Institut für Parallele und Verteilte Systeme (IPVS)

Publikationen

Eine Übersicht der Publikationen des Instituts für Parallele und Verteilte Systeme

Publikationen AS: Bibliographie 2025 BibTeX

 
@inproceedings {INPROC-2025-03,
   author = {Andrea Fieschi and Pascal Hirmer and Christoph Stach},
   title = {{Discovering Suitable Anonymization Techniques: A Privacy Toolbox for Data Experts}},
   booktitle = {Datenbanksysteme f{\"u}r Business, Technologie und Web (BTW 2025)},
   editor = {Meike Klettke and Ralf Schenkel and Andreas Heinrich and Daniela Nicklas and Maximilian E. Sch{\"u}le and Klaus Meyer-Wegener},
   address = {Bonn},
   publisher = {Gesellschaft f{\"u}r Informatik},
   institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
   series = {Lecture Notes in Informatics},
   volume = {P361},
   pages = {827--833},
   type = {Demonstration},
   month = {M{\"a}rz},
   year = {2025},
   issn = {2944-7682},
   doi = {10.18420/BTW2025-48},
   keywords = {Anonymization; Privacy-Enhancing Techniques; Anonymization by Design},
   language = {Englisch},
   cr-category = {K.4.1 Computers and Society Public Policy Issues},
   department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware},
   abstract = {Identifying the appropriate anonymization technique is a critical yet challenging task for developers, data scientists, and security practitioners. Our interactive toolbox addresses this challenge by providing a comprehensive overview of available anonymization techniques to assist privacy-conscious developers in selecting the right one for their specific use cases. The toolbox offers a hierarchical and classified overview of techniques, each detailed with meta-model information. It employs a modular approach, allowing techniques to be implemented and deployed independently. Additionally, it enables developers to evaluate these techniques on test datasets. Our toolbox allows for the easy addition of new categories and modules. This paper demonstrates the anonymization toolbox{\^a}€™s capabilities, simplifying the decision-making process in the Anonymization by Design cycle by ensuring overview, modularity, and flexibility.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2025-03&engl=0}
}
@inproceedings {INPROC-2025-02,
   author = {Andrea Fieschi and Pascal Hirmer and Christoph Stach and Bernhard Mitschang},
   title = {{Characterising and Categorising Anonymization Techniques: A Literature-Based Approach}},
   booktitle = {Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1 (ICISSP 2025)},
   editor = {Roberto Di Pietro and Karen Renaud and Paolo Mori},
   publisher = {SciTePress},
   institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
   pages = {107--118},
   type = {Konferenz-Beitrag},
   month = {Februar},
   year = {2025},
   isbn = {978-989-758-735-1},
   issn = {2184-4356},
   doi = {10.5220/0013379100003899},
   keywords = {Privacy Protection; PRISMA Systematic Literature Research; Privacy-Enhancing Techniques; Anonymization Techniques},
   language = {Englisch},
   cr-category = {K.4.1 Computers and Society Public Policy Issues},
   contact = {Senden Sie eine E-Mail an \<andrea.fieschi@ipvs.uni-stuttgart.de\>.},
   department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware},
   abstract = {Anonymization plays a crucial role in protecting personal data and ensuring information security. However, selecting the appropriate anonymization technique is a challenging task for developers, data scientists, and security practitioners due to the vast array of techniques available in both research and practice. This paper aims to assist users by offering a method for structuring a framework that helps them make informed decisions about the most appropriate anonymization techniques for their specific use cases. To achieve this, we first conduct a systematic literature review following the PRISMA guidelines to capture the current state of the art in anonymization techniques. Based on the findings from this review, we propose a conceptual organisation of anonymization techniques, designed to help users navigate the complex landscape of anonymization and choose techniques that align with their security requirements.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2025-02&engl=0}
}
@inproceedings {INPROC-2025-01,
   author = {Laura Schuiki and Christoph Stach and Corinna Giebler and Eva Hoos and Bernhard Mitschang},
   title = {{Enabling Trusted Data Sharing in Data Spaces: PROTON - A Privacy-by-Design Approach to Data Products}},
   booktitle = {Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1 (ICISSP 2025)},
   editor = {Roberto Di Pietro and Karen Renaud and Paolo Mori},
   publisher = {SciTePress},
   institution = {Universit{\"a}t Stuttgart, Fakult{\"a}t Informatik, Elektrotechnik und Informationstechnik, Germany},
   pages = {95--106},
   type = {Konferenz-Beitrag},
   month = {Februar},
   year = {2025},
   isbn = {978-989-758-735-1},
   issn = {2184-4356},
   doi = {10.5220/0013372900003899},
   keywords = {Distributed Data Management; Data Product; Privacy},
   language = {Englisch},
   cr-category = {E.1 Data Structures,     K.4.1 Computers and Society Public Policy Issues},
   contact = {Senden Sie eine E-Mail an \<laura-sophie.schuiki@ipvs.uni-stuttgart.de\>.},
   department = {Universit{\"a}t Stuttgart, Institut f{\"u}r Parallele und Verteilte Systeme, Anwendersoftware},
   abstract = {In the current era of data-driven innovation, the value of data can be significantly enhanced by facilitating its dissemination. In this context, the data mesh concept has gained popularity in recent years. Data Mesh includes domain experts who design so-called data products. It is imperative that all parties involved have trust in these data products. This applies in particular to data subjects who share their data, data owners who create the data products, and data consumers who use them. To establish such trust, privacy approaches are key. Due to the decentralized and distributed nature of data mesh, however, traditional privacy strategies cannot be applied. To address this issue, we present PROTON, a concept that facilitates the handling of PRivacy-cOmpliant daTa prOducts by desigN. PROTON is based on three pillars: a comprehensive description model for privacy requirements, an extended creation process that adheres to these requirements when compiling data products, and a refined access process for verifying compliance prior to data sharing. The practical applicability of PROTON is illustrated by means of a real-world application scenario that has been devised in collaboration with domain experts from our industry partner.},
   url = {http://www2.informatik.uni-stuttgart.de/cgi-bin/NCSTRL/NCSTRL_view.pl?id=INPROC-2025-01&engl=0}
}
 
Zum Seitenanfang