing Technologies (PETs) to engage in Sovereign Data Exchange (SDE), i.e., sharing data with third parties without compromising their own or their users' data sovereignty. However, these technologies are often technically complex, which impedes their adoption. To support practitioners select PETs and AETs for SDE use cases and highlight SDE challenges researchers and practitioners should address, this study empirically constructs a challenge-oriented technology mapping. First, we compile challenges of SDE by conducting a systematic literature review and expert interviews. Second, we map PETs and AETs to the SDE challenges and identify which technologies can mitigate which challenges. We validate the mapping through investigator triangulation. Although the most critical challenge concerns data usage and access control, we find that the majority of PETs and AETs focus on data processing issues.","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121943150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Piras, M. Al-Obeidallah, Michalis Pavlidis, H. Mouratidis, A. Tsohou, E. Magkos, Andrea Praitano, Annarita Iodice, B. Gallego-Nicasio
{"title":"DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance","authors":"L. Piras, M. Al-Obeidallah, Michalis Pavlidis, H. Mouratidis, A. Tsohou, E. Magkos, Andrea Praitano, Annarita Iodice, B. Gallego-Nicasio","doi":"10.1007/978-3-030-58986-8_13","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_13","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Framework for e-Health Security Requirements and Security Policy Rules Case Study: A European Cloud-Based Health System","authors":"Dimitra K. Georgiou, C. Lambrinoudakis","doi":"10.1007/978-3-030-58986-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_2","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123095894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, S. Gritzalis
{"title":"Measuring Users' Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing Environments","authors":"Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, S. Gritzalis","doi":"10.1007/978-3-030-58986-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_10","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Investigation of the Right to Explanation Under GDPR in Insurance","authors":"Jacob Dexe, Jonas Ledendal, U. Franke","doi":"10.1007/978-3-030-58986-8_9","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_9","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kostas Kolomvatsos, Maria Kalouda, Panagiota Papadopoulou, S. Hadjiefthymiades
{"title":"A Fuzzy Trust Model for Autonomous Entities Acting in Pervasive Computing","authors":"Kostas Kolomvatsos, Maria Kalouda, Panagiota Papadopoulou, S. Hadjiefthymiades","doi":"10.1007/978-3-030-58986-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_15","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Theuermann, Felix Hörandner, Andreas Abraham, Dominik Ziegler
{"title":"Privacy-Preserving Service Composition with Enhanced Flexibility and Efficiency","authors":"Kevin Theuermann, Felix Hörandner, Andreas Abraham, Dominik Ziegler","doi":"10.1007/978-3-030-58986-8_8","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_8","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134251647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empowering Users Through a Privacy Middleware Watchdog","authors":"Patrícia R. Sousa, Rolando Martins, L. Antunes","doi":"10.1007/978-3-030-58986-8_11","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_11","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"80 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aristeidis Farao, S. Panda, S. Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, N. Georgopoulos, Michael Sirivianos, Nikos Salamanos, S. Loizou, Michalis Pingos, J. Polley, Andrew Fielder, E. Panaousis, C. Xenakis
{"title":"SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions","authors":"Aristeidis Farao, S. Panda, S. Menesidou, Entso Veliou, Nikolaos Episkopos, George Kalatzantonakis, Farnaz Mohammadi, N. Georgopoulos, Michael Sirivianos, Nikos Salamanos, S. Loizou, Michalis Pingos, J. Polley, Andrew Fielder, E. Panaousis, C. Xenakis","doi":"10.1007/978-3-030-58986-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_5","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Roth, Sebastian Aringer, Johannes Petersen, Mirja Nitschke
{"title":"Are Sensor-Based Business Models a Threat to Privacy? The Case of Pay-How-You-Drive Insurance Models","authors":"C. Roth, Sebastian Aringer, Johannes Petersen, Mirja Nitschke","doi":"10.1007/978-3-030-58986-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-58986-8_6","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127748884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}