Skip to main content

Showing 1–10 of 10 results for author: Matzutt, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.01022  [pdf

    cs.CR cs.CY

    An Interdisciplinary Survey on Information Flows in Supply Chains

    Authors: Jan Pennekamp, Roman Matzutt, Christopher Klinkmüller, Lennart Bader, Martin Serror, Eric Wagner, Sidra Malik, Maria Spiß, Jessica Rahn, Tan Gürpinar, Eduard Vlad, Sander J. J. Leemans, Salil S. Kanhere, Volker Stich, Klaus Wehrle

    Abstract: Supply chains form the backbone of modern economies and therefore require reliable information flows. In practice, however, supply chains face severe technical challenges, especially regarding security and privacy. In this work, we consolidate studies from supply chain management, information systems, and computer science from 2010-2021 in an interdisciplinary meta-survey to make this topic holist… ▽ More

    Submitted 28 September, 2023; originally announced January 2024.

    Journal ref: ACM Computing Surveys 56(2):1-38, 2024

  2. Poster: Accountable Processing of Reported Street Problems

    Authors: Roman Matzutt, Jan Pennekamp, Klaus Wehrle

    Abstract: Municipalities increasingly depend on citizens to file digital reports about issues such as potholes or illegal trash dumps to improve their response time. However, the responsible authorities may be incentivized to ignore certain reports, e.g., when addressing them inflicts high costs. In this work, we explore the applicability of blockchain technology to hold authorities accountable regarding fi… ▽ More

    Submitted 24 September, 2023; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: Accepted as a poster abstract to CCS'23

  3. Scalable and Privacy-Focused Company-Centric Supply Chain Management

    Authors: Eric Wagner, Roman Matzutt, Jan Pennekamp, Lennart Bader, Irakli Bajelidze, Klaus Wehrle, Martin Henze

    Abstract: Blockchain technology promises to overcome trust and privacy concerns inherent to centralized information sharing. However, current decentralized supply chain management systems do either not meet privacy and scalability requirements or require a trustworthy consortium, which is challenging for increasingly dynamic supply chains with constantly changing participants. In this paper, we propose CCCh… ▽ More

    Submitted 22 May, 2022; originally announced May 2022.

    Comments: IEEE ICBC'22

    Journal ref: In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC '22)

  4. CoinPrune: Shrinking Bitcoin's Blockchain Retrospectively

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Popular cryptocurrencies continue to face serious scalability issues due to their ever-growing blockchains. Thus, modern blockchain designs began to prune old blocks and rely on recent snapshots for their bootstrap** processes instead. Unfortunately, established systems are often considered incapable of adopting these improvements. In this work, we present CoinPrune, our block-pruning scheme wit… ▽ More

    Submitted 26 November, 2021; originally announced November 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2004.06911

    Journal ref: in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3064-3078, Sept. 2021

  5. arXiv:2109.10789  [pdf, other

    cs.CR

    Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries

    Authors: Gonzalo Munilla Garrido, Joseph Near, Aitsam Muhammad, Warren He, Roman Matzutt, Florian Matthes

    Abstract: An increasing number of open-source libraries promise to bring differential privacy to practice, even for non-experts. This paper studies five libraries that offer differentially private analytics: Google DP, SmartNoise, diffprivlib, diffpriv, and Chorus. We compare these libraries qualitatively (capabilities, features, and maturity) and quantitatively (utility and scalability) across four analyti… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: 13 pages, 12 figures, 15 tables, and 1 algorithm

  6. arXiv:2004.06911  [pdf, other

    cs.CR cs.NI

    How to Securely Prune Bitcoin's Blockchain

    Authors: Roman Matzutt, Benedikt Kalde, Jan Pennekamp, Arthur Drichel, Martin Henze, Klaus Wehrle

    Abstract: Bitcoin was the first successful decentralized cryptocurrency and remains the most popular of its kind to this day. Despite the benefits of its blockchain, Bitcoin still faces serious scalability issues, most importantly its ever-increasing blockchain size. While alternative designs introduced schemes to periodically create snapshots and thereafter prune older blocks, already-deployed systems such… ▽ More

    Submitted 15 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 2020 IFIP Networking Conference (NETWORKING'20)

  7. Utilizing Public Blockchains for the Sybil-Resistant Bootstrap** of Distributed Anonymity Services

    Authors: Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle

    Abstract: Distributed anonymity services, such as onion routing networks or cryptocurrency tumblers, promise privacy protection without trusted third parties. While the security of these services is often well-researched, security implications of their required bootstrap** processes are usually neglected: Users either jointly conduct the anonymization themselves, or they need to rely on a set of non-collu… ▽ More

    Submitted 21 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: To be published in the proceedings of the 15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS'20)

  8. arXiv:1911.06569  [pdf

    cs.CY

    Putting Privacy into Perspective -- Comparing Technical, Legal, and Users' View of Data Sensitivity

    Authors: Eva-Maria Schomakers, Chantal Lidynia, Dirk Müllmann, Roman Matzutt, Klaus Wehrle, Indra Spiecker gen. Döhmann, Martina Ziefle

    Abstract: Web 2.0, social media, cloud computing, and IoT easily connect people around the globe, overcoming time and space barriers, and offering manifold benefits. However, the technological advances and increased user participation generate novel challenges for protecting users' privacy. From the user perspective, data disclosure depends, in part, on the perceived sensitivity of that data, and thus on a… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

  9. Complying with Data Handling Requirements in Cloud Storage Systems

    Authors: Martin Henze, Roman Matzutt, Jens Hiller, Erik Mühmer, Jan Henrik Ziegeldorf, Johannes van der Giet, Klaus Wehrle

    Abstract: In past years, cloud storage systems saw an enormous rise in usage. However, despite their popularity and importance as underlying infrastructure for more complex cloud services, today's cloud storage systems do not account for compliance with regulatory, organizational, or contractual data handling requirements by design. Since legislation increasingly responds to rising data protection and priva… ▽ More

    Submitted 7 June, 2020; v1 submitted 29 June, 2018; originally announced June 2018.

    Comments: 14 pages, 11 figures; revised manuscript, accepted for publication in IEEE Transactions on Cloud Computing

  10. arXiv:1607.03239  [pdf, other

    cs.NI cs.CR cs.DC

    The SensorCloud Protocol: Securely Outsourcing Sensor Data to the Cloud

    Authors: Martin Henze, René Hummen, Roman Matzutt, Klaus Wehrle

    Abstract: The increasing deployment of sensor networks, ranging from home networks to industrial automation, leads to a similarly growing demand for storing and processing the collected sensor data. To satisfy this demand, the most promising approach to date is the utilization of the dynamically scalable, on-demand resources made available via the cloud computing paradigm. However, prevalent security and pr… ▽ More

    Submitted 12 July, 2016; originally announced July 2016.

    Comments: 19 pages, 1 figure, published as technical report of the Department of Computer Science of RWTH Aachen University

    Report number: AIB-2016-06