Boris Düdder

ORCID: 0000-0002-0241-7729
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Logic, programming, and type systems
  • Privacy-Preserving Technologies in Data
  • Advanced Software Engineering Methodologies
  • Model-Driven Software Engineering Techniques
  • Software Engineering Research
  • Cryptography and Data Security
  • Artificial Intelligence in Healthcare and Education
  • Mobile Crowdsensing and Crowdsourcing
  • Formal Methods in Verification
  • Distributed systems and fault tolerance
  • Auction Theory and Applications
  • Access Control and Trust
  • Service-Oriented Architecture and Web Services
  • Ethics and Social Impacts of AI
  • Business Process Modeling and Analysis
  • Cloud Computing and Resource Management
  • Cloud Data Security Solutions
  • Information and Cyber Security
  • Semantic Web and Ontologies
  • Natural Language Processing Techniques
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Adversarial Robustness in Machine Learning
  • Cardiac Arrest and Resuscitation

University of Copenhagen
2017-2024

TU Dortmund University
2012-2016

The ethical and societal implications of artificial intelligence systems raise concerns. In this article, we outline a novel process based on applied ethics, namely, Z-Inspection <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">®</sup> , to assess if an AI system is trustworthy. We use the definition trustworthy given by high-level European Commission's expert group AI. general inspection that can be variety domains where are used, such as...

10.1109/tts.2021.3066209 article EN cc-by-nc-nd IEEE Transactions on Technology and Society 2021-03-17

This paper documents how an ethically aligned co-design methodology ensures trustworthiness in the early design phase of artificial intelligence (AI) system component for healthcare. The explains decisions made by deep learning networks analyzing images skin lesions. trustworthy AI developed here used a holistic approach rather than static ethical checklist and required multidisciplinary team experts working with designers their managers. Ethical, legal, technical issues potentially arising...

10.3389/fhumd.2021.688152 article EN cc-by Frontiers in Human Dynamics 2021-07-13

Artificial Intelligence (AI) has the potential to greatly improve delivery of healthcare and other services that advance population health wellbeing. However, use AI in also brings risks may cause unintended harm. To guide future developments AI, High-Level Expert Group on set up by European Commission (EC), recently published ethics guidelines for what it terms “trustworthy” AI. These are aimed at a variety stakeholders, especially guiding practitioners toward more ethical robust...

10.3389/fhumd.2021.673104 article EN cc-by Frontiers in Human Dynamics 2021-07-08

Managing and verifying forest products in a value chain is often reliant on easily manipulated document or digital tracking methods – Chain of Custody Systems. We aim to create new means timber by developing tamper proof system based Blockchain technology. will be combined with protocols for physical verification authentication. Deliverables include online traceability system, procedures entering data inputs. Certification schemes governments gain increased legitimacy from tamper-proof...

10.2139/ssrn.3015219 article EN SSRN Electronic Journal 2017-01-01

Abstract Building artificial intelligence (AI) systems that adhere to ethical standards is a complex problem. Even though multitude of guidelines for the design and development such trustworthy AI exist, these focus on high-level abstract requirements systems, it often very difficult assess if specific system fulfills requirements. The Z-Inspection® process provides holistic dynamic framework evaluate trustworthiness at different stages lifecycle, including intended use, design, development....

10.1007/s44206-023-00063-1 article EN cc-by Deleted Journal 2023-09-09

The ubiquity of crowdsourcing has reshaped the static sensor-enabled data sensing paradigm with cost efficiency and flexibility. Still, most existing triangular systems only work under centralized trust assumption suffer from various attacks mounted by malicious users. Although incorporating emerging blockchain technology into provides a possibility to mitigate some issues, how concretely implement crucial components their functionalities in verifiable privacy-aware manner remains...

10.1109/jiot.2021.3097950 article EN publisher-specific-oa IEEE Internet of Things Journal 2021-08-10

Privacy-aware task allocation/matching has been an active research focus in crowdsourcing. However, existing studies on honest-but-curious assumption and a single-attribute matching model. There is lack of adequate attention paid to scheme designs against malicious behaviors supporting user-side personalized over multiple attributes. A few recent works employ blockchain cryptographic techniques decentralize the procedure with verifiable privacy-preserving on-chain executions. they still bear...

10.1109/tmc.2024.3369085 article EN IEEE Transactions on Mobile Computing 2024-02-23

The early development of blockchain technology (BCT) has already demonstrated the technology's potential to serve needs different industries. BCT also become established as a popular research topic in scientific disciplines. This paper aims at introducing how several relevant disciplines—supply chain management; management, economics and finance; computer science; security engineering—see education perspectives for BCT. A field review is conducted present challenges opportunities BCT, well...

10.3389/fbloc.2020.578022 article EN cc-by Frontiers in Blockchain 2021-01-14

Blockchain and distributed ledger technology (BC/DLT) provides databases with decentralized governance, tamper-proof recording, high availability non-copyable digital assets, which have made it a natural technological basis for supply chain management. In this paper, we introduce REALISTIC, novel event-based modeling framework networks (SCNs) that includes production processes . It extends McCarty’s Resources-Events-Agents (REA) accounting model secure transformations , which, across the...

10.3389/fbloc.2022.846783 article EN cc-by Frontiers in Blockchain 2022-06-06

In combinatory logic one usually assumes a fixed set of basic combinators (axiom schemes), K and S. this setting the provable formulas (inhabited types) is PSPACE-complete in simple types undecidable intersection types. When arbitrary sets axiom schemes are considered, inhabitation problem even (this known as Linial-Post theorem). k-bounded with arises from by imposing bound k on depth (formulae) which may be substituted for type variables schemes. We consider (provability) k-bounded...

10.4230/lipics.csl.2012.243 article EN 2012-01-01

Sharding is a critical technique that enhances the scalability of blockchain technology.However, existing protocols often assume adversarial nodes in general term without considering different types attacks, which limits transaction throughput at runtime because attacks on liveness could be mitigated.There have been attempts to increase by separately handling attacks; however, they security vulnerabilities.This paper introduces Reticulum, novel sharding protocol overcomes these limitations...

10.14722/ndss.2024.24006 article EN 2024-01-01

This report is a methodological reflection on Z-Inspection$^{\small{\circledR}}$. Z-Inspection$^{\small{\circledR}}$ holistic process used to evaluate the trustworthiness of AI-based technologies at different stages AI lifecycle. It focuses, in particular, identification and discussion ethical issues tensions through elaboration socio-technical scenarios. uses general European Union's High-Level Expert Group's (EU HLEG) guidelines for trustworthy AI. illustrates both researchers...

10.48550/arxiv.2206.09887 preprint EN cc-by-nc-sa arXiv (Cornell University) 2022-01-01

Blockchain sharding splits a blockchain into several shards where consensus is reached at the shard level rather than over entire blockchain. It improves transaction throughput and reduces computational resources required of individual nodes. But derivation trustworthy within becomes an issue as longest chain based mechanisms used in conventional blockchains can no longer be used. Instead, vote-based mechanism must employed. However, existing Byzantine fault tolerance protocols do not offer...

10.1145/3584020 article EN ACM Transactions on Internet Technology 2023-02-13

For many software engineers, object-oriented frameworks represent the highest level of achievement in extensible design. The framework designers become experts a specific application domain and design cooperating classes that impose responsibilities collaborations for those seeking to extend framework. In short, once matures, it has complicated usage patterns must be followed otherwise nothing works. Turning into product line is challenging because difficulty coding these complex behaviors...

10.1145/2791060.2791076 article EN 2015-07-20

Blockchain sharding protocols randomly distribute nodes to different shards. They limit the quantity of shards ensure that adversary remains a minority inside each shard with high probability. There can exist only small number In this article, we propose new protocol links population in real-time instead fixed upper-bounded population. The is two-phase design. First, several committee are constructed where majority honest probability; then, splits into worker likelihood at least one node...

10.1145/3548606.3563506 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07
Coming Soon ...