The transparency challenge of blockchain in organizations

J Sedlmeir, J Lautenschlager, G Fridgen, N Urbach - Electronic Markets, 2022 - Springer
This position paper discusses the challenges of blockchain applications in businesses and
the public sector related to an excessive degree of transparency. We first point out the types …

Privacy issues and data protection in big data: a case study analysis under GDPR

N Gruschka, V Mavroeidis, K Vishi… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Big data has become a great asset for many organizations, promising improved operations
and new business opportunities. However, big data has increased access to sensitive …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

Exploring the use of self-sovereign identity for event ticketing systems

S Feulner, J Sedlmeir, V Schlatt, N Urbach - Electronic Markets, 2022 - Springer
Ticket fraud and ticket scalping activities often cause high costs as well as trust concerns for
fans buying event tickets, especially in the secondary ticketing market. To address these …

Using blockchain in cloud computing to enhance relational database security

R Awadallah, A Samsudin - IEEE Access, 2021 - ieeexplore.ieee.org
Cloud computing has now become a very standardised concept in our society. However,
many modern applications need a better level of security that includes saving data from …

All the numbers are US: large-scale abuse of contact discovery in mobile messengers

C Hagen, C Weinert, C Sendner, A Dmitrienko… - Cryptology ePrint …, 2020 - eprint.iacr.org
Contact discovery allows users of mobile messengers to conveniently connect with people
in their address book. In this work, we demonstrate that severe privacy issues exist in …

{PrivateDrop}: Practical {Privacy-Preserving} Authentication for Apple {AirDrop}

A Heinrich, M Hollick, T Schneider, M Stute… - 30th USENIX Security …, 2021 - usenix.org
Apple's offline file-sharing service AirDrop is integrated into more than 1.5 billion end-user
devices worldwide. We discovered two design flaws in the underlying protocol that allow …

Information privacy in decentralized applications

M Platt, RJ Bandara, AE Drăgnoiu… - Trust models for next …, 2021 - Springer
Numerous reviews of decentralized applications using Blockchain have been published in
recent years. However, these have predominantly focused on how applications map to the …

Discontinued privacy: Personal data leaks in apple bluetooth-low-energy continuity protocols

G Celosia, M Cunche - Proceedings on Privacy Enhancing …, 2020 - inria.hal.science
Apple Continuity protocols are the underlying network component of Apple Continuity
services which allow seamless nearby applications such as activity and file transfer, device …

Privacy-preserving crowd-monitoring using bloom filters and homomorphic encryption

VD Stanciu, M Steen, C Dobre, A Peter - Proceedings of the 4th …, 2021 - dl.acm.org
This paper introduces an architecture for crowd-monitoring which allows statistical counting
for pedestrian dynamics while considering privacy-preservation for the individuals being …