-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathdecentralized_open_science.bib
More file actions
168 lines (150 loc) · 10.4 KB
/
decentralized_open_science.bib
File metadata and controls
168 lines (150 loc) · 10.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
@inproceedings{TrautweinSG21,
location = {Espoo and Helsinki, Finland},
title = {Introducing Peer Copy - A Fully Decentralized Peer-to-Peer File Transfer Tool},
doi = {10.23919/IFIPNetworking52078.2021.9472842},
booktitle = {2021 {IFIP} Networking Conference ({IFIP} Networking)},
publisher = {{IEEE}},
author = {Trautwein, Dennis and Schubotz, Moritz and Gipp, Bela},
date = {2021-06},
note = {tex.topic: blockchain
tex.core: A;Core Rank A;http://portal.core.edu.au/conf-ranks/806/
{QID}: Q122926733},
keywords = {!dt, !ms\_author, decentralized\_open\_science},
topic = {blockchain},
core = {A;Core Rank A;http://portal.core.edu.au/conf-ranks/806/},
}
@incollection{DeifussISG21,
location = {Glückstadt},
title = {procd: A privacy-preserving robust implementation to discover contacts in social networks},
volume = {74},
url = {https://epub.uni-regensburg.de/44954/},
doi = {10.5283/EPUB.44954},
series = {Schriften zur informationswissenschaft},
abstract = {Current instant messengers store the users? phone book contacts typically unencrypted or hashed on a central server. In case of a server?s corruption, all contacts are either directly available in plaintext or can be unmasked using a simple dictionary attack. To solve this problem, we present procd [p?o?st], a python implementation for privacy preserving contact discovery. procd is a trustless solution that requires neither plaintext numbers nor hashes of single phone numbers to retrieve contacts. Instead, we transfer hashed combinations of multiple phone numbers, which increases the effort for dictionary attacks to an unfeasible level using today?s hardware.},
pages = {363--368},
booktitle = {Information between data and knowledge},
publisher = {Proceedings of the 16th International Symposium of Information Science ({ISI} 2021)},
author = {Deifuß, Fabian and Ihle, Cornelius and Schubotz, Moritz and Gipp, Bela},
date = {2021},
note = {tex.preprint: https://www.gipp.com/wp-content/papercite-data/pdf/deifuss2021.pdf},
keywords = {!ci, !ci\_author, !ms\_author, decentralized\_open\_science, no-doi, private contact discovery, private information retrieval, private set intersection, secure multiparty computation},
preprint = {https://www.gipp.com/wp-content/papercite-data/pdf/deifuss2021.pdf},
}
@inproceedings{vonTottlebenISG21,
location = {New York, {NY}, {USA}},
title = {Academic Storage Cluster},
doi = {10.1109/jcdl52503.2021.00034},
abstract = {Decentralized storage is still rarely used in an academic and educational environment, although it offers better availability than conventional systems. It still happens that data is not available at a certain time due to heavy load or maintenance on the university servers. In such cases, a decentralized solution can help keep the data available and distribute the load among several peers. In our experiment, we created a cluster of containers in Docker to evaluate a private {IPFS} cluster for an academic data store focusing on availability, {GET}/{PUT} performance, and storage needs. As sample data, we used {PDF} files to analyze the data transport in our peer-to-peer network with Wireshark. We found that a bandwidth of at least 100 kbps is required for {IPFS} to function but recommend at least 1000 kbps for smooth operation. Also, the hard disk and memory size should be adapted to the data. Other limiting factors such as {CPU} processing power and delay in the internet connection did not affect the operation of the {IPFS} cluster.},
booktitle = {Proceedings of the {ACM}/{IEEE} joint conference on digital libraries in 2021},
publisher = {Association for Computing Machinery},
author = {von Tottleben, Alexander and Ihle, Cornelius and Schubotz, Moritz and Gipp, Bela},
date = {2021},
note = {{QID}: Q122926700},
keywords = {!ci, !ci\_author, !ms\_author, decentralized\_open\_science},
}
@inproceedings{IhleSMG20,
location = {New York, {NY}, {USA}},
title = {A first step towards content protecting plagiarism detection},
isbn = {978-1-4503-7585-6},
url = {https://doi.org/10.1145/3383583.3398620},
doi = {10.1145/3383583.3398620},
series = {{JCDL} '20},
abstract = {Plagiarism detection systems are essential tools for safeguarding academic and educational integrity. However, today's systems require disclosing the full content of the input documents and the document collection to which the input documents are compared. Moreover, the systems are centralized and under the control of individual, typically commercial providers. This situation raises procedural and legal concerns regarding the confidentiality of sensitive data, which can limit or prohibit the use of plagiarism detection services. To eliminate these weaknesses of current systems, we seek to devise a plagiarism detection approach that does not require a centralized provider nor exposing any content as cleartext. This paper presents the initial results of our research. Specifically, we employ Private Set Intersection to devise a content-protecting variant of the citation-based similarity measure Bibliographic Coupling implemented in our plagiarism detection system {HyPlag}. Our evaluation shows that the content-protecting method achieves the same detection effectiveness as the original method while making common attacks to disclose the protected content practically infeasible. Our future work will extend this successful proof-of-concept by devising plagiarism detection methods that can analyze the entire content of documents without disclosing it as cleartext.},
pages = {341--344},
booktitle = {Proceedings of the {ACM}/{IEEE} joint conference on digital libraries in 2020},
publisher = {Association for Computing Machinery},
author = {Ihle, Cornelius and Schubotz, Moritz and Meuschke, Norman and Gipp, Bela},
date = {2020},
note = {tex.ids: {IhleSMG}20a
tex.oldkey: Ihle2020
tex.topic: pd
tex.core: A*;Core Rank A*;http://portal.core.edu.au/conf-ranks/2085/
tex.preprint: https://www.gipp.com/wp-content/papercite-data/pdf/ihle2020.pdf
{QID}: Q122926697},
keywords = {!bg, !bg\_author, !ci, !ci\_author, !ms, !ms\_author, !nm, !nm\_author, \#nosource, decentralized\_open\_science, jabref\_imp1\_clean, plagiarism detection, private computation, similarity detection},
ids = {IhleSMG20a},
oldkey = {Ihle2020},
topic = {pd},
core = {A*;Core Rank A*;http://portal.core.edu.au/conf-ranks/2085/},
preprint = {https://www.gipp.com/wp-content/papercite-data/pdf/ihle2020.pdf},
}
@inproceedings{WortnerSBL19,
location = {Urbana-Champaign, {IL}, {USA}},
title = {Securing the Integrity of Time Series Data in Open Science Projects Using Blockchain-Based Trusted Timestamping},
booktitle = {Proceedings of the Workshop on Web Archiving and Digital Libraries ({WADL}) co-located with the Annual International {ACM}/{IEEE} Joint Conference on Digital Libraries ({JCDL})},
author = {Wortner, Patrick and Schubotz, Moritz and Breitinger, Corinna and Leible, Stephan and Gipp, Bela},
date = {2019-06},
note = {tex.oldkey: Wortner2019
tex.preprint: https://www.gipp.com/wp-content/papercite-data/pdf/wortner2019.pdf
tex.topic: blockchain},
keywords = {!bg, !bg\_author, !bg\_preprint, !ms, !ms\_author, !ms\_cv, !ms\_preprint, decentralized\_open\_science, jabref\_imp2, no-doi, old\_tex\_field\_preprint},
oldkey = {Wortner2019},
preprint = {https://www.gipp.com/wp-content/papercite-data/pdf/wortner2019.pdf},
topic = {blockchain},
}
@inproceedings{SchoenhalsHLE19,
location = {{USA}},
title = {Overview of Licensing Platforms Based on Distributed Ledger Technology},
booktitle = {Proceedings of the 52nd International Conference on System Sciences},
author = {Schoenhals, Alexander and Hepp, Thomas and Leible, Stephan and Ehret, Philip and Gipp, Bela},
date = {2019-01},
note = {tex.oldkey: Schoenhals2019
tex.organization: {IEEE}
tex.preprint: https://ag-gipp.github.io/bib/preprints/schoenhals2019.pdf
tex.topic: blockchain},
keywords = {!bg, !bg\_author, !bg\_preprint, decentralized\_open\_science, jabref\_imp2, old\_tex\_field\_preprint},
oldkey = {Schoenhals2019},
organization = {IEEE},
preprint = {https://ag-gipp.github.io/bib/preprints/schoenhals2019.pdf},
topic = {blockchain},
}
@incollection{IhleS19,
location = {Cham},
title = {Smart Contract-Based Role Management on the Blockchain},
volume = {339},
isbn = {978-3-030-04848-8 978-3-030-04849-5},
url = {http://link.springer.com/10.1007/978-3-030-04849-5_30},
doi = {10.1007/978-3-030-04849-5_30},
pages = {335--343},
booktitle = {Business Information Systems Workshops},
publisher = {Springer International Publishing},
author = {Ihle, Cornelius and Sanchez, Omar},
editor = {Abramowicz, Witold and Paschke, Adrian},
date = {2019},
note = {Series Title: Lecture Notes in Business Information Processing
tex.core: B;Core Rank B;http://portal.core.edu.au/conf-ranks/926/},
keywords = {!ci, decentralized\_open\_science, rbac},
core = {B;Core Rank B;http://portal.core.edu.au/conf-ranks/926/},
}
@article{SchoenhalsHEG18,
title = {Tracking of Intellectual Property Using the Blockchain},
url = {https://doi.org/10.5281/zenodo.2537209},
doi = {10.5281/zenodo.2537209},
author = {Schoenhals, Alexander and Hepp, Thomas and Ehret, Philip and Gipp, Bela},
date = {2018-11},
note = {tex.biburl: https://zenodo.org/record/2537209/export/hx\#.{XDhlxMYo}8aw
tex.oldkey: Schoenhals2018a
tex.preprint: https://zenodo.org/record/2537209/files/bfsₚosterₛchoenhals.pdf?download=1
tex.topic: blockchain},
keywords = {!bg, !bg\_author, !bg\_preprint, decentralized\_open\_science, jabref\_imp2},
biburl = {https://zenodo.org/record/2537209/export/hx#.XDhlxMYo8aw},
oldkey = {Schoenhals2018a},
preprint = {https://zenodo.org/record/2537209/files/bfsₚosterₛchoenhals.pdf?download=1},
topic = {blockchain},
}
@inproceedings{SchoenhalsHG18,
location = {Munich, Germany},
title = {Design Thinking Using the Blockchain - Enable Traceability of Intellectual Property in Problem-Solving Processes for Open Innovation},
doi = {10.1145/3211933.3211952},
booktitle = {Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems ({CryBlock}'18)},
publisher = {{ACM}},
author = {Schoenhals, Alexander and Hepp, Thomas and Gipp, Bela},
date = {2018-06},
note = {tex.oldkey: Schoenhals2018
tex.preprint: https://ag-gipp.github.io/bib/preprints/schoenhals2018.pdf
tex.topic: blockchain},
keywords = {!bg, !bg\_author, !bg\_preprint, decentralized\_open\_science, jabref\_imp2, old\_tex\_field\_preprint},
oldkey = {Schoenhals2018},
preprint = {https://ag-gipp.github.io/bib/preprints/schoenhals2018.pdf},
topic = {blockchain},
}