Stage-oe-small.jpg

CII Forschungsgruppe auf der HICSS 2019: Unterschied zwischen den Versionen

Aus Aifbportal
Wechseln zu:Navigation, Suche
(Die Seite wurde neu angelegt: „<menu>Critical Information Infrastructures</menu> ''05.09.2018''<br><br> '''Auf der Hawaii International Conference on System Sciences, die vom 8.-11. Januar in W…“)
 
Zeile 1: Zeile 1:
 
<menu>Critical Information Infrastructures</menu>
 
<menu>Critical Information Infrastructures</menu>
 
''05.09.2018''<br><br>
 
''05.09.2018''<br><br>
'''Auf der Hawaii International Conference on System Sciences, die vom 8.-11. Januar in Wailea, Maui stattfindet, wurde ein Beitrag der CII Forschungruppe angenommen.'''
+
'''Auf der Hawaii International Conference on System Sciences, die vom 8.-11. Januar in Wailea, Maui stattfindet, wurden zwei Beiträge der CII Forschungruppe angenommen.'''
 
<br><br>
 
<br><br>
 
'''No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications'''<br>
 
'''No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications'''<br>
 
'''Autoren:''' Thomas Brüggemann, Tobias Dehling, Ali Sunyaev<br>
 
'''Autoren:''' Thomas Brüggemann, Tobias Dehling, Ali Sunyaev<br>
'''Abstract:''' With the rapidly rising number of mobile health (mHealth) applications (apps), it is unfeasible to manually review mHealth apps for information privacy risks. One salient information privacy risk of mHealth apps are confidentiality breaches. We explore whether and how static code analysis is a feasible technology for app review automation. Evaluation of our research prototype shows that, on average, our prototype detected one breach of confidentiality risk more than human reviewers. Contributions are the demonstration that static code analysis is a feasible technology for detection of confidentiality breaches in mHealth apps, the derivation of eight generic design patterns for confidentiality breach risk assessments, and the identification of architectural challenges that need to be resolved for wide-spread dissemination of breach of confidentiality risk assessment tools. In terms of effectiveness, humans still outperform computers. However, we build a foundation for leveraging computation power to scale up breach of confidentiality risk assessments.  
+
'''Abstract:''' With the rapidly rising number of mobile health (mHealth) applications (apps), it is unfeasible to manually review mHealth apps for information privacy risks. One salient information privacy risk of mHealth apps are confidentiality breaches. We explore whether and how static code analysis is a feasible technology for app review automation. Evaluation of our research prototype shows that, on average, our prototype detected one breach of confidentiality risk more than human reviewers. Contributions are the demonstration that static code analysis is a feasible technology for detection of confidentiality breaches in mHealth apps, the derivation of eight generic design patterns for confidentiality breach risk assessments, and the identification of architectural challenges that need to be resolved for wide-spread dissemination of breach of confidentiality risk assessment tools. In terms of effectiveness, humans still outperform computers. However, we build a foundation for leveraging computation power to scale up breach of confidentiality risk assessments.
 +
<br><br>
 +
'''What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs'''<br>
 +
'''Autoren:''' Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev<br>
 +
'''Abstract:''' Distributed ledger technology (DLT), including blockchain, enables secure processing of transac-tions between untrustworthy parties in a decentral-ized system. However, DLT is available in different designs that exhibit diverse characteristics. Moreo-ver, DLT design characteristics have complementary and conflicting interdependencies. Hence, there will never be an ideal DLT design for all DLT use cases; instead, DLT implementations need to be configured to contextual requirements. Successful DLT configu-ration requires, however, a sound understanding of DLT design characteristics and their interdependen-cies. In this manuscript, we review DLT design char-acteristics and organize them into six main groups. Furthermore, we condense interdependencies of DLT design characteristics into the main trade-offs that should be considered for successful deployment of DLT. Finally, we consolidate our findings into DLT archetypes for common design objectives, such as security, usability, or performance. Our work makes extant DLT research more transparent and fosters understanding of interdependencies and trade-offs between DLT design characteristics.
 
<br><br>Weiterführende Informationen: http://hicss.hawaii.edu/
 
<br><br>Weiterführende Informationen: http://hicss.hawaii.edu/
 
<br><br>
 
<br><br>
 
[[Critical Information Infrastructures|« Zurück zu Critical Information Infrastructures]]
 
[[Critical Information Infrastructures|« Zurück zu Critical Information Infrastructures]]

Version vom 5. September 2018, 12:56 Uhr

05.09.2018

Auf der Hawaii International Conference on System Sciences, die vom 8.-11. Januar in Wailea, Maui stattfindet, wurden zwei Beiträge der CII Forschungruppe angenommen.

No Risk, More Fun! Automating Breach of Confidentiality Risk Assessment for Android Mobile Health Applications
Autoren: Thomas Brüggemann, Tobias Dehling, Ali Sunyaev
Abstract: With the rapidly rising number of mobile health (mHealth) applications (apps), it is unfeasible to manually review mHealth apps for information privacy risks. One salient information privacy risk of mHealth apps are confidentiality breaches. We explore whether and how static code analysis is a feasible technology for app review automation. Evaluation of our research prototype shows that, on average, our prototype detected one breach of confidentiality risk more than human reviewers. Contributions are the demonstration that static code analysis is a feasible technology for detection of confidentiality breaches in mHealth apps, the derivation of eight generic design patterns for confidentiality breach risk assessments, and the identification of architectural challenges that need to be resolved for wide-spread dissemination of breach of confidentiality risk assessment tools. In terms of effectiveness, humans still outperform computers. However, we build a foundation for leveraging computation power to scale up breach of confidentiality risk assessments.

What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs
Autoren: Niclas Kannengießer, Sebastian Lins, Tobias Dehling, Ali Sunyaev
Abstract: Distributed ledger technology (DLT), including blockchain, enables secure processing of transac-tions between untrustworthy parties in a decentral-ized system. However, DLT is available in different designs that exhibit diverse characteristics. Moreo-ver, DLT design characteristics have complementary and conflicting interdependencies. Hence, there will never be an ideal DLT design for all DLT use cases; instead, DLT implementations need to be configured to contextual requirements. Successful DLT configu-ration requires, however, a sound understanding of DLT design characteristics and their interdependen-cies. In this manuscript, we review DLT design char-acteristics and organize them into six main groups. Furthermore, we condense interdependencies of DLT design characteristics into the main trade-offs that should be considered for successful deployment of DLT. Finally, we consolidate our findings into DLT archetypes for common design objectives, such as security, usability, or performance. Our work makes extant DLT research more transparent and fosters understanding of interdependencies and trade-offs between DLT design characteristics.

Weiterführende Informationen: http://hicss.hawaii.edu/

« Zurück zu Critical Information Infrastructures