This program is tentative and subject to change.

Thu 4 Sep 2025 17:10 - 17:30 at Room 1.1 - Privacy and Security Chair(s): Tobias Hey

Digital Business Ecosystems (DBEs) involve collaboration and sharing of data across various independent parties. Data sharing comes with security requirements, e.g. who may see which data elements. Often, these security requirements can be satisfied by well-known techniques, such as access controls, but sometimes the traditional solutions are not sufficient. For example, in our use case there is a requirement to sum up the revenue of companies by the government to calculate the average revenue for an industry, without disclosing the revenue of each company. To satisfy these kinds of requirements without a trusted third party, advanced Privacy-Preserving Computation (PPC) techniques are needed. However, the field of PPC is technically difficult to understand for most people and is highly specialized. We are not aware of a unified, comprehensive framework that can guide the systematic selection and integration of PPC methods, given the security requirements of a DBE use case. Therefore, our research goal is to establish such a framework. In this paper, two motivating examples are given, taken from the music digital business ecosystem we participate in.

This program is tentative and subject to change.

Thu 4 Sep

Displayed time zone: Brussels, Copenhagen, Madrid, Paris change

16:00 - 17:30
Privacy and SecurityRE@Next! Papers / Research Papers at Room 1.1
Chair(s): Tobias Hey Karlsruhe Institute of Technology (KIT)
16:00
30m
Paper
LLM-assisted Extraction of Regulatory Requirements: A Case Study on the GDPR
Research Papers
Sallam Abualhaija University of Luxembourg, Marcello Ceci University of Luxembourg, Nicolas Sannier University of Luxembourg, SnT, Domenico Bianculli University of Luxembourg, Salomé Lannier , Martina Siclari University of Luxembourg, Olivier Voordeckers University of Luxembourg, Stanisław Tosza University of Luxembourg
16:30
20m
Paper
Generating Privacy Stories From Software Documentation
RE@Next! Papers
16:50
20m
Paper
Recommending Security Requirements through Asset Identification and Threat Mapping
RE@Next! Papers
Sugandha Malviya Ball State University, André Fonteles Ball State University, Angeles Marin Batana Ball State University, Alec Burch-DeWitt Ball State University
17:10
20m
Paper
Satisfying Complex Data Security Requirements in Digital Business Ecosystems
RE@Next! Papers
Yulu Wang Vrije Universiteit Amsterdam, Charlotte van der Velden , Sabine Oechsner Vrije Universiteit Amsterdam, Jaap Gordijn Vrije Universiteit Amsterdam
Hide past events