-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.json
1 lines (1 loc) · 233 KB
/
index.json
1
[{"authors":["chris"],"categories":null,"content":"About Christopher Christopher is a PhD student working on the formal modelling of distributed systems, and leveraging them for various benefits. For example, (1) writing models helps us concretize our thoughts, (2) communicating models affords unambiguous communication of requirements, expectations, and so on, and (3) having a model affords automated checking of system properties. Work revolves around the application domain, e.g., asking \"what concepts are worth formalizing?\" Work also revolves around the languages themselves, e.g., asking \"what makes a language practical?\"\n","date":1727222400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727222400,"objectID":"45b545988e1ed58679f0c0164bafd451","permalink":"https://cci-research.nl/author/christopher-esterhuyse/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/christopher-esterhuyse/","section":"authors","summary":"About Christopher Christopher is a PhD student working on the formal modelling of distributed systems, and leveraging them for various benefits. For example, (1) writing models helps us concretize our thoughts, (2) communicating models affords unambiguous communication of requirements, expectations, and so on, and (3) having a model affords automated checking of system properties.","tags":null,"title":"Christopher Esterhuyse","type":"authors"},{"authors":["damian"],"categories":null,"content":" About Damian I am fascinated by programming languages: they are the optimal form of abstraction. Hence, making it easier to construct new programming languages is the main focus of my research. As part of this effort, I want to integrate the design process with exploratory programming --- a style of programming where the goal worked towards is not fully concrete. This integration enables a highly volatile style of language development, making it easy to try out different design choices and reach the optimal language earlier. If you're still reading and are curious about me personally: I am born and raised in Almere, the Netherlands. Or, as I would like to say, the most beautiful city in the Netherlands. In my spare time, I enjoy taking a walk, cycle, and meet friends to have a drink. Publications ","date":1727222400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727222400,"objectID":"915cffd0a6d0547272831667bc5c6bb1","permalink":"https://cci-research.nl/author/damian-frolich/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/damian-frolich/","section":"authors","summary":"About Damian I am fascinated by programming languages: they are the optimal form of abstraction. Hence, making it easier to construct new programming languages is the main focus of my research.","tags":null,"title":"Damian Frolich","type":"authors"},{"authors":["thomas"],"categories":null,"content":"","date":1727222400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727222400,"objectID":"4973b405cf6d536b42889e740c39ee98","permalink":"https://cci-research.nl/author/l.-thomas-van-binsbergen/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/l.-thomas-van-binsbergen/","section":"authors","summary":"","tags":null,"title":"L. Thomas van Binsbergen","type":"authors"},{"authors":["f"],"categories":null,"content":"Dr. Francesco Regazzoni is a tenured Assistant Professor 1 (UD1) in Security by Design at the Informatics Institute of the University of Amsterdam (Amsterdam, The Netherlands). He authored or co-authored more than 150 publications in international journals, conferences, or books. His research interests comprise a variety of topics in security, especially on efficient implementation of privacy preserving technologies, physical and side channel attacks and countermeasures, hardware trojans, post-quantum cryptography, lightweight cryptography, and design automation for security. He is the coordinator of the SECURED Horizon Europe project and has been Principal Investigator for his institution of 4 Horizon 2020 projects. He is (or has been) the general chair of CARDIS 2023, COSADE 2021, CARDIS 2017, and of the TRUDEVICE Training School 2016; the chair of the program committee of SAMOS 2024, SPACE 2023, CCSW 2023, CCS2022, FDTC 2017, the chair of the Topic DT6 at DATE 2021, DATE 2022, and DATE 2023, the chair of the \u0026quot;Track Security and Safety\u0026quot; at VLSIDesign 2022, and of the Track “Hardware/Cyber Security \u0026amp; Privacy track” at IEEE COINS 2022, IEEE COINS 2023 and IEEE COINS 2024, and the co-founder of the Mal-IoT workshop series (co-located with ACM Computing Frontiers since 2016). He serves (or has served) as program committee member of renowned international conferences including CHES, DAC, DATE, CODES+ISSS, ISLPED, ICCAD, HOST, GLSVLSI, COSADE, CARDIS, INDOCRYPT, and he is member of the editorial board of IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) and of IACR Transactions on Symmetric Cryptology (ToSC). He is a member of the ACM, the IEEE, the IACR, and of European Network of Excellence on High Performance and Embedded Architecture and Compilation (HiPEAC). Dr. Francesco Regazzoni did his master at Politecnico di Milano (Milano, Italy) and his PhD at ALaRI Institute of Università della Svizzera italiana (Lugano, Switzerland). He has been postdoctoral researcher at the Crypto Group of the Université catholique de Louvain (Louvain-la-Neuve, Belgium), at ALaRI Institute of Università della Svizzera italiana (Lugano, Switzerland), and at Faculteit Elektrotechniek, Wiskunde \u0026amp; Informatica of Delft University of Technology (TU Delft) (Delft, The Netherlands). He has been visiting researcher at NEC Labs America (Princeton, NJ, USA), in 2003, 2004, 2005, and 2006; at COmmunication Security (COSY) of Horst Gortz Institute for IT Security at Ruhr University of Bochum (Bochum, Germany) in 2006, at Laboratoire d'architecture de processeurs at EPFL (Lausanne, Switzerland) in 2007 and 2008, and at Nanyang Technological University, Singapore (Singapore) in 2014. Publications ","date":1727049600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727049600,"objectID":"438272e086a23d38cffd2d79266c9e77","permalink":"https://cci-research.nl/author/francesco-regazzoni/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/francesco-regazzoni/","section":"authors","summary":"Dr. Francesco Regazzoni is a tenured Assistant Professor 1 (UD1) in Security by Design at the Informatics Institute of the University of Amsterdam (Amsterdam, The Netherlands). He authored or co-authored more than 150 publications in international journals, conferences, or books.","tags":null,"title":"Francesco Regazzoni","type":"authors"},{"authors":["gtasop"],"categories":null,"content":" About Georgios I am Georgios Tasopoulos and I have been working on my PhD in the Complex Cyber Infrastructure group since October 2023. I am also part of the SECURED European project where I am working on the optimisation of Fully Homomorphic Encryption techniques on the architectural and software level. Previously, I have worked for 2 years in Industrial Systems Institute / ATHENA Research Center (Patras, Greece), mainly focusing on Resource-Constrained Systems Security and Post-Quantum Cryptography. I am also an Electrical and Computer Engineering graduate from the University of Patras, Greece. Publications ","date":1727049600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727049600,"objectID":"c1828c5eef993f1992a49ad65616d7fd","permalink":"https://cci-research.nl/author/georgios-tasopoulos/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/georgios-tasopoulos/","section":"authors","summary":"About Georgios I am Georgios Tasopoulos and I have been working on my PhD in the Complex Cyber Infrastructure group since October 2023. I am also part of the SECURED European project where I am working on the optimisation of Fully Homomorphic Encryption techniques on the architectural and software level.","tags":null,"title":"Georgios Tasopoulos","type":"authors"},{"authors":["marco"],"categories":null,"content":"Hi, thanks for visiting! I'm doing my PhD with my co-promotor Francesco Regazzoni and promotor Cees de Laat. My goal is to make computer systems more secure by efficiently implementing security primitives in the computer architecture hardware, enabled by the rise of open-source Instruction Set Architectures (ISAs) such as RISC-V. As I was born and raised in Amsterdam, cycling is definitely my preferred method of transportation, and my lunch is not complete without a cheese sandwich. But I certainly want to do some experience abroad to broaden my horizon. I still like to play an occasional game of table tennis, so let me know if you know a good spot for this. Or if you want to play a chess game with the giant pieces at the ground floor, here at Science Park. ","date":1727049600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1727049600,"objectID":"e7b0d981602fb8beff23646341cbd1be","permalink":"https://cci-research.nl/author/marco-brohet/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/marco-brohet/","section":"authors","summary":"Hi, thanks for visiting! I'm doing my PhD with my co-promotor Francesco Regazzoni and promotor Cees de Laat. My goal is to make computer systems more secure by efficiently implementing security primitives in the computer architecture hardware, enabled by the rise of open-source Instruction Set Architectures (ISAs) such as RISC-V.","tags":null,"title":"Marco Brohet","type":"authors"},{"authors":["cees"],"categories":null,"content":"About Cees The complexity of digital systems on all scales is my research field. Cyber Infrastructure is rapidly evolving from relatively simple fixed components to programmable and virtualized objects with many degrees of freedom, owned, operated and governed by different entities in multiple administrative domains interacting on the Internet. Harnessing this complexity in a transparent trust-able way for safe and secure data processing is a major research topic that nowadays defines the focus in my research. I am part of the Complex Cyber Infrastructure (CCI) research group that hosts this research line.\n","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"9cb004a2d97da1183264c24315173ce4","permalink":"https://cci-research.nl/author/cees-de-laat/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/cees-de-laat/","section":"authors","summary":"About Cees The complexity of digital systems on all scales is my research field. Cyber Infrastructure is rapidly evolving from relatively simple fixed components to programmable and virtualized objects with many degrees of freedom, owned, operated and governed by different entities in multiple administrative domains interacting on the Internet.","tags":null,"title":"Cees de Laat","type":"authors"},{"authors":["jorrit"],"categories":null,"content":" Hi all! I am currently working as a part-time researcher for the AMdEX project. For this I play around with dynamic microservice architectures. For my regular job I do cloud consultancy for a small firm where I help companies migrate and modernize towards modern cloud infrastructure. I live in Utrecht, where I enjoy tennis and crossfit for sports, play an occasional video game and spend my time with friends. ","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"6a21e1a5e85aac4a53acba0b2fadbb4f","permalink":"https://cci-research.nl/author/jorrit-stutterheim/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/jorrit-stutterheim/","section":"authors","summary":"Hi all! I am currently working as a part-time researcher for the AMdEX project. For this I play around with dynamic microservice architectures. For my regular job I do cloud consultancy for a small firm where I help companies migrate and modernize towards modern cloud infrastructure.","tags":null,"title":"Jorrit Stutterheim","type":"authors"},{"authors":["luchi"],"categories":null,"content":"About Lu-Chi I am a PhD student in the Complex Cyber Infrastructure (CCI) group. I come from Taiwan and have my master\u0026rsquo;s degree in Computer Science at National Taiwan University. After that, I worked in the software industry as a DevOps engineer for about two years and decided to persue a doctoral degree abroad. Being supervised by Tom van Engers and L.Thomas van Binsbergen, my research focuses on the implementation of digital enforceable contracts, investigating blockchain, smart contracts, compliance, governance, normative systems, adversarial settings, etc. I will be working on the SSPDDP project which aims to create secure, scalable and policy-enforced environment for data exchange. Apart from this, I like to play volleyball, watch Netflix series, taste delicious food and attend various activities in my free time!\n","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"41b71b3d9f583a0957f4a507b713fef5","permalink":"https://cci-research.nl/author/lu-chi-liu/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/lu-chi-liu/","section":"authors","summary":"About Lu-Chi I am a PhD student in the Complex Cyber Infrastructure (CCI) group. I come from Taiwan and have my master\u0026rsquo;s degree in Computer Science at National Taiwan University. After that, I worked in the software industry as a DevOps engineer for about two years and decided to persue a doctoral degree abroad.","tags":null,"title":"Lu-Chi Liu","type":"authors"},{"authors":["marten"],"categories":null,"content":"About Marten After finishing my Bachelor Computer Science at the UvA, I started working as a research assistant for the AMdEx project. Now I am working on an agent-based simulation environment for the B2G3P project, where I combine my interest in Law with Computer Science. ","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"5279e3857e10f11409e70f2db98057c3","permalink":"https://cci-research.nl/author/marten-steketee/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/marten-steketee/","section":"authors","summary":"About Marten After finishing my Bachelor Computer Science at the UvA, I started working as a research assistant for the AMdEx project. Now I am working on an agent-based simulation environment for the B2G3P project, where I combine my interest in Law with Computer Science.","tags":null,"title":"Marten Steketee","type":"authors"},{"authors":["merrick"],"categories":null,"content":"","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"57bf97e315384c4eb3ba93d369e15f5b","permalink":"https://cci-research.nl/author/merrick-oost-rosengren/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/merrick-oost-rosengren/","section":"authors","summary":"","tags":null,"title":"Merrick Oost-Rosengren","type":"authors"},{"authors":["milen"],"categories":null,"content":"","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"d194d01815bd0116b36ced66ab0078db","permalink":"https://cci-research.nl/author/milen-girma-kebede/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/milen-girma-kebede/","section":"authors","summary":"","tags":null,"title":"Milen Girma Kebede","type":"authors"},{"authors":["sander"],"categories":null,"content":"","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"177c04b88c9d27db1cb880e68e0a7c55","permalink":"https://cci-research.nl/author/sander-klous/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/sander-klous/","section":"authors","summary":"","tags":null,"title":"Sander Klous","type":"authors"},{"authors":["tim"],"categories":null,"content":"My name is Tim and I\u0026rsquo;m a Scientific Programmer at the University of Amsterdam. I work with other PhD students and professors to support their research, usually technically but generally where possible. I\u0026rsquo;m happiest when that work involves writing compilers (eFLINT) or workflow systems (BRANE).\nIn my spare time I like drumming, reading, cycling gaming and programming (I swear it\u0026rsquo;s different programming from my work). I also hang out a lot with my friends and colleagues.\n","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"07d172c41c903101879fc5085cda4837","permalink":"https://cci-research.nl/author/tim-muller/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/tim-muller/","section":"authors","summary":"My name is Tim and I\u0026rsquo;m a Scientific Programmer at the University of Amsterdam. I work with other PhD students and professors to support their research, usually technically but generally where possible.","tags":null,"title":"Tim Müller","type":"authors"},{"authors":["tom"],"categories":null,"content":"About Tom I conduct research on AI \u0026 Law, with a particular focus on normative reasoning. Having a track record in AI \u0026 Law research going back to 1983, I have worked both on knowledge-driven as well as data-driven AI approaches. I was coordinator of many international and national research projects. I’m involved in 4 recently started NWO-sponsored research projects and a fifth that will start as of 2020. All these projects have in common that the AI for the corresponding application domains will keep the systems behavior within socially, ethically and legally acceptable borders, in other words provide that we’ll have normative control over those systems. The fundamental research conducted in the Leibniz Institute, a collaboration between the University of Amsterdam, with two participating faculties, the faculty of Science and the faculty of Law, and TNO with a focus on applied research will enable TNO to extend its position of thought leader in conscientious AI. ","date":1725235200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1725235200,"objectID":"44935861f5ea371a028c571374ac3ebb","permalink":"https://cci-research.nl/author/tom-van-engers/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/tom-van-engers/","section":"authors","summary":"About Tom I conduct research on AI \u0026 Law, with a particular focus on normative reasoning. Having a track record in AI \u0026 Law research going back to 1983, I have worked both on knowledge-driven as well as data-driven AI approaches.","tags":null,"title":"Tom van Engers","type":"authors"},{"authors":["gio"],"categories":null,"content":"","date":1719014400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1719014400,"objectID":"fdb11c3677239349a97fcc7e080b3df3","permalink":"https://cci-research.nl/author/giovanni-sileno/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/giovanni-sileno/","section":"authors","summary":"","tags":null,"title":"Giovanni Sileno","type":"authors"},{"authors":["peter"],"categories":null,"content":"","date":1719014400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1719014400,"objectID":"fdcef82c6bbbb4f0bebb36b6c79ae094","permalink":"https://cci-research.nl/author/peter-fratric/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/peter-fratric/","section":"authors","summary":"","tags":null,"title":"Peter Fratric","type":"authors"},{"authors":["anna"],"categories":null,"content":"","date":1717372800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1717372800,"objectID":"3cc6056e1d95002c82fe8dfde2d9c63d","permalink":"https://cci-research.nl/author/ana-oprescu/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/ana-oprescu/","section":"authors","summary":"","tags":null,"title":"Ana Oprescu","type":"authors"},{"authors":["zoltan"],"categories":null,"content":"Zoltan Mann is a researcher with wide-ranging interests in computer science, from theory (optimization problems, algorithms, complexity) to practice (security and privacy, data protection, cloud computing, edge computing). Before joining the University of Amsterdam in 2021, he worked as associate professor at Budapest University of Technology and Economics (Hungary) and as senior researcher at the University of Duisburg-Essen (Germany). In addition, he held various industry positions in software engineering, IT consulting, and management consulting. He is the head of the Data Protection task force of the European Big Data Value Association.\n","date":1715904e3,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1715904e3,"objectID":"5a609900f7a6bb8b2dbbe1157ee88e54","permalink":"https://cci-research.nl/author/zoltan-mann/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/zoltan-mann/","section":"authors","summary":"Zoltan Mann is a researcher with wide-ranging interests in computer science, from theory (optimization problems, algorithms, complexity) to practice (security and privacy, data protection, cloud computing, edge computing). Before joining the University of Amsterdam in 2021, he worked as associate professor at Budapest University of Technology and Economics (Hungary) and as senior researcher at the University of Duisburg-Essen (Germany).","tags":null,"title":"Zoltan Mann","type":"authors"},{"authors":["pepijn"],"categories":null,"content":"About Pepijn I studied Bèta-gamma (Natural and Social Sciences) and majored in Artificial Intelligence. In my thesis, supervised by Ana Oprescu, I studied the trade-off between energy consumption and machine learning accuracy for privacy-enhanced data. This thesis eventually lead to a conference paper at the conference of ICT for Sustainability. After finishing my thesis, I started working as a research assistant for the AMdEx project where I helped with synthetic data and k-anonymity. I then started the master's programme of Artificial Intelligence in 2022 and expect to graduate at the end of 2024. ","date":1714435200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1714435200,"objectID":"06f7976d46f050ad1bc380095b2d396e","permalink":"https://cci-research.nl/author/pepijn-de-reus/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/pepijn-de-reus/","section":"authors","summary":"About Pepijn I studied Bèta-gamma (Natural and Social Sciences) and majored in Artificial Intelligence. In my thesis, supervised by Ana Oprescu, I studied the trade-off between energy consumption and machine learning accuracy for privacy-enhanced data.","tags":null,"title":"Pepijn de Reus","type":"authors"},{"authors":["kanwal"],"categories":null,"content":" About Kanwal A dignified professional having an extensive experience in academia, industry, research \u0026 development is now ready for the roller coaster ride of pursuing a Doctorate degree. I started working as a PhD candidate in the Complex Cyber Infrastructures(CCI) Research group which positions itself primarily in the Systems \u0026 Networking (SNE) and Data Science of the Informatics Institute at the University of Amsterdam (UvA). I really am so grateful to have Zoltán Ádám Mann and Paola Grosso as wonderful mentors to work with. My research expertise and accomplishments spanned the gamut of security \u0026 privacy problems. Currently, my research focuses on Privacy-preserving Machine Learning and in general, trustworthy AI. It includes designing novel secure mechanisms and distributed solutions, leveraging applied cryptography techniques such as Homomorphic Encryption (HE) and Secure Multiparty Computations (SMC). Moreover, it also involves developing secure SW or HW solutions along with acceleration of core cryptographic primitives deployed at the Edge. The first job entailed working with the teams of developers to design web apps with varying functionalities from systems to analysis \u0026 search algorithms and develop malware detection. I spent the better part of my career in TU Delft, the Netherlands as well as Capital University of Science \u0026 Technology (CUST), Islamabad, Pakistan and in the Secure Systems and Network Engineering (SNE) MS Program at the Innopolis University (IU), Russia. SNE was originally brought to the IU from the SNE of University of Amsterdam (UvA). Being an active learner, I completed certain security certifications and used to stay in touch with the latest security \u0026 technological news, analysis, research, innovations and events worldwide. Amongst the achievements, I received the Outstanding Researcher Recommendation from Russia. Moreover, I was appreciated as an Instructor/Trainer for Competitions \u0026 Challenge preparation, attended various international or national workshops, organized guest lectures and remained an active event coordinator for Open houses, farewells, sports, quiz or debate competitions. ","date":1712188800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1712188800,"objectID":"fcc81ef5d6993f33f2f6b350cbf4d0bd","permalink":"https://cci-research.nl/author/kanwal-batool/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/kanwal-batool/","section":"authors","summary":"About Kanwal A dignified professional having an extensive experience in academia, industry, research \u0026 development is now ready for the roller coaster ride of pursuing a Doctorate degree. I started working as a PhD candidate in the Complex Cyber Infrastructures(CCI) Research group which positions itself primarily in the Systems \u0026 Networking (SNE) and Data Science of the Informatics Institute at the University of Amsterdam (UvA).","tags":null,"title":"Kanwal Batool","type":"authors"},{"authors":["mostafa"],"categories":null,"content":"About Mostafa I am a PhD student in the Complex Cyber-Infrastructure (CCI) group under supervision of Tom van Engers and Giovanni Sileno. In my research, I focus on the interactions between software systems and legal rules, trying to (1) find approaches for law practitioner to make sure a software component is behaving according to rules, (2) study approaches for software engineers to create software components in environments goverened by complex rules, (3) create methodologies to design and analyze existing regulations that involve software components. Most of this work revolves around Agent-Oriented Programming (AOP) approaches that try to capture the more complex aspects of a social systems in terms of software programs, and to achieve this, I have been working on the AOP framework AgentScript Cross-Compiler (ASC2).\n","date":1712188800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1712188800,"objectID":"9fc16b42a40dc6b3e7d0471f47610920","permalink":"https://cci-research.nl/author/mostafa-mohajeri-parizi/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/mostafa-mohajeri-parizi/","section":"authors","summary":"About Mostafa I am a PhD student in the Complex Cyber-Infrastructure (CCI) group under supervision of Tom van Engers and Giovanni Sileno. In my research, I focus on the interactions between software systems and legal rules, trying to (1) find approaches for law practitioner to make sure a software component is behaving according to rules, (2) study approaches for software engineers to create software components in environments goverened by complex rules, (3) create methodologies to design and analyze existing regulations that involve software components.","tags":null,"title":"Mostafa Mohajeri Parizi","type":"authors"},{"authors":["sandervs"],"categories":null,"content":"","date":1712016e3,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1712016e3,"objectID":"5cd62cf5df659bd6b2f76e5d24a17a92","permalink":"https://cci-research.nl/author/sander-van-splunter/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/sander-van-splunter/","section":"authors","summary":"","tags":null,"title":"Sander van Splunter","type":"authors"},{"authors":["arno"],"categories":null,"content":"","date":1711929600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1711929600,"objectID":"8d6cfa136960a3910411737b7b60e0d7","permalink":"https://cci-research.nl/author/arno-bakker/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/arno-bakker/","section":"authors","summary":"","tags":null,"title":"Arno Bakker","type":"authors"},{"authors":["kostas"],"categories":null,"content":"","date":1711929600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1711929600,"objectID":"0b7399d7838620b94ae46847a5b82378","permalink":"https://cci-research.nl/author/kostas-papagiannopoulos/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/kostas-papagiannopoulos/","section":"authors","summary":"","tags":null,"title":"Kostas Papagiannopoulos","type":"authors"},{"authors":["aya"],"categories":null,"content":"","date":1711584e3,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1711584e3,"objectID":"b982c09699b3d1bdd66940777582e51b","permalink":"https://cci-research.nl/author/aya-fukami/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/aya-fukami/","section":"authors","summary":"","tags":null,"title":"Aya Fukami","type":"authors"},{"authors":["xin"],"categories":null,"content":"","date":1708041600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1708041600,"objectID":"46af0afa201588e3019a01770caad6b1","permalink":"https://cci-research.nl/author/xin-zhou/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/xin-zhou/","section":"authors","summary":"","tags":null,"title":"Xin Zhou","type":"authors"},{"authors":["yuri"],"categories":null,"content":"","date":1708041600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1708041600,"objectID":"d18442e9c4c12e5d4fc5ab829c202eb2","permalink":"https://cci-research.nl/author/yuri-demchenko/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/yuri-demchenko/","section":"authors","summary":"","tags":null,"title":"Yuri Demchenko","type":"authors"},{"authors":["divya"],"categories":null,"content":"About Divya: I joined as an Assistant Professor in the CCI Group in October 2023. Prior to this, I was a post-doctoral researcher in the Cryptography and Security Group at Aarhus University, Denmark. I received my PhD at Indian Institute of Science (IISc), India where I was supervised by Dr. Arpita Patra.\nMy research currently focuses on finding solutions to intriguing questions such as the feasibility of tasks related to secure multiparty computation (MPC) and construction of efficient MPC protocols under different settings of network and computational models.\n","date":1707091200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1707091200,"objectID":"3e006d9185e102ea6a9013474a8fdc25","permalink":"https://cci-research.nl/author/divya-ravi/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/divya-ravi/","section":"authors","summary":"About Divya: I joined as an Assistant Professor in the CCI Group in October 2023. Prior to this, I was a post-doctoral researcher in the Cryptography and Security Group at Aarhus University, Denmark.","tags":null,"title":"Divya Ravi","type":"authors"},{"authors":["kyrian"],"categories":null,"content":" Hi there I am currently working on my PhD in the Complex Cyber Infrastructure group, where I am part of the Security By Design team. As part of the European SECURED project, I work on the acceleration of Secure Multi-Party Computing (SMPC) on software and/or hardware fronts. The intersection of security, communication and practical use cases is an exciting prospect for me to work on and talk to others about. I would love to be able to transition these talks to a lecturer position in the future, and have obtained my BKO as part of my interests in Education and Teaching. But let's focus on the PhD first. I was born in West-Friesland and live in a small town, which to many of my colleagues is referred to as some sort of black hole. Even still, we do at times enjoy a good boardgame here, which together with baseball and the occassional video game make up my hobbies. Obviously I'm also up for a drink or a good restaurant visit as a past-time. ","date":1707091200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1707091200,"objectID":"30a7e210b336164a36dab9ed838d08dd","permalink":"https://cci-research.nl/author/kyrian-maat/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/kyrian-maat/","section":"authors","summary":"Hi there I am currently working on my PhD in the Complex Cyber Infrastructure group, where I am part of the Security By Design team. As part of the European SECURED project, I work on the acceleration of Secure Multi-Party Computing (SMPC) on software and/or hardware fronts.","tags":null,"title":"Kyrian Maat","type":"authors"},{"authors":["leon"],"categories":null,"content":"","date":1707091200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1707091200,"objectID":"5534f4a7f84db94684c5a7ae68d2ad55","permalink":"https://cci-research.nl/author/leon-gommans/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/leon-gommans/","section":"authors","summary":"","tags":null,"title":"Leon Gommans","type":"authors"},{"authors":["daphnee"],"categories":null,"content":"About Daphnee My name is Daphnee Chabal and I started my PhD in January 2022. Supervised by dr. Zoltan Mann, I conduct research in the theme of Security and Privacy in Edge AI. My research focuses on 1. understanding the criteria that secure multi party protocols must meet to be viable in edge computing environments, 2. understanding the effect of different model compression techniques on the overall performance of edge intelligence, and 3. creating fast, accurate, and secure solutions for neural network inference in edge computing systems. The overall aim is to bring state-of-the-art AI to resource constrained IoT settings, with data privacy guarantees. Neuroscientist by training, I was previously part of the Center for Healthy Minds at the University of Wisconsin - Madison and the Cambridge University's Junior Researcher Programme. I also worked as a data scientist in the aerospace and the email service industries. I am a United Workd College graduate.\n","date":1694044800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1694044800,"objectID":"9f46e7bbf5923b80518ea751f7484fc5","permalink":"https://cci-research.nl/author/daphnee-chabal/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/daphnee-chabal/","section":"authors","summary":"About Daphnee My name is Daphnee Chabal and I started my PhD in January 2022. Supervised by dr. Zoltan Mann, I conduct research in the theme of Security and Privacy in Edge AI.","tags":null,"title":"Daphnee Chabal","type":"authors"},{"authors":["eloise"],"categories":null,"content":"About Eloise My name is Eloise Zhang, and I'm currently working as a research assistant under the guidance of Dr. Zoltan Mann. Additionally, I am pursuing my master's degree in computer science. My research focuses on reducing power consumption during secure multi-party computation for privacy-preserving (deep) neural network inference. I'm also interested in fitting current MPC-NN inference system into edge computing environments. Beyond my academic pursuits, I enjoy hiking, practicing aerial yoga, and staying active through workouts. I\u0026rsquo;m also an influencer in nutrition and health, and always eager to engage in discussions about eating habits and share delicious recipes. So, if you share the same interests, let\u0026rsquo;s connect and exchange ideas!\n","date":1693785600,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1693785600,"objectID":"3bd3bfa61f5413bcbe001c7ea1042276","permalink":"https://cci-research.nl/author/eloise-zhang/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/eloise-zhang/","section":"authors","summary":"About Eloise My name is Eloise Zhang, and I'm currently working as a research assistant under the guidance of Dr. Zoltan Mann. Additionally, I am pursuing my master's degree in computer science.","tags":null,"title":"Eloise Zhang","type":"authors"},{"authors":["viktoriya"],"categories":null,"content":"About Viktoriya I am Viktoriya Degeler, an Assistant Professor in the CCI group at the University of Amsterdam, the Netherlands. My research is focused on reasoning and decision making systems for smart environments, activity recognition, digital twins, pervasive systems and context modeling and representation, with particular interest in sustainable applications such as energy and water management. My career, always at the edge of both academia and industry, included an Assistant Professor position at the Bernoulli Institute for Mathematics, Computer Science, and Artificial Intelligence at the University of Groningen, postdoc positions at the National University of Ireland in Galway and Delft University of Technology, a research engineer position at Airbus, Newport (UK), and the Lead AI engineer position in Cupenya, Amsterdam, where I was leading the AI department. I am active in promoting AI approaches in the industry, participate in Training in AI for SMEs program, and, earlier, acted as an AI technical mentor for startups of the AI Accelerator program at Rockstart Startup Accelerator, Amsterdam.\nI am a patent holder and produced a number of peer-reviewed journal and conference publications, including receiving best demonstration and best student paper awards. I also acted as a program committee member on a number of conferences, such as ECML-PKDD, CIKM, CISSS, SOCA, ICSOC. I serve regularly as a reviewer and monitor for projects under the Horizon Europe (and, earlier, Horizon 2020) research framework, and coordinates research projects herself. I received several research grants, from funding agencies such as EIT Manufacturing, EIT Climate, AMS.\n","date":1691366400,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1691366400,"objectID":"46810f02dc356223692ef8e08a8e29bc","permalink":"https://cci-research.nl/author/viktoriya-degeler/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/viktoriya-degeler/","section":"authors","summary":"About Viktoriya I am Viktoriya Degeler, an Assistant Professor in the CCI group at the University of Amsterdam, the Netherlands. My research is focused on reasoning and decision making systems for smart environments, activity recognition, digital twins, pervasive systems and context modeling and representation, with particular interest in sustainable applications such as energy and water management.","tags":null,"title":"Viktoriya Degeler","type":"authors"},{"authors":["wouter"],"categories":null,"content":"","date":1561939200,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":1653985660,"objectID":"b706d4939d30042572418599004b2d03","permalink":"https://cci-research.nl/author/wouter-los/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/wouter-los/","section":"authors","summary":"","tags":null,"title":"Wouter Los","type":"authors"},{"authors":["aleandro"],"categories":null,"content":"About Aleandro Hi! I'm Aleandro, originally from Malta. Currently, my research at the University of Amsterdam centers around Software Engineering, with a special emphasis on Software Testing. I also have a keen interest in exploring various programming languages and the visualization of programming languages in general.\nBeyond my academic pursuits, I find joy in learning, music, nature, and spending time with friends.\n","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"8c3f5e9d3495b11df16afcce6eef57db","permalink":"https://cci-research.nl/author/aleandro-mifsud/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/aleandro-mifsud/","section":"authors","summary":"About Aleandro Hi! I'm Aleandro, originally from Malta. Currently, my research at the University of Amsterdam centers around Software Engineering, with a special emphasis on Software Testing. I also have a keen interest in exploring various programming languages and the visualization of programming languages in general.","tags":null,"title":"Aleandro Mifsud","type":"authors"},{"authors":["guido"],"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"6b1297c57177f7d88507a3cb9429dee9","permalink":"https://cci-research.nl/author/guido-van-t-noordende/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/guido-van-t-noordende/","section":"authors","summary":"","tags":null,"title":"Guido van 't Noordende","type":"authors"},{"authors":["jaap"],"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"d6d71063f7620e0cddc013743464e6a0","permalink":"https://cci-research.nl/author/jaap-van-ginkel/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/jaap-van-ginkel/","section":"authors","summary":"","tags":null,"title":"Jaap van Ginkel","type":"authors"},{"authors":["karst"],"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"aed1c4b1b3ed18bac3a3fca517c32388","permalink":"https://cci-research.nl/author/karst-koymans/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/karst-koymans/","section":"authors","summary":"","tags":null,"title":"Karst Koymans","type":"authors"},{"authors":["kishor"],"categories":null,"content":"Kishor I am working on the SLICES-DS project which involves building a pan-European research infrastructure (Networking, Computing and Storage) for large scale scientific experiments. My research background is mainly in the areas of wireless networking and mobile edge computing. I received my PhD from TU Delft in 2017. Before joining UvA, I was a Marie-Curie Postdoctoral fellow(MSCA_IF) with CNRS|University of Paris-Saclay, Paris, France.\n","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"a511c56ad759b0e28f706c7de382eb18","permalink":"https://cci-research.nl/author/kishor-joshi/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/kishor-joshi/","section":"authors","summary":"Kishor I am working on the SLICES-DS project which involves building a pan-European research infrastructure (Networking, Computing and Storage) for large scale scientific experiments. My research background is mainly in the areas of wireless networking and mobile edge computing.","tags":null,"title":"Kishor Joshi","type":"authors"},{"authors":["linus"],"categories":null,"content":"About Linus I'm currently doing my PhD with my supervisor Kostas Papagiannopoulos, where I'm working on Side-Channel attacks, countermeasures against them, and the efficient and secure implementation of cryptographic algorithms on platforms like RISC-V. When I'm not working, I love to go bouldering both indoors and outdoors or play (board) games with friends. ","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"4ce99eed5a25c0a4407f619d7ee3efc7","permalink":"https://cci-research.nl/author/linus-mainka/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/linus-mainka/","section":"authors","summary":"About Linus I'm currently doing my PhD with my supervisor Kostas Papagiannopoulos, where I'm working on Side-Channel attacks, countermeasures against them, and the efficient and secure implementation of cryptographic algorithms on platforms like RISC-V.","tags":null,"title":"Linus Mainka","type":"authors"},{"authors":["nina"],"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"beefb189d088efc4379091a3e066dc4d","permalink":"https://cci-research.nl/author/nina-verheijen/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/nina-verheijen/","section":"authors","summary":"","tags":null,"title":"Nina Verheijen","type":"authors"},{"authors":["olaf"],"categories":null,"content":" Hi there! I am currently working as a part-time research assistant. I work on a new interpreter for the eFLINT programming language. This server-side interpreter is meant to act as an efficient alternative to the reference interpreter in Haskell. Next to being a research asistant, I am currently also a student here at the University of Amsterdam, attending the Software Engineering master. ","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"43744f45a9f51f79702be8af61360083","permalink":"https://cci-research.nl/author/olaf-erkemeij/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/olaf-erkemeij/","section":"authors","summary":"Hi there! I am currently working as a part-time research assistant. I work on a new interpreter for the eFLINT programming language. This server-side interpreter is meant to act as an efficient alternative to the reference interpreter in Haskell.","tags":null,"title":"Olaf Erkemeij","type":"authors"},{"authors":["adriaans"],"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"78ea24f61e3d62de779b25bb43dcc441","permalink":"https://cci-research.nl/author/pieter-adriaans/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/pieter-adriaans/","section":"authors","summary":"","tags":null,"title":"Pieter Adriaans","type":"authors"},{"authors":["shashank"],"categories":null,"content":"About Shashank Hi there, thank you for visiting. I am Shashank Shrestha. I work as a postdoc for SLICES-PP project.\n","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"592d4144643d44fd170307ff8bfdf288","permalink":"https://cci-research.nl/author/shashank-shrestha/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/shashank-shrestha/","section":"authors","summary":"About Shashank Hi there, thank you for visiting. I am Shashank Shrestha. I work as a postdoc for SLICES-PP project.","tags":null,"title":"Shashank Shrestha","type":"authors"},{"authors":["tanjina"],"categories":null,"content":" About Tanjina My name is Tanjina Islam, and I joined the Complex Cyber Infrastructure (CCI) group as a PhD student in February 2023. As part of my research, I will be working on Energy consumption and the Security of Machine Learning (ML) Applications in the Cloud-to-Edge Continuum, which aims to devise a technique to improve the energy cost of the ML pipeline while preserving their security and privacy. I was born and raised in Bangladesh, which is called a land of rivers. In 2017, I moved to the Netherlands to pursue my master's in Computer science specializing in Software Engineering and Green IT. I also worked as a Software Engineer in the IT industry for about three years back in my home country. I am very passionate about photography. I love to take pictures and draw silly things during my spare time. I also like to wander around aimlessly and often go for a long walk in the woods. ","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"21dff870ac39fcd989802032413c7abd","permalink":"https://cci-research.nl/author/tanjina-islam/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/tanjina-islam/","section":"authors","summary":"About Tanjina My name is Tanjina Islam, and I joined the Complex Cyber Infrastructure (CCI) group as a PhD student in February 2023. As part of my research, I will be working on Energy consumption and the Security of Machine Learning (ML) Applications in the Cloud-to-Edge Continuum, which aims to devise a technique to improve the energy cost of the ML pipeline while preserving their security and privacy.","tags":null,"title":"Tanjina Islam","type":"authors"},{"authors":["tomasz"],"categories":null,"content":"About Tomasz: I am employed as a post-doc researcher at the Complex Cyber Infrastructure group, where I am part of the TRUST RPA project. I am also an Associate Fellow of T.M.C. Asser Institute in The Hague, and an assistant professor at the Institute of Computer Science at Maria Curie Sklodowska University in Lublin, Poland (currently on leave). I have got MA in management (1999) and Ph.D. in computer science (2004). My dissertation concerns utilisation of artificial intelligence in banking. My main research interests are focused on computational representation of legal and ethical reasoning. I am an author of over 50 peer-reviewed papers, member of program committees of main AI and Law conferences, and a member of International Association of Artificial Intelligence and Law. My recent activities also include a research visit at Swansea University (2020), the position of Artificial Intelligence Expert for Deep Clue sp. z o. o. (2020 – 2021), as well as work on grant projects and initiatives dedicated to sharing, supporting, and popularizing knowledge. I am also music lover and musician specializing in playing blues on electric and acoustic guitars.\n","date":-62135596800,"expirydate":-62135596800,"kind":"term","lang":"en","lastmod":-62135596800,"objectID":"f7af2fd110b7cebfd16934de6b2329fb","permalink":"https://cci-research.nl/author/tomasz-zurek/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/author/tomasz-zurek/","section":"authors","summary":"About Tomasz: I am employed as a post-doc researcher at the Complex Cyber Infrastructure group, where I am part of the TRUST RPA project. I am also an Associate Fellow of T.","tags":null,"title":"Tomasz Zurek","type":"authors"},{"authors":["Christopher Esterhuyse","Damian Frolich","L. Thomas van Binsbergen"],"categories":["News"],"content":"Members of the Complex Cyber Infrastructure group have been hard at work on the topic of software languages, developing methods and tools improving the productivity and control of programmers and language-designers. The latest contributions are being published in three articles, which will each be presented at SPLASH 2024 in Pasadena, California. Each contribution provides a piece of the puzzle of developing large and complex software systems:\nBridging Incremental Programming and Complex Software Development Environments to be presented at PAINT by Max Boksem and Thomas van Binsbergen Summary: This article characterises and demonstrates a fundamentally graph-based programming environment: programs are built from explicitly-linked parts. This approach has benefits from two different, existing kinds of programming environment, which together make program parts easier to maintain and re-use. Links: DOI and PRE-PRINT. On the Soundness of Auto-completion Services for Dynamically Typed Languages to be presented at GPCE by Damian Frölich and Thomas van Binsbergen Summary: This article presents a novel mechanism for code editors to assist programmers by auto-suggesting identifiers. The novelty is that suggestions are based on an analysis of the program that is shallow enough to be fast and language-agnostic, but deep enough to guarantee suggestions are always valid. Links: DOI and PRE-PRINT. Cooperative Specification via Composition Control to be presented at SLE by Christopher Esterhuyse and Thomas van Binsbergen Summary: This article presents a framework for using specification languages in a context where the specifications are developed from parts by cooperating agents. Some language features that are useful for this purpose are identified, and used to improve three existing specification languages Links: DOI and PRE-PRINT. part of the AMdEX project. ","date":1727222400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1727222400,"objectID":"5d0be501f37cc3d53997c2f92b762109","permalink":"https://cci-research.nl/post/splash-conf-2024/","publishdate":"2024-09-25T00:00:00Z","relpermalink":"/post/splash-conf-2024/","section":"post","summary":"Members of the Complex Cyber Infrastructure group have been hard at work on the topic of software languages, developing methods and tools improving the productivity and control of programmers and language-designers.","tags":["Academic"],"title":"3 Papers Accepted at SPLASH 2024","type":"post"},{"authors":["Marco Brohet","Francesco Regazzoni","Georgios Tasopoulos"],"categories":["News"],"content":"Photo courtesy of Angelos Dimoglis (MNS).\nFrancesco Regazzoni, Marco Brohet and Georgios Tasopoulos attended the CPS Summer School 2024 on 16-20 September in Alghero, Italy. Marco and Georgios also presented posters about their research.\nCyber-physical systems (CPSs) are complex and autonomous ensembles of different components that directly cooperate to offer smart and adaptive functionalities. The CPS Summer School is targeted at students, research scientists and R\u0026amp;D experts from academia and industry, who want to learn about CPS engineering and applications. This year\u0026rsquo;s edition was held on the Italian island of Sardinia, in the city of Alghero.\n","date":1727049600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1727049600,"objectID":"4ac50333bbd5d93d7db54d39cbf447a7","permalink":"https://cci-research.nl/post/cps-2024/","publishdate":"2024-09-23T00:00:00Z","relpermalink":"/post/cps-2024/","section":"post","summary":"Francesco Regazzoni, Marco Brohet and Georgios Tasopoulos attended the CPS Summer School 2024 in Alghero, Italy. Marco and Georgios also presented posters about their research.","tags":["Academic"],"title":"Posters presented at CPS Summer School 2024","type":"post"},{"authors":["L. Thomas van Binsbergen","Cees de Laat","Sander Klous","Tom van Engers","Christopher Esterhuyse","Lu-Chi Liu","Milen Girma Kebede","Tim Müller","Merrick Oost-Rosengren","Marten Steketee","Jorrit Stutterheim"],"categories":null,"content":"The research in this theme addresses several challenges that arise from modern service-oriented systems in which the development and operationalisation of (software) services is distributed across organisational domains. These systems have in common that parties may play different roles in the realisation of applications, e.g., providing a service (such as creating data insights), infrastructure (such as compute or storage resources), or assets (such as datasets and algorithms). In such systems, organisations wish to retain control over the usage of their resources, e.g., to limit their availability, adhere to (privacy) regulations, or to protect commercial interests. To give control to resource owners, we propose systems in which policies are used to express usage constraints, mechanisms are available to enforce these constraints, and monitoring provides the information necessary for making enforcement decisions. Data exchange systems and digital data marketplaces are the primary application context, providing motivation and specific case studies.\nParticular challenges addressed by our work are:\nThe expression of laws, regulations, organisational policies and contractual agreements as enforceable system-level policies. This requires policy languages bridging the gap between legal statements and system-level events and distributed usage control mechanisms for policy enforcement. The distribution of control itself: different stakeholders (users, resource owners) contribute parts of the policy and control mechanisms (besides their contribution to the application itself). How can the policies expressed at location A affect decisions made at location B, considering the desire to avoid centralisation and considering that policies themselves may be sensitive? The automatic integration of formalised interpretations of legal sources places demands on the underlying enforcement mechanisms. Firstly, ex-post enforcement (observing and responding to violations after their occurrence) is required as not all information may be available or (interpretations of) legal sources may be conflicting. Secondly, policy decisions need to be accountable such that information on which these decisions are based (policies, meta-data, actual data) may need to be retained and may themselves by sensitive. Compliance-by-design. How and to what extent can we schedule the execution of applications or reconfigure the system\u0026rsquo;s configuration to ensure compliance with identified policy requirements. In this research theme we develop conceptual models, algorithms, protocols, languages and (prototype) tools that address these challenges.\nProjects Software Publications 2024 JustAct: Actions Universally Justified by Partial Dynamic Policies Christopher Esterhuyse, Tim Müller, L. Thomas van Binsbergen Cite Project Project Project DOI URL 2023 Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and Incentivization Reginald Cushing, Xin Zhou, Adam Belloum, Paola Grosso, Tom van Engers, Cees de Laat Cite Project DOI URL Utilisation Profiles of Bridging Function Chain for Healthcare Use Cases Jamila Alsayed Kassem, Adam Belloum, Tim Müller, Paola Grosso Cite Project DOI URL 2022 Utilisation Profiles of Bridging Function Chain for Healthcare Use Cases Jamila Alsayed Kassem, Adam Belloum, Tim Müller, Paola Grosso Cite Project DOI URL A Modular Architecture for Integrating Normative Advisors in MAS Mostafa Mohajeri Parizi, L. Thomas van Binsbergen, Giovanni Sileno, Tom van Engers Cite Project Project DOI URL Exploring the Enforcement of Private, Dynamic Policies on Medical Workflow Execution Christopher Esterhuyse, Tim Müller, L. Thomas van Binsbergen, Adam Belloum Cite Project Project DOI URL 2021 Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM) Lu Zhang, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso Cite Project DOI URL Dynamic generation of access control policies from social policies L. Thomas van Binsbergen, Milen Girma Kebede, Joshua Baugh, Tom van Engers, Dannis G. van Vuurden Cite DOI URL Brane: A Framework for Programmable Orchestration of Multi-Site Applications Onno Valkering, Reginald Cushing, Adam Belloum Cite Project DOI URL EPI Framework: Approach for Traffic Redirection Through Containerised Network Functions Jamila Alsayed Kassem, Onno Valkering, Adam Belloum, Paola Grosso Cite Project DOI URL 2020 Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures Xin Zhou, Reginald Cushing, Ralph Koning, Adam Belloum, Paola Grosso, Sander Klous, Tom van Engers, Cees de Laat Cite DOI URL eFLINT: a domain-specific language for executable norm specifications L. Thomas van Binsbergen, Lu-Chi Liu, Robert van Doesburg, Tom van Engers Cite DOI URL ","date":1725235200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1725235200,"objectID":"5ff2bd49e43c4d17bbea0db60a9ed3f6","permalink":"https://cci-research.nl/theme/governance/","publishdate":"2024-09-02T00:00:00Z","relpermalink":"/theme/governance/","section":"theme","summary":"Distributed policies, enforcement and control","tags":["Data"],"title":"Data Governance","type":"theme"},{"authors":["Damian Frolich","L. Thomas van Binsbergen"],"categories":["News"],"content":"The paper titled On the Soundness of Auto-Completion Services for Dynamically Typed Languages by Damian Frolich and L. Thomas van Binsbergen is accepted at the 23rd edition of the International Conference on Generative Programming: Concepts \u0026amp; Experience (GPCE).\nAbstract Giving auto-completion candidates for dynamically typed languages requires complex analysis of the source code, especially when the goal is to ensure that the completion candidates do not introduce bugs. In this paper we introduce an approach that builds upon abstract interpretation and the scope graph framework to obtain an over-approximation of the name binding seen at run-time. The over-approximation contains enough information to implement auto-completion services such that the given suggestions do not introduce name binding errors. To demonstrate our approach, we compare the suggestions given by our approach with the state of the art completion services on a subset of the Python programming language.\n","date":1724198400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1724198400,"objectID":"c7854c1ba22504d9f843f71a9569220f","permalink":"https://cci-research.nl/post/paper-accepted-at-gpce24/","publishdate":"2024-08-21T00:00:00Z","relpermalink":"/post/paper-accepted-at-gpce24/","section":"post","summary":"The paper titled On the Soundness of Auto-Completion Services for Dynamically Typed Languages by Damian Frolich and L. Thomas van Binsbergen is accepted at the 23rd edition of the International Conference on Generative Programming: Concepts \u0026amp; Experience (GPCE).","tags":["Academic","Programming languages"],"title":"Paper Accepted @GPCE24","type":"post"},{"authors":["Christopher Esterhuyse","Tim Müller","L. Thomas van Binsbergen"],"categories":["News"],"content":"On the 20th of June, Christopher Esterhuyse and Tim Mueller presented their paper (with L. Thomas van Binsbergen) on the novel JustAct framework at the 2024 DisCoTec federated conference, held this year in Groningen. JustAct lays a foundation for the automatic enforcement of policies that are changed by the users on the fly.\nAbstract Inter-organisational data exchange is regulated by norms originating from sources ranging from individual consent to (inter)national laws. Verifying norm-compliance is complex because laws (e.g., GDPR) distribute responsibility and require accountability. Moreover, in some domains (e.g., healthcare), the norms themselves may be private. In contrast, standard solutions (e.g., access- and usage-control, smart contracts) reason about policies that are assumed to be public. Instead, we present a novel framework prescribing how decentralised agents decide which actions are justified, despite their partial views of the policy. Crucially, justifications are universal, e.g., accepted by future auditors. Agents establish a common notion of compliance through an (externally synchronized) agreement, which is the basis of each justification defined by policy fragments agents autonomously create, gossip, and assemble.\n","date":1723593600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1723593600,"objectID":"d0ea661d85112e017388f47011916e43","permalink":"https://cci-research.nl/post/discotec24/","publishdate":"2024-08-14T00:00:00Z","relpermalink":"/post/discotec24/","section":"post","summary":"On the 20th of June, Christopher Esterhuyse and Tim Mueller presented their paper (with L. Thomas van Binsbergen) on the novel JustAct framework at the 2024 DisCoTec federated conference, held this year in Groningen.","tags":["Academic"],"title":"Paper Accepted at FORTE 2024","type":"post"},{"authors":["Peter Fratric","Tom van Engers","Giovanni Sileno","Sander Klous"],"categories":["News"],"content":"On 28 May 2024, Peter Fratric successfully defended his PhD dissertation entitled: A simulation-driven approach to non-compliance. Peter’s PhD work was supervised by Tom van Engers, Sander Klous, and Giovanni Sileno. Congratulations to dr. Peter Fratric!\n","date":1719014400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1719014400,"objectID":"a686112c556f4fde1f41ae64e0817dc3","permalink":"https://cci-research.nl/post/defense-peter-fratric/","publishdate":"2024-06-22T00:00:00Z","relpermalink":"/post/defense-peter-fratric/","section":"post","summary":"On 28 May 2024, Peter Fratric successfully defended his PhD dissertation entitled: A simulation-driven approach to non-compliance. Peter’s PhD work was supervised by Tom van Engers, Sander Klous, and Giovanni Sileno.","tags":["Academic"],"title":"PhD defense of Peter Fratric","type":"post"},{"authors":["Damian Frolich"],"categories":["News"],"content":"As is tradition, this years volleybal tournament once again contained an SNE team, including members of CCI and PCS. To prolong last year\u0026rsquo;s achievement, the team dressed up as bus drivers, including a pen in their breast pocket and a safety vest to stand out.\nRead more about it on the Faculty’s staff website.\n","date":1718236800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1718236800,"objectID":"1049a6c5660e945651aa1468a43ada1f","permalink":"https://cci-research.nl/post/volleybal-best-outfit/","publishdate":"2024-06-13T00:00:00Z","relpermalink":"/post/volleybal-best-outfit/","section":"post","summary":"As is tradition, this years volleybal tournament once again contained an SNE team, including members of CCI and PCS. To prolong last year\u0026rsquo;s achievement, the team dressed up as bus drivers, including a pen in their breast pocket and a safety vest to stand out.","tags":["Social"],"title":"The Bus Drivers Union wins best outfit prize","type":"post"},{"authors":["Ana Oprescu"],"categories":["Teaching in the Bachelor Informatics"],"content":"","date":1717372800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1717372800,"objectID":"0493bd69c32a8d526687401af9f37348","permalink":"https://cci-research.nl/teaching/project_software_engineering/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/project_software_engineering/","section":"teaching","summary":"","tags":["College of Informatics"],"title":"Project Software Engineering","type":"teaching"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"After a successful recommencement in 2023, IFIP Working Group 11.4 \u0026ldquo;Network \u0026amp; Distributed Systems Security\u0026rdquo; gathered to a workshop in Ghent on 15-17 May 2024. Security researchers from several countries discussed cutting-edge research in network and distributed systems security, including the security of distributed machine learning, privacy in distributed systems, and security of the Internet of Things. CCI was represented by Daphnee, Tanjina, Eloise, and Zoltan.\n","date":1715904e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1715904e3,"objectID":"cb9455d411856e4578a8fdce0ef52f2a","permalink":"https://cci-research.nl/post/ifip-11-4-workshop-2024/","publishdate":"2024-05-17T00:00:00Z","relpermalink":"/post/ifip-11-4-workshop-2024/","section":"post","summary":"After a successful recommencement in 2023, IFIP Working Group 11.4 \u0026ldquo;Network \u0026amp; Distributed Systems Security\u0026rdquo; gathered to a workshop in Ghent on 15-17 May 2024. Security researchers from several countries discussed cutting-edge research in network and distributed systems security, including the security of distributed machine learning, privacy in distributed systems, and security of the Internet of Things.","tags":["Academic"],"title":"IFIP WG11.4 workshop in Ghent","type":"post"},{"authors":["Ana Oprescu","Pepijn de Reus"],"categories":["News"],"content":"At the 10th International Conference on ICT for Sustainability (ICT4S), Ana and Pepijn organise a workshop on Sustainable Privacy Enhancing Techniques. The workshop delves into two critical aspects of PETs, namely: energy consumption and data utility. With ICT\u0026rsquo;s substantial carbon footprint and growing privacy concerns, this workshop aims to bridge the gap between research and informed decision-making. The workshop host presentations addressing these concerns, allowing discussion of the outcomes in a group of peers.\nThis workshop is part of the interdisciplinary research on the theme of Responsible Digital Transformation for the project on \u0026ldquo;Sustainable privacy-enhanced data\u0026rdquo;.\n","date":1714435200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1714435200,"objectID":"f0d4cb7ea00daba328af126b0f28ffb2","permalink":"https://cci-research.nl/post/ict4s-workshop-2024/","publishdate":"2024-04-30T00:00:00Z","relpermalink":"/post/ict4s-workshop-2024/","section":"post","summary":"At the 10th International Conference on ICT for Sustainability (ICT4S), Ana and Pepijn organise a workshop on Sustainable Privacy Enhancing Techniques!","tags":["Academic"],"title":"Workshop at 10th International Conference on ICT for Sustainability (ICT4S)","type":"post"},{"authors":["Zoltan Mann","Kanwal Batool"],"categories":["News"],"content":"The project LICORICE (reLIable and sCalable tOols foR self-sovereIgn identity and data proteCtion framEwork) is a pan-European cooperation of research and industry players, focusing on developing the next generation of tools and technologies for identity management and data protection. LICORICE will receive funding of 4 million EUR for 3 years from the European Union, as an innovation action in the Horizon Europe research program. Within the project, UvA - including CCI researchers Kanwal Batool and Zoltan Mann - will mainly focus on privacy-preserving neural network inference.\n","date":1712188800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712188800,"objectID":"ee325e89672377a7ad157a82c9470119","permalink":"https://cci-research.nl/post/licorice-funded/","publishdate":"2024-04-04T00:00:00Z","relpermalink":"/post/licorice-funded/","section":"post","summary":"The project LICORICE (reLIable and sCalable tOols foR self-sovereIgn identity and data proteCtion framEwork) is a pan-European cooperation of research and industry players, focusing on developing the next generation of tools and technologies for identity management and data protection.","tags":["Academic"],"title":"EU project on data protection and self-sovereign identity gets funding","type":"post"},{"authors":["Mostafa Mohajeri Parizi","Tom van Engers","Giovanni Sileno","Sander Klous"],"categories":["News"],"content":"On 4 April 2024, Mostafa Mohajeri Parizi successfully defended his PhD dissertation entitled: An Agent-based Approach to the Governance of Complex Cyber-Infrastructures. Mostafa’s PhD work was supervised by Tom van Engers, Sander Klous, and Giovanni Sileno. Congratulations to dr. Mostafa Mohajeri!\n","date":1712188800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712188800,"objectID":"e3c3e207502453592c7df45d2da33a22","permalink":"https://cci-research.nl/post/defense-mostafa-parizi/","publishdate":"2024-04-04T00:00:00Z","relpermalink":"/post/defense-mostafa-parizi/","section":"post","summary":"On 4 April 2024, Mostafa Mohajeri Parizi successfully defended his PhD dissertation entitled: An Agent-based Approach to the Governance of Complex Cyber-Infrastructures. Mostafa’s PhD work was supervised by Tom van Engers, Sander Klous, and Giovanni Sileno.","tags":["Academic"],"title":"PhD defense of Mostafa Mohajeri Parizi","type":"post"},{"authors":["Sander van Splunter"],"categories":["Teaching in the Bachelor Information Science"],"content":"In this course Bachelor Information Science students setup and execute a research project exploring an Information Science related research topic under guidance of a researcher. The project results in a bachelor thesis, published in the UvA thesis database. The thesis project runs in period 2/3 as well as in period 5/6.\n","date":1712016e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712016e3,"objectID":"76a17baeb6c6fb827863fcf77ea018a0","permalink":"https://cci-research.nl/teaching/grad_project_bsc_ik/","publishdate":"2024-03-18T00:00:00Z","relpermalink":"/teaching/grad_project_bsc_ik/","section":"teaching","summary":"In this course Bachelor Information Science students setup and execute a research project exploring an Information Science related research topic under guidance of a researcher. The project results in a bachelor thesis, published in the UvA thesis database.","tags":["College of Informatics"],"title":"Afstudeerproject BSc Informatiekunde","type":"teaching"},{"authors":["Sander van Splunter"],"categories":["Teaching in the Bachelor Artificial Intelligence"],"content":"In this course Bachelor Artificial Intelligence students setup and execute a research project exploring an AI-related research topic under guidance of a researcher. The project results in a bachelor thesis, published in the UvA thesis database.\n","date":1712016e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712016e3,"objectID":"017515c76f914b3ac6950e39bbd86a55","permalink":"https://cci-research.nl/teaching/grad_project_bsc_ki/","publishdate":"2024-03-18T00:00:00Z","relpermalink":"/teaching/grad_project_bsc_ki/","section":"teaching","summary":"In this course Bachelor Artificial Intelligence students setup and execute a research project exploring an AI-related research topic under guidance of a researcher. The project results in a bachelor thesis, published in the UvA thesis database.","tags":["College of Informatics"],"title":"Afstudeerproject BSc Kunstmatige Intelligentie","type":"teaching"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"The project Challenges in Cyber Security is a cooperation of five Dutch institutions (CWI, RU, TU/e, UvA, and VU) with the aim of making fundamental contributions to security research. It is one of the seven projects in the Netherlands to receive an NWO Gravitation grant this year, providing altogether 21.5 million euro funding over the next 10 years. The UvA team is led by Christian Schaffner and includes CCI researchers Karst Koymans, Kostas Papagiannopoulos, Zoltan Mann, and Francesco Regazzoni.\nFor more details, see https://www.amsec.org/2024/03/nwo-gravitation-21-5-million-euros-for-challenges-in-cyber-security/.\n","date":1712016e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712016e3,"objectID":"03759e41ae0d38deaf917fd9e3e425af","permalink":"https://cci-research.nl/post/gravitation/","publishdate":"2024-04-02T00:00:00Z","relpermalink":"/post/gravitation/","section":"post","summary":"The project Challenges in Cyber Security is a cooperation of five Dutch institutions (CWI, RU, TU/e, UvA, and VU) with the aim of making fundamental contributions to security research. It is one of the seven projects in the Netherlands to receive an NWO Gravitation grant this year, providing altogether 21.","tags":["Academic"],"title":"Large national cybersecurity project gets funding","type":"post"},{"authors":["Sander van Splunter"],"categories":["Teaching in the Bachelor Information Science"],"content":"The course Modelling and Design is focused on learning domain modelling, and how to create formalised representation. Whilst applying modelling techniques, a broader architectural view is taken, in which students are made aware of choices in e.g. framing and scoping. This course prepares students to exchange knowledge with domain stakeholders, and to communicate potential design decisions.\n","date":1712016e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1712016e3,"objectID":"3fbdb2c7b417ae488a81ec2877c94ffc","permalink":"https://cci-research.nl/teaching/modelleren_en_ontwerpen/","publishdate":"2024-03-18T00:00:00Z","relpermalink":"/teaching/modelleren_en_ontwerpen/","section":"teaching","summary":"The course Modelling and Design is focused on learning domain modelling, and how to create formalised representation. Whilst applying modelling techniques, a broader architectural view is taken, in which students are made aware of choices in e.","tags":["College of Informatics"],"title":"Modelleren en Ontwerpen","type":"teaching"},{"authors":["Kostas Papagiannopoulos"],"categories":["Teaching in the Master Security and Network Engineering"],"content":"In the offensive technologies course, students learn how to test and judge the security of many IT related components, such as hardware and network protocols. They also learn how to report such findings and patch them, while also studying how to create offensive technologies themselves.\n","date":1711929600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1711929600,"objectID":"5cc9a0723aa4c6244849b7d55c693638","permalink":"https://cci-research.nl/teaching/offensive_technologies/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/offensive_technologies/","section":"teaching","summary":"In the offensive technologies course, students learn how to test and judge the security of many IT related components, such as hardware and network protocols. They also learn how to report such findings and patch them, while also studying how to create offensive technologies themselves.","tags":["Graduate School of Informatics"],"title":"Offensive Technologies","type":"teaching"},{"authors":["Arno Bakker"],"categories":["Teaching in the Bachelor Informatics"],"content":"In the Operating Systems course, students learn how applications interact with the hardware via the operating system, and how the operating system solves various tasks for the applications such as CPU scheduling, and memory and storage management.\nUnderstanding these basics is very important to analyse and tune the performance of a system to a particular application. In the Complex Cyber Infrastructure group, we are often dealing with very high performance hardware, such as 400 Gbps fiber links, and large storage volumes. To have e.g. data-processing applications make full use of this hardware, requires tuning the operating system to the specific workload, and this is where the fundamental operating system knowledge comes in.\n","date":1711929600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1711929600,"objectID":"06cc4699869a41ce37f3c04af638798e","permalink":"https://cci-research.nl/teaching/operating_systems/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/operating_systems/","section":"teaching","summary":"In the Operating Systems course, students learn how applications interact with the hardware via the operating system, and how the operating system solves various tasks for the applications such as CPU scheduling, and memory and storage management.","tags":["College of Informatics"],"title":"Operating Systems","type":"teaching"},{"authors":["Aya Fukami","Zoltan Mann"],"categories":["News"],"content":"The article Assessing data remnants in modern smartphones after factory reset, published in September 2023 in the journal Forensic Science International: Digital Investigation, has won the Best Paper Award 2023. The paper was selected from a list of high-quality research papers published in FSI:DI over the past two years. It was judged and praised for its original contribution and high impact in the community. The paper\u0026rsquo;s authors are: former Security and Network Engineering student Mattheüs B. Blankesteijn, CCI PhD student Aya Fukami, and Professor Zeno Geradts from the Netherlands Forensic Institute.\n","date":1711584e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1711584e3,"objectID":"68fe22d4bf46de621ee5f7da0b993824","permalink":"https://cci-research.nl/post/best-paper-aya/","publishdate":"2024-03-28T00:00:00Z","relpermalink":"/post/best-paper-aya/","section":"post","summary":"The article Assessing data remnants in modern smartphones after factory reset, published in September 2023 in the journal Forensic Science International: Digital Investigation, has won the Best Paper Award 2023. The paper was selected from a list of high-quality research papers published in FSI:DI over the past two years.","tags":["Academic"],"title":"Best paper award for article in Forensic Science International: Digital Investigation","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"Join our team! We have an open Assistant Professor position in the area of Future Cloud Computing Technologies. Potential research topics include green cloud computing, data management in cloud computing, security and privacy in cloud computing, cloud services for machine learning, sovereignty of cloud services, software engineering for cloud-based software, cloud-to-edge continuum. See the details and apply here by 14 April 2024: https://vacatures.uva.nl/UvA/job/Assistant-Professor-in-Future-Cloud-Computing-Technologies/788753802/\n","date":1708992e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1708992e3,"objectID":"c1979ea92a4f28e9159347c630abc003","permalink":"https://cci-research.nl/post/vacancy-2024-02/","publishdate":"2024-02-27T00:00:00Z","relpermalink":"/post/vacancy-2024-02/","section":"post","summary":"Join our team! We have an open Assistant Professor position in the area of Future Cloud Computing Technologies. Potential research topics include green cloud computing, data management in cloud computing, security and privacy in cloud computing, cloud services for machine learning, sovereignty of cloud services, software engineering for cloud-based software, cloud-to-edge continuum.","tags":["Academic"],"title":"Vacancy: Assistant Professor in Future Cloud Computing Technologies","type":"post"},{"authors":["Xin Zhou","Yuri Demchenko","Zoltan Mann"],"categories":["News"],"content":"On 16 February 2024, Xin Zhou successfully defended her PhD dissertation entitled \u0026ldquo;From Empowering to Motivating: Enhancing Policy Enforcement through Process Design and Incentive Implementation\u0026rdquo;. Xin\u0026rsquo;s PhD work was supervised by Cees de Laat and Tom van Engers, and co-supervised by Adam Belloum and Sander Klous. Congratulations to dr. Xin Zhou!\n","date":1708041600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1708041600,"objectID":"7d6295a137f7713d55ea9d15612937c7","permalink":"https://cci-research.nl/post/defense-xin-zhou/","publishdate":"2024-02-16T00:00:00Z","relpermalink":"/post/defense-xin-zhou/","section":"post","summary":"On 16 February 2024, Xin Zhou successfully defended her PhD dissertation entitled \u0026ldquo;From Empowering to Motivating: Enhancing Policy Enforcement through Process Design and Incentive Implementation\u0026rdquo;. Xin\u0026rsquo;s PhD work was supervised by Cees de Laat and Tom van Engers, and co-supervised by Adam Belloum and Sander Klous.","tags":["Academic"],"title":"PhD defense of Xin Zhou","type":"post"},{"authors":["Damian Frolich","L. Thomas van Binsbergen"],"categories":["News"],"content":"The paper titled iCoLa+: An extensible meta-language with support for exploratory language development by Damian Frolich and L. Thomas van Binsbergen is accepted by the Journal of Systems and Software.\nAbstract Programming languages providing high-level abstractions can increase a programmers’ productivity and the safety of a program. Language-oriented programming is a paradigm in which domain-specific languages are developed to solve problems within specific domains with (high-level) abstractions relevant to those domains. However, language development involves complex design and engineering processes. These processes can be simplified by reusing (parts of) existing languages and by offering language-parametric tooling.\nIn this paper we present iCoLa+, an extensible meta-language implemented in Haskell supporting incremental (meta-)programming based on reusable components. We demonstrate iCoLa+ through the construction of the Imp, SIMPLE, and MiniJava languages via the composition and restriction of language fragments, demonstrate the variability of our approach through the construction of several languages using a fixed-set of operators, and demonstrate the different forms of extensions possible in iCoLa+.\n","date":1707350400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707350400,"objectID":"afcea1bd31992fc3c6075bff390b63d1","permalink":"https://cci-research.nl/post/paper-accepted-at-jss24-02/","publishdate":"2024-02-08T00:00:00Z","relpermalink":"/post/paper-accepted-at-jss24-02/","section":"post","summary":"The paper titled iCoLa+: An extensible meta-language with support for exploratory language development by Damian Frolich and L. Thomas van Binsbergen is accepted by the Journal of Systems and Software.","tags":["Academic","Programming languages"],"title":"Paper Accepted @JSS","type":"post"},{"authors":["L. Thomas van Binsbergen"],"categories":["Teaching in the Bachelor Informatics"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"233df9b9da89890b1b0aefe3657cf9f6","permalink":"https://cci-research.nl/teaching/compiler_construction/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/compiler_construction/","section":"teaching","summary":"","tags":["College of Informatics"],"title":"Compiler construction","type":"teaching"},{"authors":["Francesco Regazzoni","Kostas Papagiannopoulos","Marco Brohet","Kyrian Maat","Georgios Tasopoulos"],"categories":["Teaching in the Master Computer Science"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"e7f53e7b456006561940b08abf6cc4f2","permalink":"https://cci-research.nl/teaching/cryptographic_engineering/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/cryptographic_engineering/","section":"teaching","summary":"","tags":["Graduate School of Informatics"],"title":"Cryptographic Engineering","type":"teaching"},{"authors":["Yuri Demchenko"],"categories":["Teaching in the Master Software Engineering"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"4d4028f9050457bab01294113d415338","permalink":"https://cci-research.nl/teaching/devops/","publishdate":"2024-02-23T00:00:00Z","relpermalink":"/teaching/devops/","section":"teaching","summary":"","tags":["Graduate School of Informatics"],"title":"DevOps","type":"teaching"},{"authors":["Leon Gommans","Sander Klous","Tom van Engers"],"categories":["Teaching in the Bachelor Information Science"],"content":"In the course Organisational Analysis and Developement (in Dutch Organisatieontwikkeling and -ontwikkeling) we study how collaborations between organisations influence IT-architectures that support cross-organisational collaboration. Particularly, we focus on data-sharing aspects and usage control that is required to create trust essential to collaboration.\n","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"0a431b3e485d51211c0c6a2bbad9fbb0","permalink":"https://cci-research.nl/teaching/organisatie_analyse_en_ontwikkeling/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/organisatie_analyse_en_ontwikkeling/","section":"teaching","summary":"In the course Organisational Analysis and Developement (in Dutch Organisatieontwikkeling and -ontwikkeling) we study how collaborations between organisations influence IT-architectures that support cross-organisational collaboration. Particularly, we focus on data-sharing aspects and usage control that is required to create trust essential to collaboration.","tags":["College of Informatics"],"title":"Organisatie: analyse en ontwikkeling","type":"teaching"},{"authors":["Ana Oprescu","Divya Ravi","Kostas Papagiannopoulos"],"categories":["Teaching in the Master Software Engineering"],"content":"During paper sessions, students learn skills to find, read and assess relevant scientific publications. They also learn to build argumentation structures needed for theory and analysis.\n","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"e5c48dc317e87c69b1ca8ed942b5e08c","permalink":"https://cci-research.nl/teaching/prep_master_project/","publishdate":"2024-02-23T00:00:00Z","relpermalink":"/teaching/prep_master_project/","section":"teaching","summary":"During paper sessions, students learn skills to find, read and assess relevant scientific publications. They also learn to build argumentation structures needed for theory and analysis.","tags":["Graduate School of Informatics"],"title":"Preparation Masterproject Software Engineering","type":"teaching"},{"authors":["L. Thomas van Binsbergen","Christopher Esterhuyse"],"categories":["Teaching in the Bachelor Informatics"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"0d8b7667200fda7eae2fe0fe9d830dc0","permalink":"https://cci-research.nl/teaching/programmeertalen/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/programmeertalen/","section":"teaching","summary":"","tags":["College of Informatics"],"title":"Programmeertalen","type":"teaching"},{"authors":["Divya Ravi"],"categories":["Teaching in the Master Computer Science"],"content":"Traditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more.\nThe course focuses on Secure Computation that has developed as a central tool in cryptography — This allows multiple distributed parties to jointly compute on their private inputs, with the guarantee that nothing beyond the output is revealed. The current and potential impact of secure computing is widespread across scenarios where data sharing is constrained due to legal, ethical, or privacy reasons.\nThis course\ngives a comprehensive treatment of foundations of secure computation. explains protocols for special secure computing tasks such as zero-knowledge proofs, private set intersection and private information retrieval. demonstrates use cases of real-world systems where secure computing protocols have been / could be deployed, including ZCash (a privacy-focused cryptocurrency) and the Apple CSAM Detection System. The primary aim of the course is to enable students to acquire the basic concepts and skills needed to follow the current research trends in theory and practice of secure computation. This course is closely linked to data protection and privacy in large-scale computation, which aligns with the research interests of CCI researchers working on security and privacy.\n","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"ea464e5f2086d470baadd397c4c84c1d","permalink":"https://cci-research.nl/teaching/secure_computation/","publishdate":"2024-02-23T00:00:00Z","relpermalink":"/teaching/secure_computation/","section":"teaching","summary":"Traditionally, cryptography is used to protect data in transit from an eavesdropping adversary. With the advent of big data and large-scale computation, cryptography can offer us much more.\nThe course focuses on Secure Computation that has developed as a central tool in cryptography — This allows multiple distributed parties to jointly compute on their private inputs, with the guarantee that nothing beyond the output is revealed.","tags":["Graduate School of Informatics"],"title":"Secure Computation","type":"teaching"},{"authors":["L. Thomas van Binsbergen","Damian Frolich"],"categories":["Teaching in the Master Software Engineering"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"09040d203feac93410dad58610dfbdc4","permalink":"https://cci-research.nl/teaching/software_evolution/","publishdate":"2024-02-23T00:00:00Z","relpermalink":"/teaching/software_evolution/","section":"teaching","summary":"","tags":["Graduate School of Informatics"],"title":"Software Evolution","type":"teaching"},{"authors":["Ana Oprescu","Damian Frolich"],"categories":["Teaching in the Master Software Engineering"],"content":"","date":1707091200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1707091200,"objectID":"a3a78a630e5a15de9fd2cee44b3409fc","permalink":"https://cci-research.nl/teaching/software_spec_and_testing/","publishdate":"2024-02-23T00:00:00Z","relpermalink":"/teaching/software_spec_and_testing/","section":"teaching","summary":"","tags":["Graduate School of Informatics"],"title":"Software Specification Verification and Testing","type":"teaching"},{"authors":["L. Thomas van Binsbergen"],"categories":["News"],"content":" The primary goal of the document is to describe the AMdEX approach to sharing data and the AMdEX reference architecture comprised of governance solutions and technical solutions. Central to the approach are the AMdEX community members that cooperate as a consortium within AMdEX dataspaces and within a certain ecosystem. This document also explains how AMdEX works in practice, both from a user’s perspective, in relation to other initiatives, and by presenting existing use cases. In particular, this document describes: The principles guiding the design of the AMdEX technical architecture The users, roles, (technical) components and protocols that form AMdEX dataspaces and ecosystems The administration and enforcement of policies within AMdEX Use cases from the AMdEX fieldlab project, explained in terms of the aforementioned roles and components An important aspect of AMdEX is the explicit connection made between contractual agreements and applicable laws (soft infrastructure) on the one hand and the (hard) technical infrastructure on the other hand. This document describes how that connection is made and the process by which laws and contracts are integrated into the technical domain. This work is executed within the AMdEX Fieldlab project supported by Kansen Voor West EFRO (KVW00309) and the province of Noord-Holland. ","date":1706745600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1706745600,"objectID":"fe575c370930b3124c95d83950ee9194","permalink":"https://cci-research.nl/post/amdex-ram-v1/","publishdate":"2024-02-01T00:00:00Z","relpermalink":"/post/amdex-ram-v1/","section":"post","summary":"The primary goal of the document is to describe the AMdEX approach to sharing data and the AMdEX reference architecture comprised of governance solutions and technical solutions. Central to the approach are the AMdEX community members that cooperate as a consortium within AMdEX dataspaces and within a certain ecosystem.","tags":["Academic"],"title":"Just released: AMdEX Reference Architecture version 1","type":"post"},{"authors":["Yuri Demchenko"],"categories":["Teaching in the Bachelor Informatics"],"content":"","date":1704672e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1704672e3,"objectID":"a971b507bcd92328e8d798a7d12ec608","permalink":"https://cci-research.nl/teaching/web_and_media_tech/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/web_and_media_tech/","section":"teaching","summary":"","tags":["College of Informatics"],"title":"Web and Media Tech","type":"teaching"},{"authors":["Christopher Esterhuyse","Tim Müller","L. Thomas van Binsbergen"],"categories":[],"content":"","date":1704067200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1717144058,"objectID":"54fd75ce3a99acb075a5aaa4dbbdaf6a","permalink":"https://cci-research.nl/publication/just-act-2024/","publishdate":"2024-01-01T00:00:00Z","relpermalink":"/publication/just-act-2024/","section":"publication","summary":"","tags":[],"title":"JustAct: Actions Universally Justified by Partial Dynamic Policies","type":"publication"},{"authors":["L. Thomas van Binsbergen"],"categories":["News"],"content":" During SPLASH, Thomas was awarded the ACM Distinguished Reviewer award for his role on the programme committee of the Software Language Engineering conference. ","date":1700006400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1700006400,"objectID":"bc9984ecc9c033a0b749492b8f0f6023","permalink":"https://cci-research.nl/post/thomas-sle-reviews/","publishdate":"2023-11-15T00:00:00Z","relpermalink":"/post/thomas-sle-reviews/","section":"post","summary":" During SPLASH, Thomas was awarded the ACM Distinguished Reviewer award for his role on the programme committee of the Software Language Engineering conference. ","tags":["Academic"],"title":"Thomas wins distinguished reviewer award for his SLE2023 reviews","type":"post"},{"authors":["Francesco Regazzoni","Kostas Papagiannopoulos","Marco Brohet"],"categories":["News"],"content":"The 22nd Smart Card Research and Advanced Application Conference (CARDIS 2023), hosted by CCI in LAB42, is taking place this week, with tutorials on Tuesday and research talks on Wednesday and Thursday.\nCARDIS has been the venue for security experts from industry and academia to exchange on security of smart cards and related applications since 1994. Smart cards play an increasingly important role in our day-to-day life through their use in banking cards, SIM cards, electronic passports, and IoT devices. It is thus naturally of utmost importance to understand their security features and to develop sound protocols and countermeasures while keeping reasonable performance. In this respect, CARDIS aims to gather security experts from industry, academia, and standardization bodies to make steps forward in the field of embedded security.\nFind the full program on the official website here.\n","date":1699833600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1699833600,"objectID":"8bc405e5fe4c477044f8491c1f3102c9","permalink":"https://cci-research.nl/post/cardis-2023/","publishdate":"2023-11-13T00:00:00Z","relpermalink":"/post/cardis-2023/","section":"post","summary":"The 22nd Smart Card Research and Advanced Application Conference (CARDIS 2023), hosted by CCI in LAB42, is taking place this week, with tutorials on Tuesday and research talks on Wednesday and Thursday.","tags":["Academic"],"title":"This week at CCI: CARDIS 2023","type":"post"},{"authors":["Marco Brohet","Francesco Regazzoni"],"categories":["News"],"content":"Our paper, Demonstrating Post-Quantum Remote Attestation for RISC-V Devices, authored by Maximilian Barger (MSc Computer Security student at VU Amsterdam), Marco Brohet and Francesco Regazzoni, has been accepted as an extended abstract at the 2024 Design, Automation \u0026amp; Test in Europe Conference \u0026amp; Exhibition (DATE).\nAbstract The rapid proliferation of Internet of Things (IoT) devices has revolutionized many aspects of modern computing. Experience has shown that these devices often have severe security problems and are common targets for malware. One approach to ensure that only trusted software is executed on these devices is Remote Attestation, which allows a verifier to attest the integrity of software running on such a prover device. As malware is typically not trusted, an infected device will fail to generate a valid signature, which allows the verifier to detect the presence of malware on the prover. To achieve its security guarantees, Remote Attestation requires a trust anchor, often found in the form of dedicated hardware on the prover. For IoT and embedded devices such hardware has only recently become largely deployed. Modern Remote Attestation protocols rely on classical asymmetric signatures that are vulnerable to quantum attacks, which are expected to become feasible in the near future. Considering the extensive usage of IoT and embedded systems combined with their long lifetime (in some applications), it is necessary to be able to retrofit these devices to support quantum secure Remote Attestation without incurring a prohibitive overhead. In this paper we present SPRAV, a software-based Remote Attestation system that leverages the Physical Memory Protection (PMP) primitive of RISC-V to achieve its security guarantees and employs quantum- safe cryptographic algorithms to ensure resistance against quan- tum attacks in the future. Our evaluation shows that it is feasible to deploy this solution on RISC-V devices without incurring a prohibitive overhead or the need for additional hardware, paving the way towards quantum-resistant functionalities also in IoT.\n","date":1699401600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1699401600,"objectID":"849a466343acbca37729b9df49148ec5","permalink":"https://cci-research.nl/post/date-2024/","publishdate":"2023-11-08T00:00:00Z","relpermalink":"/post/date-2024/","section":"post","summary":"Our paper, Demonstrating Post-Quantum Remote Attestation for RISC-V Devices, authored by Maximilian Barger (MSc Computer Security student at VU Amsterdam), Marco Brohet and Francesco Regazzoni, has been accepted as an extended abstract at the 2024 Design, Automation \u0026amp; Test in Europe Conference \u0026amp; Exhibition (DATE).","tags":["Academic"],"title":"Paper Accepted at DATE 2024","type":"post"},{"authors":["Damian Frolich","L. Thomas van Binsbergen"],"categories":["News"],"content":"The paper titled Adaptive Structural Operational Semantics by Gwendal Jouneaux (Univ. Rennes, Inria, IRISA); Damian Frolich (University of Amsterdam); Olivier Barais (Univ. Rennes, Inria, CNRS, IRISA); Benoit Combemale (Univ. Rennes, Inria, IRISA); Gurvan Le Guernic (DGA Maîtrise de l’Information, Univ. Rennes, Inria, IRISA); Gunter Mussbacher (McGill University, Inria); L. Thomas van Binsbergen (University of Amsterdam) is accepted at the 16th edition of the Software Language Engineering (SLE) conference.\nAbstract Software systems evolve more and more in complex and changing environments, often requiring runtime adaptation to best deliver their services. When self-adaptation is the main concern of the system, a manual implementation of the underlying feedback loop and trade-off analysis may be desirable. However, the required expertise and substantial development effort make such implementations prohibitively difficult when it is only a secondary concern for the given domain. In this paper, we present ASOS, a metalanguage abstracting the runtime adaptation concern of a given domain in the behavioral semantics of a domain-specific language (DSL), freeing the language user from implementing it from scratch for each system in the domain. We demonstrate our approach on RobLANG, a procedural DSL for robotics, where we abstract a recurrent energy-saving behavior depending on the context. We provide formal semantics for ASOS and pave the way for checking properties such as determinism, completeness, and termination of the resulting self-adaptable language. We provide first results on the performance of our approach compared to a manual implementation of this self- adaptable behavior. We demonstrate, for RobLANG, that our approach provides suitable abstractions for specifying sound adaptive operational semantics while being more efficient.\n","date":1696982400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1696982400,"objectID":"6c7e6df9c342185d382a399349c21d92","permalink":"https://cci-research.nl/post/paper-accepted-at-sle23/","publishdate":"2023-10-11T00:00:00Z","relpermalink":"/post/paper-accepted-at-sle23/","section":"post","summary":"The paper titled Adaptive Structural Operational Semantics by Gwendal Jouneaux (Univ. Rennes, Inria, IRISA); Damian Frolich (University of Amsterdam); Olivier Barais (Univ. Rennes, Inria, CNRS, IRISA); Benoit Combemale (Univ. Rennes, Inria, IRISA); Gurvan Le Guernic (DGA Maîtrise de l’Information, Univ.","tags":["Academic","Programming languages"],"title":"Paper Accepted @SLE23","type":"post"},{"authors":["Marco Brohet","Kyrian Maat"],"categories":["News"],"content":"As one of the three representing teams of our Informatics Institute at the Amsterdam Science Park Open Day, CCI members Kyrian and Marco gave a demo on how scientists hack hardware\u0026ndash;in an effort to make it more secure, afterwards.\nThis was CCI\u0026rsquo;s second participation in the Open Day. It was a great success, with lots of families amazed by the FPGAs and hardware we showcased and the oscilloscope showing waveforms.\nAbout the Open Day The Amsterdam Science Park Open Day is a collaboration of Amsterdam Science Park, AMOLF, ARCNL, CWI, Nikhef, and the University of Amsterdam. It is part of the Weekend van de Wetenschap (Weekend of Science), held anually in the first weekend of October. The event is an initiative of the Dutch Ministry of Education, Culture and Science, aimed to make the world of science and technology accessible to people of all ages.\n","date":169668e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":169668e4,"objectID":"72cb8da3224472ee17e8d7cf8c5bdae9","permalink":"https://cci-research.nl/post/open-day-2023/","publishdate":"2023-10-07T12:00:00Z","relpermalink":"/post/open-day-2023/","section":"post","summary":"As one of the three representing teams of our Informatics Institute at the Amsterdam Science Park Open Day, CCI members Kyrian and Marco gave a demo on how scientists hack hardware\u0026ndash;in an effort to make it more secure, afterwards.\n","tags":["Social"],"title":"CCI Demoing at Science Park's Open Day","type":"post"},{"authors":["Kanwal Batool"],"categories":["News"],"content":"Kanwal Batool participated \u0026amp; had a Poster demonstration for the event of “Security \u0026amp; Privacy in the age of AI” organised by DistriNet Research Unit at Campus Arenberg III, KU Leuven, Heverlee, Leuven, Belgium.\n","date":1695124800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1695124800,"objectID":"4fa7b9e3f3a158e45cb53568f705ef05","permalink":"https://cci-research.nl/post/kanwal-ku-leuven/","publishdate":"2023-09-19T12:00:00Z","relpermalink":"/post/kanwal-ku-leuven/","section":"post","summary":"Kanwal Batool participated \u0026amp; had a Poster demonstration for the event of “Security \u0026amp; Privacy in the age of AI” organised by DistriNet Research Unit at Campus Arenberg III, KU Leuven, Heverlee, Leuven, Belgium.","tags":["Academic"],"title":"Poster demonstration @ KU Leuven","type":"post"},{"authors":["Kostas Papagiannopoulos"],"categories":["Teaching in the Bachelor Artificial Intelligence"],"content":"","date":1694044800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1694044800,"objectID":"cf1dcd00b24abb1b3d3e14994a6317fa","permalink":"https://cci-research.nl/teaching/computer_systems/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/computer_systems/","section":"teaching","summary":"","tags":["College of Informatics"],"title":"Computer Systems","type":"teaching"},{"authors":["Kostas Papagiannopoulos","Francesco Regazzoni","Daphnee Chabal"],"categories":["Teaching in the Bachelor Informatics"],"content":"Security is one of the most important extra-functional property of systems. Essential yet often overlooked, security ensures that our daily transactions remain protected, that our infrastructure operates regularly and that our communication stays private and safe from unauthorized parties. The aim of Introduction to Security is to provide solid foundations on the overall security domain, starting from the core components of cryptographic theory, implementations and cryptanalysis. Subsequently, it shows how secure are used to build the cryptographic protocols deployed in our everyday life, and we continue by covering the fundamentals of operating systems\u0026rsquo; security, intrusion detection/prevention and recent research topics such as privacy-preserving technology.\nWithin CCI, our research strives to develop and apply open-source, efficient, protected and tailor-made cryptographic implementations that ensure the security, privacy and availability of our society\u0026rsquo;s communication infrastructure.\n","date":1694044800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1694044800,"objectID":"6b9330f0ffd16c521ac19a6145eaab84","permalink":"https://cci-research.nl/teaching/introduction_to_security/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/introduction_to_security/","section":"teaching","summary":"Security is one of the most important extra-functional property of systems. Essential yet often overlooked, security ensures that our daily transactions remain protected, that our infrastructure operates regularly and that our communication stays private and safe from unauthorized parties.","tags":["College of Informatics"],"title":"Introduction to Security","type":"teaching"},{"authors":["Tom van Engers"],"categories":["Teaching in the Bachelor Information Science"],"content":"The course Network Organisation is focused on the questions why and how organisations collaborate in a complex environment. Studying those collaborations students are aimed to get better insights in how organisations function in a dynamic context. The students use system dynamic modelling to represent those collaborations and develop quantitative dynamic models that support policy decisions that affect the stakeholders in such complex enviroment\n","date":1694044800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1694044800,"objectID":"8afb5c19a35f0b45870dc5f7d463c495","permalink":"https://cci-research.nl/teaching/netwerkorganisatie/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/netwerkorganisatie/","section":"teaching","summary":"The course Network Organisation is focused on the questions why and how organisations collaborate in a complex environment. Studying those collaborations students are aimed to get better insights in how organisations function in a dynamic context.","tags":["College of Informatics"],"title":"Netwerkorganisatie","type":"teaching"},{"authors":["Zoltan Mann","Daphnee Chabal","Kyrian Maat","Eloise Zhang"],"categories":["Teaching in the Master Computer Science"],"content":"The course focuses on technologies that can be used to protect data from unauthorized access. The main motivation is to protect personal data and comply with data protection legislation such as the General Data Protection Regulation of the European Union. The course\nexplains the context of data protection technologies from multiple angles (e.g., legal requirements, interplay with other quality attributes); conveys in-depth knowledge on some specific data protection technologies (e.g., cryptographic protocols for secure multi-party computation, anonymization and pseudonymization, differential privacy, access control, anonymous communications); showcases applications of data protection technologies (in particular, privacy-preserving machine learning and location privacy). The course is closely linked to the research performed by CCI researchers in the field of security and privacy (for example, in the SECURED, FogProtect, and EPI projects).\n","date":1693785600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1693785600,"objectID":"a1c184c15026036a840e8d17a2b916e0","permalink":"https://cci-research.nl/teaching/data_protection_technologies/","publishdate":"2022-09-07T00:00:00Z","relpermalink":"/teaching/data_protection_technologies/","section":"teaching","summary":"The course focuses on technologies that can be used to protect data from unauthorized access. The main motivation is to protect personal data and comply with data protection legislation such as the General Data Protection Regulation of the European Union.","tags":["Graduate School of Informatics"],"title":"Data Protection Technologies","type":"teaching"},{"authors":["Kanwal Batool"],"categories":["News"],"content":"Kanwal Batool presented work @ IFIP, the International Federation for Information Processing, in the Working Group “Network \u0026amp; Distributed Systems Security”.\n","date":1692878400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1692878400,"objectID":"faaf927db22953d5dd9e907e6f9ebc9a","permalink":"https://cci-research.nl/post/kanwal-ifip/","publishdate":"2023-08-24T12:00:00Z","relpermalink":"/post/kanwal-ifip/","section":"post","summary":"Kanwal Batool presented work @ IFIP, the International Federation for Information Processing, in the Working Group “Network \u0026amp; Distributed Systems Security”.","tags":["Academic"],"title":"Presentation @ IFIP","type":"post"},{"authors":["Zoltan Mann","Viktoriya Degeler"],"categories":["News"],"content":"The Lorentz Center hosted a week-long international workshop on Future Computing for Digital Infrastructures. More than 40 experts participated and discussed current and future challenges and potential solutions in computing, including the effects on computing by artificial intelligence, sustainability, and security. CCI was represented by Viktoriya Degeler and Zoltan Mann.\n","date":1691366400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1691366400,"objectID":"cedd93ebd24771ba3940719461ec69a0","permalink":"https://cci-research.nl/post/lorentz-2023/","publishdate":"2023-08-07T00:00:00Z","relpermalink":"/post/lorentz-2023/","section":"post","summary":"The Lorentz Center hosted a week-long international workshop on Future Computing for Digital Infrastructures. More than 40 experts participated and discussed current and future challenges and potential solutions in computing, including the effects on computing by artificial intelligence, sustainability, and security.","tags":["Academic"],"title":"Lorentz workshop on Future Computing for Digital Infrastructures","type":"post"},{"authors":["Xin Zhou","Cees de Laat","Tom van Engers"],"categories":["News"],"content":"The paper titled Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and Incentivization by Zhou, X., Cushing, R., Koning, R., Belloum, A., Grosso, P., Klous, S., van Engers, T. \u0026 de Laat, C. was accepted at ","date":1689897600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1689897600,"objectID":"60e714f15b4a378a6ff85e6d51b58c72","permalink":"https://cci-research.nl/post/paper-accepted-tps/","publishdate":"2023-07-21T00:00:00Z","relpermalink":"/post/paper-accepted-tps/","section":"post","summary":"The paper titled Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and Incentivization by Zhou, X., Cushing, R., Koning, R., Belloum, A., Grosso, P., Klous, S., van Engers, T.","tags":["Academic"],"title":"Paper Accepted @IEEE TPS 2023","type":"post"},{"authors":["Xin Zhou","Cees de Laat","Tom van Engers"],"categories":["News"],"content":"The paper titled The dynamics of corruption under an optional external supervision service by Xin Zhou, Adam Belloum, Michael H. Lees, Tom van Engers, Cees de Laat has been published at Applied Mathematics and Computation. Abstract: External supervision services play an important role in combating corruption by detecting potential collusive bribery. This work aims at studying the dynamics of collusive bribery when participants have the option of engaging the external supervision services. To do so, we construct a basic model where collusive bribery can happen between the defecting participants who aim to escape from a punishment by offering a bribe to rule enforcers who monitor interactions among all participants. Among rule enforcers, only the corrupt ones accept the bribe and ignore the violations. The cooperative participants can engage the external supervision service at a certain cost to avoid the risk of potential collusive bribery. Under the framework of evolutionary game theory, we find that a higher initial fraction of honest enforcers is more likely to lead to a trusting cooperating equilibrium. We also find that, when allowing random exploration of available strategies, increasing the exploration rate of rule enforcers is effective in combating corruption for both infinite and finite populations. Lastly, we find that minimizing the cost of external supervision services is not always good. When the system evolves into a cooperating equilibrium, a low cost of external supervision service induces unnecessary costs of seeking external supervision. When the strategy profiles exhibit stable oscillations, there exists an optimal cost of external supervision, considering the trade-off between minimizing the chance of exposing cooperative participants to collusive bribery and strengthening the punishment on the corrupt enforcers. Premised on the results, we discuss practical management suggestions.\n","date":1688083200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1688083200,"objectID":"698675e8d19634661f7020ad368b6847","permalink":"https://cci-research.nl/post/paper-published-amc/","publishdate":"2023-06-30T00:00:00Z","relpermalink":"/post/paper-published-amc/","section":"post","summary":"The paper titled The dynamics of corruption under an optional external supervision service by Xin Zhou, Adam Belloum, Michael H. Lees, Tom van Engers, Cees de Laat has been published at Applied Mathematics and Computation.","tags":["Academic"],"title":"Paper Published@AMC 2023","type":"post"},{"authors":["Marco Brohet","Francesco Regazzoni"],"categories":["News"],"content":"Photo courtesy of the @Large Research group at the VU.\nMaximilian Barger, MSc Computer Security student at the Vrije Universiteit Amsterdam, conducted a research project under the supervision of CCI members Marco Brohet and Francesco Regazzoni on implementing post-quantum remote attestation on RISC-V devices. He presented his work at CompSys 2023 and received the Best Short Paper Award. Congratulations, Max!\nThe International Conference on Computer Systems (CompSys) is the premier forum for Dutch research into Computer Systems research. The aim is to showcase success stories while also fostering and strengthening collaboration. CompSys 2023 was hosted at Hotel Kontakt der Kontinenten in Soesterberg.\n","date":1687996800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1687996800,"objectID":"0b43f54169107ae498ee743167ebbf14","permalink":"https://cci-research.nl/post/compsys-2023/","publishdate":"2023-06-29T00:00:00Z","relpermalink":"/post/compsys-2023/","section":"post","summary":"Maximilian Barger, MSc Computer Security student at the Vrije Universiteit Amsterdam, received the Best Short Paper Award at CompSys 2023 for his research project that was supervised by CCI members Marco Brohet and Francesco Regazzoni. Congratulations, Max!","tags":["Academic"],"title":"Best Short Paper Award at CompSys 2023","type":"post"},{"authors":["Kanwal Batool"],"categories":["News"],"content":"Kanwal Batool attended a tinyML EMEA Innovation Forum 2023.\n","date":1687780800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1687780800,"objectID":"82a680fd34c6049c88e0afb635f05bd5","permalink":"https://cci-research.nl/post/kanwal-tinyml/","publishdate":"2023-06-26T12:00:00Z","relpermalink":"/post/kanwal-tinyml/","section":"post","summary":"Kanwal Batool attended a tinyML EMEA Innovation Forum 2023.","tags":["Academic"],"title":"Attended tinyML EMEA Innovation Forum 2023","type":"post"},{"authors":["Marco Brohet","Kostas Papagiannopoulos","Francesco Regazzoni"],"categories":["News"],"content":"Tom (left) and Danny at their research poster. Photo courtesy of Danny.\nDanny van den Berg, BSc Natural and Social Sciences student majoring in Artificial Intelligence, wrote his thesis under the supervision of Tom Slooff (USI) and CCI. The resulting paper, \u0026lsquo;Data Under Siege: The Quest for the Optimal Convolutional Autoencoder in Side-Channel Attacks\u0026rsquo;, co-authored with Tom Slooff, Marco Brohet, Kostas Papagiannopoulos, and Francesco Regazzoni, was accepted to be presented at IJCNN 2023. Congratulations, Danny!\nThe International Joint Conference on Neural Networks (IJCNN) is the premier international conference in the area of neural networks theory, analysis and applications. IJCNN 2023 was hosted at the Gold Coast Convention and Exhibition Centre in Queensland, Australia.\nAbstract Encryption is a method to keep our data safe from third parties. However, side-channel information may be leaked during encryption due to physical properties. This information can be used in side-channel attacks to recover critical values such as the secret encryption key. To this end, it is necessary to understand the robustness of implementations to assess the security of data handled by a device. Side-channel attacks are one such method which allow researchers to evaluate the robustness of implementations using appropriate metrics.\nIn the security community, machine learning is playing a prominent role in the study of side-channel attacks. A notable example of this is the use of Convolutional Autoencoders (CAE) as a preprocessing step on the measurements. In this work we study in depth the problem of finding the most suitable architecture of such Convolutional Autoencoders. To this end, Optuna is used to explore the CAE hyperparameter space. This process allows us to identify hyperparameters that outperform state-of-the-art autoencoders, reducing the needed traces for a succesful attack by approximately 37% in the presence of Gaussian noise and reducing the trainable parameters needed to attack desynchronization by a factor of 29. In addition to the promising results, experiments carried out in this paper allow a better understanding of the hyperparameter space in the field of side channel attacks, providing a solid base for future use of CAE in this specific domain.\n","date":1687305600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1687305600,"objectID":"497ab069f8e82c3712b45d8fc3ca808f","permalink":"https://cci-research.nl/post/ijcnn-2023/","publishdate":"2023-06-21T00:00:00Z","relpermalink":"/post/ijcnn-2023/","section":"post","summary":"Danny van den Berg, BSc Natural and Social Sciences student majoring in Artifical Intelligence, presented the work he carried out for this thesis under the supervision of Tom Slooff (USI) and CCI at IJCNN 2023. Congratulations, Danny!","tags":["Academic"],"title":"Paper Presented at IJCNN 2023","type":"post"},{"authors":["Marco Brohet","Francesco Regazzoni"],"categories":["News"],"content":"The paper \u0026lsquo;A Survey on Thwarting Memory Corruption in RISC-V\u0026rsquo;, authored by Marco Brohet and Francesco Regazzoni, has been published at ACM Computing Surveys.\nThe paper is published as open-access and can be found in ACM\u0026rsquo;s Digital Library.\nAbstract With embedded devices becoming more pervasive and entrenched in society, it is paramount to keep these systems secure. A threat plaguing these systems consists of software vulnerabilities that cause memory corruption, potentially allowing an attacker to breach the device. Software-based countermeasures exist, but suffer from high overhead. In this survey, we investigate whether this could be mitigated using dedicated hardware. Driven by the advancements of open hardware, we focus on implementations for RISC-V, a novel and open architecture tailored for customization. We distinguish between methods validating memory accesses beforehand, obfuscating information necessary for an attack, and detecting memory values corrupted earlier. We compare on qualitative metrics, such as the security coverage and level of transparency, and performance in both software and hardware. Although current implementations do not easily allow for a fair comparison as their evaluation methodologies vary widely, we show that current implementations are suitable to minimize the runtime overhead with a relatively small area overhead. Nevertheless, we identified that further research is still required to mitigate more fine-grained attacks such as intra-object overflows, to integrate into more sophisticated protected execution environments towards, resilient systems that are automatically recoverable, and to move towards more harmonized evaluation.\n","date":168696e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":168696e4,"objectID":"ce024255cce149a9c984df39a7434af7","permalink":"https://cci-research.nl/post/paper-published-csur/","publishdate":"2023-06-17T00:00:00Z","relpermalink":"/post/paper-published-csur/","section":"post","summary":"The paper 'A Survey on Thwarting Memory Corruption in RISC-V', authored by Marco Brohet and Francesco Regazzoni, has been published at ACM Computing Surveys.","tags":["Academic"],"title":"Paper Published at ACM Computing Surveys","type":"post"},{"authors":["L. Thomas van Binsbergen"],"categories":["News"],"content":"The workshop Programming Languages in the Netherlands, supported by VERSEN, was a big success. A 12-presentation programme enticed plenty of discussion amoung the 50-60 participants. The CCI group contributed by organising the event (Thomas and Grace) and by giving two talks (Christopher on Seaso and Damian on language services).\nMany thanks to Grace for the help in organising the event, resulting in a very smooth workshop experience. The attached pictures give an impression of the event hosted in the Doelenzaal of the university library.\nPLNL is still looking for organisers for next year.\n","date":1686873600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1686873600,"objectID":"26acf3f858dd33a99a4328e9e9b5ee2b","permalink":"https://cci-research.nl/post/plnl-2023/","publishdate":"2023-06-16T00:00:00Z","relpermalink":"/post/plnl-2023/","section":"post","summary":"The workshop Programming Languages in the Netherlands, supported by VERSEN, was a big success. A 12-presentation programme enticed plenty of discussion amoung the 50-60 participants. The CCI group contributed by organising the event (Thomas and Grace) and by giving two talks (Christopher on Seaso and Damian on language services).","tags":["Conference","Academic","Programming Languages"],"title":"Just happened: Programming Languages in the Netherlands (PLNL) 2023","type":"post"},{"authors":["L. Thomas van Binsbergen","Ana Oprescu","Tom van Engers"],"categories":["News"],"content":"Please find this announcement on the internal (UvA) funding awarded for interdisciplinary research within certain themes.\nThomas, Ana, and Tom with \u0026ldquo;Data sharing through a data intermediary\u0026rdquo;\nAna with the project \u0026ldquo;Sustainable privacy-enhanced data\u0026rdquo;\n","date":1685491200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1685491200,"objectID":"efcde97866815dcbe30f763453d0ffdb","permalink":"https://cci-research.nl/post/rdt-projects-2023/","publishdate":"2023-05-31T00:00:00Z","relpermalink":"/post/rdt-projects-2023/","section":"post","summary":"Several CCI members have projects being funded for interdisciplinary research on the theme of Responsible Digital Transformation. Interesting aspect about these projects is that they involve (Co-)PIs from at least two faculties. Both projects involve Information Law.","tags":["Academic"],"title":"Inter-faculty UvA funding success for CCI projects","type":"post"},{"authors":["L. Thomas van Binsbergen","Ana Oprescu","Tom van Engers"],"categories":["News"],"content":"The University of Amsterdam (UvA) is looking for a Postdoctoral Researcher in the area of programming languages, formal methods, and distributed systems. The goal of the research is to enable the integration and automatic enforcement of high-level contract specification within distributed systems for data exchange and federated data processing. Possible outcomes are: (domain-specific) software languages, system architecture designs, and prototypes for verifying contract specifications, language implementations, and auditing/monitoring components. The offered contract is for a minimum of 12 months. The closing date is the 25th of June. The ideal starting date the 1st of August.\nThe full vacancy text and application procedure can be found here: https://vacatures.uva.nl/UvA/job/Postdoc-Position-on-Digitally-Enforceable-Data-Sharing-Contracts/771937302/\n","date":1685491200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1685491200,"objectID":"358b5120d53ed113fc82f18ad8ba043b","permalink":"https://cci-research.nl/post/sspddp-postdoc-spring2023/","publishdate":"2023-05-31T00:00:00Z","relpermalink":"/post/sspddp-postdoc-spring2023/","section":"post","summary":"The University of Amsterdam (UvA) is looking for a Postdoctoral Researcher in the area of programming languages, formal methods, and distributed systems. The goal of the research is to enable the integration and automatic enforcement of high-level contract specification within distributed systems for data exchange and federated data processing. Possible outcomes are: (domain-specific) software languages, system architecture designs, and prototypes for verifying contract specifications, language implementations, and auditing/monitoring components. The offered contract is for a minimum of 12 months. The closing date is the 25th of June. The ideal starting date the 1st of August.","tags":["Vacancy","Academic"],"title":"Postdoc Position on Digitally Enforceable Data Sharing contracts","type":"post"},{"authors":["Francesco Regazzoni","Kostas Papagiannopoulos","Marco Brohet"],"categories":["News"],"content":"CARDIS has been the venue for security experts from industry and academia to exchange on security of smart cards and related applications since 1994. Smart cards play an increasingly important role in our day-to-day life through their use in banking cards, SIM cards, electronic passports, and IoT devices. It is thus naturally of utmost importance to understand their security features and to develop sound protocols and countermeasures while keeping reasonable performance. In this respect, CARDIS aims to gather security experts from industry, academia, and standardization bodies to make steps forward in the field of embedded security.\nThe 22nd edition of CARDIS will be organized by Francesco Regazzoni, Kostas Papagiannopoulos and Marco Brohet from the Complex Cyber Infrastructure group of the University of Amsterdam in Amsterdam, NL. CARDIS 2023 will be an in-person event, with the possibility to attend talks remotely (presenters are required to participate to the conference in presence).\nFind out more on the official website here.\n","date":1685059200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1685059200,"objectID":"152339ecccf4cbb21f40aec62da00532","permalink":"https://cci-research.nl/post/cardis-2023-cfp/","publishdate":"2023-05-26T00:00:00Z","relpermalink":"/post/cardis-2023-cfp/","section":"post","summary":"The 22nd Smart Card Research and Advanced Application Conference (CARDIS 2023) will be hosted by CCI in Amsterdam, The Netherlands, on November 15-16, 2023, and is seeking original papers on the design, development, deployment, evaluation, penetration testing and application of smart cards and secure embedded systems.","tags":["Academic"],"title":"Call for Papers: CARDIS 2023","type":"post"},{"authors":["Marco Brohet","Christopher Esterhuyse","Damian Frolich","Tim Müller"],"categories":["News"],"content":"Participating at the Faculty of Science\u0026rsquo;s annual volleybal tournament, Team Snelle Jelle and the Daltons featuring among others CCI members Tim, Damian, Christopher and Marco, won the Most Cheerful Outfit prize.\nOut of the 16 teams participating, the The Daltons look-alikes with fellow members of the MNS and PCS research groups from our SNE cluster, managed to conquer the 11th place. A very nice result for the first particpation, which we could not have achieved without our dedicated SNE supporters that kept cheering for us until the very end. A special thanks to you!\nRead more about it in the Faculty\u0026rsquo;s staff website here.\n","date":1684353600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1684353600,"objectID":"dfa98b5d9f7d0e52e0748cc6c239762b","permalink":"https://cci-research.nl/post/fnwi-volleybal-2023/","publishdate":"2023-05-17T20:00:00Z","relpermalink":"/post/fnwi-volleybal-2023/","section":"post","summary":"Participating at the Faculty of Science\u0026rsquo;s annual volleybal tournament, Team Snelle Jelle and the Daltons featuring among others CCI members Tim, Damian, Christopher and Marco, won the Most Cheerful Outfit prize.\n","tags":["Social"],"title":"SNE Volleybal Team Outshines Competition","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"Dr. Zoltan Mann gave an invited talk at this year\u0026rsquo;s Privacy Symposium, in the session From Cloud to Edge Security. Entitled Edge intelligence: friend or foe? (for security and privacy), Zoltan\u0026rsquo;s presentation discussed the security and privacy implications of artificial intelligence in edge computing. It drew attention to the recent BDVA position paper Current Hot Topics in Data Protection as well CCI\u0026rsquo;s recently started EU research project SECURED.\n","date":1681862400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1681862400,"objectID":"2fba9db2979b4e8b9c41ec09aa79c6f8","permalink":"https://cci-research.nl/post/privacy-symposium-2023/","publishdate":"2023-04-19T00:00:00Z","relpermalink":"/post/privacy-symposium-2023/","section":"post","summary":"Dr. Zoltan Mann gave an invited talk at this year\u0026rsquo;s Privacy Symposium, in the session From Cloud to Edge Security. Entitled Edge intelligence: friend or foe? (for security and privacy), Zoltan\u0026rsquo;s presentation discussed the security and privacy implications of artificial intelligence in edge computing.","tags":["Academic"],"title":"Invited talk at the 2023 Privacy Symposium","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"Wiley awarded a \u0026ldquo;Top Downloaded Article\u0026rdquo; certificate to Dr. Zoltan Mann for his paper Comparison of workload consolidation algorithms for cloud data centers, published in the journal Concurrency and Computation: Practice and Experience. This certifies that the paper was one of the most downloaded during its first 12 months after publication, among work published in 2021. The paper was joint work with Rene Ponto (University of Duisburg-Essen, Germany) and Gabor Kecskemeti (Liverpool John Moores University, UK).\n","date":1680220800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1680220800,"objectID":"91bd1273954148fb06f76d0649f1c290","permalink":"https://cci-research.nl/post/wiley-top-downloaded-article-2023/","publishdate":"2023-03-31T00:00:00Z","relpermalink":"/post/wiley-top-downloaded-article-2023/","section":"post","summary":"Wiley awarded a \u0026ldquo;Top Downloaded Article\u0026rdquo; certificate to Dr. Zoltan Mann for his paper Comparison of workload consolidation algorithms for cloud data centers, published in the journal Concurrency and Computation: Practice and Experience.","tags":["Academic"],"title":"Top Downloaded Article in Concurrency and Computation: Practice and Experience","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"IFIP Working Group 11.4 \u0026ldquo;Network \u0026amp; Distributed Systems Security\u0026rdquo; elected Dr. Zoltan Mann as the new chair of the working group in its meeting on 16 March 2023. Zoltan takes over the chair role from Professor Dogan Kesdogan, who will continue as secretary of the working group. The new chair and secretary work as acting officers until they are approved by the IFIP Technical Committee 11 in June 2023.\nIFIP, the International Federation for Information Processing, is the leading multinational, apolitical organization in Information \u0026amp; Communications Technologies and Sciences. It connects researchers worldwide in over 100 Working Groups and 13 Technical Committees. IFIP Technical Committee 11 is concerned with security and privacy protection in information processing systems, and consists of 14 working groups, addressing different aspects of security and privacy. Working Group 11.4 focuses on security in networks and distributed systems.\n","date":1679270400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1679270400,"objectID":"a129376c7dcecd69a86b4ba727f3c678","permalink":"https://cci-research.nl/post/ifip-11-4-chair/","publishdate":"2023-03-20T00:00:00Z","relpermalink":"/post/ifip-11-4-chair/","section":"post","summary":"IFIP Working Group 11.4 \u0026ldquo;Network \u0026amp; Distributed Systems Security\u0026rdquo; elected Dr. Zoltan Mann as the new chair of the working group in its meeting on 16 March 2023. Zoltan takes over the chair role from Professor Dogan Kesdogan, who will continue as secretary of the working group.","tags":["Academic"],"title":"IFIP WG11.4 elects Zoltan Mann as new chair","type":"post"},{"authors":["christopher","Tim Müller","L. Thomas van Binsbergen"],"categories":["News"],"content":"The paper titled Exploring the Enforcement of Private, Dynamic Policies on Medical Workflow Execution by Christopher A. Esterhuyse, Tim Muller, Thomas van Binsbergen, and Adam S. Z. Belloum was accepted at 18th IEEE eScience Conference 2022: Democratizing Science. Abstract: We report on the ideas and experiences of adapting Brane, a workflow execution framework, for use cases involving medical data exchange and processing. These use cases impose new requirements on the system to enforce policies encoding safety properties, ranging from access control to legal regulations pertaining to data privacy. Our approach emphasizes users' control over the extent to which they cooperate in distributed execution, at the cost of revealing information about their policies.\n","date":1674172800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1674172800,"objectID":"8e322b8103ebdf421a79f5e7434f69f8","permalink":"https://cci-research.nl/post/paper-accepted-escience/","publishdate":"2023-01-20T00:00:00Z","relpermalink":"/post/paper-accepted-escience/","section":"post","summary":"The paper titled Exploring the Enforcement of Private, Dynamic Policies on Medical Workflow Execution by Christopher A. Esterhuyse, Tim Muller, Thomas van Binsbergen, and Adam S. Z. Belloum was accepted at 18th IEEE eScience Conference 2022: Democratizing Science.","tags":["Academic"],"title":"Paper Accepted @IEEE eScience 2022","type":"post"},{"authors":["Daphnee Chabal","Zoltan Mann"],"categories":["News"],"content":"The paper titled On Achieving Privacy-Preserving State-of-the-Art Edge Intelligence by Daphnee Chabal, Dolly Sapra, and Zoltan Mann was accepted at 4th AAAI Workshop on Privacy-Preserving Artificial Intelligence. Abstract: Deep Neural Networks (DNNs) Inference in Edge Computing, often coined Edge Intelligence, requires solutions to insure that sensitive data confidentiality and intellectual property are not revealed in the process. Privacy-preserving Edge Intelligence is only emerging, despite the growing prevalence of Edge Computing as a context of Machine-Learning-as-a-Service. Solutions have yet to be applied to state-of-the-art DNNs. This position paper provides an original assessment of the compatibility of existing techniques for privacy-preserving DNN Inference with the characteristics of an Edge Computing setup. The resulting favorite candidate is secret sharing. We then address the future role of model compression methods in the research towards secret sharing on DNNs with state-of-the-art performance.\n","date":1674172800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1674172800,"objectID":"c32d2396101140e33180040d2b82edcb","permalink":"https://cci-research.nl/post/paper-accepted-ppai/","publishdate":"2023-01-20T00:00:00Z","relpermalink":"/post/paper-accepted-ppai/","section":"post","summary":"The paper titled On Achieving Privacy-Preserving State-of-the-Art Edge Intelligence by Daphnee Chabal, Dolly Sapra, and Zoltan Mann was accepted at 4th AAAI Workshop on Privacy-Preserving Artificial Intelligence. Abstract: Deep Neural Networks (DNNs) Inference in Edge Computing, often coined Edge Intelligence, requires solutions to insure that sensitive data confidentiality and intellectual property are not revealed in the process.","tags":["Academic"],"title":"Paper Accepted @PPAI23","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"Join our team! We have an open position in the broad area of security and privacy. The position can be filled on the level of either Assistant Professor or Associate Professor. See the details and apply here by 15 February 2023: https://vacatures.uva.nl/UvA/job/Assistant-or-Associate-Professor-in-Security-and-Privacy/761330802/\n","date":1673395200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1673395200,"objectID":"dd295d5fb33669c164310788d087210e","permalink":"https://cci-research.nl/post/vacancy-2023-01/","publishdate":"2023-01-11T00:00:00Z","relpermalink":"/post/vacancy-2023-01/","section":"post","summary":"Join our team! We have an open position in the broad area of security and privacy. The position can be filled on the level of either Assistant Professor or Associate Professor.","tags":["Academic"],"title":"Assistant or Associate Professor in Security and Privacy","type":"post"},{"authors":["Reginald Cushing","Xin Zhou","Adam Belloum","Paola Grosso","Tom van Engers","Cees de Laat"],"categories":[],"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"cc8b1229c3a1dc1d98b2fa75682be4aa","permalink":"https://cci-research.nl/publication/zhou-2023/","publishdate":"2023-01-01T00:00:00Z","relpermalink":"/publication/zhou-2023/","section":"publication","summary":"","tags":[],"title":"Enabling Collaborative Multi-Domain Applications: A Blockchain-Based Solution with Petri Net Workflow Modeling and Incentivization","type":"publication"},{"authors":null,"categories":null,"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1672531200,"objectID":"63e7ffccd6e146f60f325f7c418929d5","permalink":"https://cci-research.nl/project/secured/","publishdate":"2023-01-01T00:00:00Z","relpermalink":"/project/secured/","section":"project","summary":"Scaling up secure processing, anonymization and generation of health data for EU cross border collaborative research and innovation.","tags":["Data","Security"],"title":"SECURED","type":"project"},{"authors":["Milen Girma Kebede","L. Thomas van Binsbergen","Tom van Engers","Dannis G. van Vuurden"],"categories":[],"content":"","date":1672531200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1685521658,"objectID":"410fb207612b3c8d6ed53491f044947f","permalink":"https://cci-research.nl/publication/kebede-2023/","publishdate":"2023-01-01T00:00:00Z","relpermalink":"/publication/kebede-2023/","section":"publication","summary":"","tags":[],"title":"Towards a Purpose-Based Access Control Model Derived from the Purpose Limitation Principle","type":"publication"},{"authors":["Zoltan Mann","Francesco Regazzoni"],"categories":["News"],"content":"How can the privacy of health-related personal data be preserved, while using data analysis and machine learning for innovative medical approaches? What privacy-preserving techniques should be used and how, to achieve given privacy and utility objectives? How to implement privacy-preserving techniques to achieve efficiency and scalability? Work on the answer to these questions as PhD candidate in our research group! See the details and apply here as soon as possible: https://vacatures.uva.nl/UvA/job/Two-PhD-Positions-on-Efficient-Privacy-preserving-Techniques-for-Data-Analysis-and-Machine/760571802/\n","date":1671148800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1671148800,"objectID":"d46b612a342ca7c5251c1276a2ebef78","permalink":"https://cci-research.nl/post/vacancy-2022-12/","publishdate":"2022-12-16T00:00:00Z","relpermalink":"/post/vacancy-2022-12/","section":"post","summary":"How can the privacy of health-related personal data be preserved, while using data analysis and machine learning for innovative medical approaches? What privacy-preserving techniques should be used and how, to achieve given privacy and utility objectives?","tags":["Academic"],"title":"Two PhD positions on efficient privacy-preserving techniques for data analysis and machine learning","type":"post"},{"authors":["Cees de Laat","Leon Gommans"],"categories":["News"],"content":"A symposium entitled ‘From Systems and Networks to Complex Cyber Infrastructures’ took place on 9th December 2022 in honor of Cees de Laat and Leon Gommans. On the one hand, Cees de Laat, the former Chair of CCI, retired recently. This symposium looked at where the systems, networking and complex cyber infrastructures field stands today, a field to which Cees has contributed greatly. On the other hand, the symposium celebrated Leon Gommans for becoming Professor by Special Appointment in the area of Complex Cyber Infrastructure for Data Exchange Systems within CCI.\nAn afternoon with a lot of insights, personal memories, and fun The Turing Zaal in Amsterdam Science Park was packed with people, some of whom came from other continents to salute Cees and Leon on this special occasion. The audience enjoyed talks by a lineup of distinguished speakers. The symposium was opened by Paola Grosso from the Multiscale Networked Systems group. In the first talk, Leon Gommans explained how multi-domain authorization research evolved into data exchange systems research. Leon was followed by John Shalf, Department Head for Computer Science at Lawrence Berkeley National Laboratory, who talked about the future of computing beyond exascale. The first session ended with a very personal talk by Henri Bal from Vrije Universiteit Amsterdam, entitled \u0026ldquo;Networking with Cees\u0026rdquo;. After the break, Dutch Internet pioneer Kees Neggers took the floor with a historical overview from ARPANET to complex cyber infrastructures. In the sequel, the second speaker from the USA, Frank Würthwein, Director of the San Diego Supercomputer Center, focused on the future of open research platforms. The last talk was given by Cees de Laat, who shared several insights as well as numerous funny and memorable moments from his career.\nThe symposium, which was organized by the Multiscale Networked Systems group, the Parallel Computing Systems group, and CCI, ended with a reception, giving the attendants the opportunity to meet old and new friends. For sure, this afternoon will be a pleasant and inspiring memory for the people who had the honor to be present.\n","date":1670803200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1670803200,"objectID":"f87c23676a63bb31f1b52d134bebb360","permalink":"https://cci-research.nl/post/symposium-cees-leon-2022/","publishdate":"2022-12-12T00:00:00Z","relpermalink":"/post/symposium-cees-leon-2022/","section":"post","summary":"A symposium entitled ‘From Systems and Networks to Complex Cyber Infrastructures’ took place on 9th December 2022 in honor of Cees de Laat and Leon Gommans. On the one hand, Cees de Laat, the former Chair of CCI, retired recently.","tags":["Academic"],"title":"Symposium in honor of Cees de Laat and Leon Gommans","type":"post"},{"authors":["Lu-Chi Liu","Mostafa Mohajeri Parizi","L. Thomas van Binsbergen","Tom van Engers"],"categories":["News"],"content":"The paper titled Regulatory Services to Automate Compliance with Ex-post Enforcement by Lu-Chi Liu, Mostafa Mohajeri Parizi, Thomas van Binsbergen, and Tom van Engers was accepted at AICOL 2022: AI Approaches to the Complexity of Legal Systems. Abstract: Software systems are expected to comply with norms from a variety of sources. However, the increasing volume and the dynamism of norms make it rather difficult to have a fully compliant software system by design. This paper proposes a generic architecture of regulated software systems that facilitates compliance with high-level policies through regulatory services. Our architectural model has the flexibility to adapt to norm modifications and to norm violations by including ex-post enforcement mechanisms. The proposed solution is assessed using a case study and a prototype implementation in the eFLINT and ASC2 languages for modeling norms and software/social agents respectively.\n","date":166968e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":166968e4,"objectID":"eb03cf6f70ef8b83831d574442887ef8","permalink":"https://cci-research.nl/post/paper-accepted-aicol/","publishdate":"2022-11-29T00:00:00Z","relpermalink":"/post/paper-accepted-aicol/","section":"post","summary":"The paper titled Regulatory Services to Automate Compliance with Ex-post Enforcement by Lu-Chi Liu, Mostafa Mohajeri Parizi, Thomas van Binsbergen, and Tom van Engers was accepted at AICOL 2022: AI Approaches to the Complexity of Legal Systems.","tags":["Academic"],"title":"Paper Accepted @AICOL-JURIX 2022","type":"post"},{"authors":["Mostafa Mohajeri Parizi","Tom van Engers"],"categories":["News"],"content":"The paper titled Can a military autonomous device follow International Humanitarian Law? by Tomasz Zurek, Jonathan Kwik, Mostafa Mohajeriparizi and Tom Van Engers was accepted at 35th International Conference on Legal Knowledge and Information Systems. Abstract: The paper presents a formal model and an experimental verification of the system controlling the International Humanitarian Law compliance for the autonomous military device.\n","date":166968e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":166968e4,"objectID":"eccf4dedf13e4ae46b355d0e0fa4ba46","permalink":"https://cci-research.nl/post/paper-accepted-jurix/","publishdate":"2022-11-29T00:00:00Z","relpermalink":"/post/paper-accepted-jurix/","section":"post","summary":"The paper titled Can a military autonomous device follow International Humanitarian Law? by Tomasz Zurek, Jonathan Kwik, Mostafa Mohajeriparizi and Tom Van Engers was accepted at 35th International Conference on Legal Knowledge and Information Systems.","tags":["Academic"],"title":"Paper Accepted @JURIX2022","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"The Big Data Value Association (BDVA) has just published a new position paper on the latest trends in data protection. Entitled \u0026ldquo;Current Hot Topics in Data Protection\u0026rdquo; and edited by Zoltan Mann, the position paper summarizes the latest challenges as well as promising technologies in data protection. It also presents recommendations for authorities, industry, researchers, and other stakeholders. You can find more information and download the paper here.\n","date":1669593600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1669593600,"objectID":"02b021aaaa4e44f6d97b5a2345de7795","permalink":"https://cci-research.nl/post/bdva-pospaper-2022/","publishdate":"2022-11-28T00:00:00Z","relpermalink":"/post/bdva-pospaper-2022/","section":"post","summary":"The Big Data Value Association (BDVA) has just published a new position paper on the latest trends in data protection. Entitled \u0026ldquo;Current Hot Topics in Data Protection\u0026rdquo; and edited by Zoltan Mann, the position paper summarizes the latest challenges as well as promising technologies in data protection.","tags":["Academic"],"title":"BDVA position paper on data protection","type":"post"},{"authors":["L. Thomas van Binsbergen","Damian Frolich"],"categories":["News"],"content":"The CCI group is well presented at the 15th edition of the Software Language Engineering (SLE) with another paper being accepted, titled: A Language-Parametric Approach to Exploratory Programming Environments by Thomas van Binsbergen, Damian Frolich, Mauricio Verano Merino, Joey Lai, Pierre Jeanjean, Tijs van der Storm, Benoit Combemale, and Olivier Barais. This paper is a collaboration with the DiverSE team from Inria and the CWI SWAT group, and a significant contribution from a master\u0026rsquo;s thesis done at the CCI group.\nAbstract Exploratory programming is a software development style in which code is a medium for prototyping ideas and solutions, and in which even the end-goal can evolve over time. Exploratory programming is valuable in various contexts such as programming education, data science, and end-user programming. However, there is a lack of appropriate tooling and language design principles to support exploratory programming. This paper presents a host language- and object language-independent protocol for exploratory programming akin to the Language Server Protocol. The protocol serves as a basis to develop novel (or extend existing) programming environments for exploratory programming such as computational notebooks and command-line REPLs. An architecture is presented on top of which prototype environments can be developed with relative ease, because existing (language) components can be reused. Our prototypes demonstrate that the proposed protocol is sufficiently expressive to support exploratory programming scenarios as encountered in literature within the software engineering, human-computer interaction and data science domains.\n","date":1668729600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1668729600,"objectID":"d6210a2a25cc69a131a87d78bdd2eb6a","permalink":"https://cci-research.nl/post/second-paper-accepted-at-sle22/","publishdate":"2022-11-18T00:00:00Z","relpermalink":"/post/second-paper-accepted-at-sle22/","section":"post","summary":"The CCI group is well presented at the 15th edition of the Software Language Engineering (SLE) with another paper being accepted, titled: A Language-Parametric Approach to Exploratory Programming Environments by Thomas van Binsbergen, Damian Frolich, Mauricio Verano Merino, Joey Lai, Pierre Jeanjean, Tijs van der Storm, Benoit Combemale, and Olivier Barais.","tags":["Academic","Programming languages","Exploratory programming"],"title":"Another Paper Accepted @SLE22","type":"post"},{"authors":["Damian Frolich","L. Thomas van Binsbergen"],"categories":["News"],"content":"The paper titled iCoLa: A Compositional Meta-language with Support for Incremental Language Development by Damian Frolich and Thomas van Binsbergen is accepted at the 15th edition of the Software Language Engineering (SLE) conference.\nAbstract Programming languages providing high-level abstractions can increase programming productivity and safety. Language-oriented programming is a paradigm in which specialized languages are developed to solve problems within specific domains with (high-level) abstractions relevant to those domains. However, language development involves complex design and engineering processes. These processes can be simplified by reusing (parts of) existing languages and by offering language-parametric tooling. In this paper we present iCoLa, a meta-language supporting incremental (meta-)programming based on reusable components. In our implementation of iCoLa, languages are first-class citizens, providing the full power of the host-language (Haskell) to compose and manipulate languages. Finally, we demonstrate iCoLa through a case-study in which we construct Imp, SIMPLE, and MiniJava through the composition and restriction of language fragments and demonstrate the variability of our approach through the construction of several languages using a fixed-set of operators.\n","date":1663632e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1663632e3,"objectID":"5cc1498a42e4c1cea3cd3832dbfb0a09","permalink":"https://cci-research.nl/post/paper-accepted-at-sle22/","publishdate":"2022-09-20T00:00:00Z","relpermalink":"/post/paper-accepted-at-sle22/","section":"post","summary":"The paper titled iCoLa: A Compositional Meta-language with Support for Incremental Language Development by Damian Frolich and Thomas van Binsbergen is accepted at the 15th edition of the Software Language Engineering (SLE) conference.","tags":["Academic","Programming languages"],"title":"Paper Accepted @SLE22","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"Is it possible to reduce the energy consumption of machine learning, while increasing its security and privacy? Work on the answer as PhD candidate in our research group! See the details and apply here by 20 September 2022: https://vacatures.uva.nl/UvA/job/PhD-Position-in-Energy-and-Security-of-Machine-Learning-Applications-in-the-Cloud-to-Edge-Continuum/745019702/\n","date":1662595200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1662595200,"objectID":"d1d84711d5e4795f0321326931a63b87","permalink":"https://cci-research.nl/post/vacancy-2022-09/","publishdate":"2022-09-08T00:00:00Z","relpermalink":"/post/vacancy-2022-09/","section":"post","summary":"Is it possible to reduce the energy consumption of machine learning, while increasing its security and privacy? Work on the answer as PhD candidate in our research group! See the details and apply here by 20 September 2022: https://vacatures.","tags":["Academic"],"title":"Open PhD position","type":"post"},{"authors":["Damian Frolich"],"categories":["News"],"content":"To end the academic year in style, the Complex Cyber Infrastructure group went on a sailing trip on the Markermeer. Before the sailing trip could take off, the group needed to gather in the harbour of Monnickendam \u0026mdash; a beautiful old city with plenty of sightseeing and picture opportunities. Waiting in the harbour for all members to arrive After everyone arrived in the harbour, the captain gave a bit of history on the boat. The boat was several centuries old, had different owners over time and experienced a couple of world events. One such event is the second world-war. Since the boat can reach shallow water, it was of upmost interest to the Germans, because it could be used to supply soldiers on beaches. To prevent usage by the Germans, the boat was hidden in the Biesbosch during the war.\nWith some new knowledge on our hands, the sailing trip started. Before sailing with the sails, the boat went out of the harbour using an engine. This gave todays pirates time to fill their bellies before their labour was needed.\nArrived on open water, we could set sail. However, first the sails needed to be hoist. Several strong members of the group volunteered for this activity.\nWith the sails hoisted and a good wind, it was time to relax, socialise and enjoy a couple of drinks. After a beautiful couple of hours on the water while catching some good winds, it was time to return to the harbour for a nice barbeque and to welcome Ana and her entourage on to the boat. But first, there were two brave souls, Thomas and Daphne, taking the opportunity to swim.\nAll in all, it was a great day and being on a sailing boat was a new experience for some. Interesting conversations and discussions were held and new friendships were made. Are you interested in joining our social event next year? Keep an eye on our news sections for open positions.\nAcknowledgements Thanks to Yuri and Arno for taking pictures.\n","date":1661990400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1661990400,"objectID":"0e072fc4bf5e011329dd83fca7ca4447","permalink":"https://cci-research.nl/post/social-event-2022/","publishdate":"2022-09-01T00:00:00Z","relpermalink":"/post/social-event-2022/","section":"post","summary":"To end the academic year in style, the Complex Cyber Infrastructure group went on a sailing trip on the Markermeer. Before the sailing trip could take off, the group needed to gather in the harbour of Monnickendam \u0026mdash; a beautiful old city with plenty of sightseeing and picture opportunities.","tags":["Social"],"title":"Pirates of the Markermeer: the CCI social event","type":"post"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","L. Thomas van Binsbergen","Tom van Engers"],"categories":["News"],"content":"The paper titled Introducing Normative Advisors into MAS by Mostafa Mohajeri Parizi, Thomas van Binsbergen, Giovanni Sileno and Tom van Engers was accepted at The 19th European Conference on Multi-Agent Systems. Abstract: This paper introduces a modular architecture for integrating norms in autonomous agents and multi-agent systems. As the the interactions between norms and agents can be complex, this architecture utilizes multiple programmable components to model concepts such as adoption of multiple personal and/or collective possibly conflicting norms, interpretation and qualification between social and normative contexts, possibility of intentionally (non-)compliant behaviors and resolving conflicts between norms and desires (or other norms). The architecture revolves around normative advisors that act as the bridge between intentional agents and the institutional reality. As a technical contribution, a running implementation of the architecture is presented based on the ASC2 (AgentScript) BDI framework and eFLINT norm reasoner.\n","date":1658793600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658793600,"objectID":"de3c2530c9a06a09d35a94a478838412","permalink":"https://cci-research.nl/post/paper-accepted-eumas/","publishdate":"2022-07-26T00:00:00Z","relpermalink":"/post/paper-accepted-eumas/","section":"post","summary":"The paper titled Introducing Normative Advisors into MAS by Mostafa Mohajeri Parizi, Thomas van Binsbergen, Giovanni Sileno and Tom van Engers was accepted at The 19th European Conference on Multi-Agent Systems.","tags":["Academic"],"title":"Paper Accepted @EUMAS2022","type":"post"},{"authors":["Ana Oprescu"],"categories":["News"],"content":"Bas van den Brink’s work on applying model-based testing to microservices has been accepted as a proceedings contribution to BENEVOL’22. He is supervised by Ana Oprescu, Tannaz Zameni (University of Twente), Lammert Vinke (Info Support), and Dr. Ulyana Tikhonova (Axini). This project is of particular interest to the VERSEN Master’s Thesis Projects Working Group as an example of multi-university multi-industry collaboration.\nAnjali Ahlawat’s work on a practical maintainability model for data models has also been accepted as a presentation abstract. She is supervised by Ana Oprescu, and two SIG supervisors, Xander Schrijen, and Bugra M. Yildiz.\n","date":1658707200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658707200,"objectID":"68f6a40d6ba97615931d9d70a23451de","permalink":"https://cci-research.nl/post/papers-accepted-at-benevol/","publishdate":"2022-07-25T00:00:00Z","relpermalink":"/post/papers-accepted-at-benevol/","section":"post","summary":"Bas van den Brink’s work on applying model-based testing to microservices has been accepted as a proceedings contribution to BENEVOL’22. He is supervised by Ana Oprescu, Tannaz Zameni (University of Twente), Lammert Vinke (Info Support), and Dr.","tags":["Academic"],"title":"Master Software Engineering student papers accepted at BENEVOL’22","type":"post"},{"authors":["Ana Oprescu"],"categories":["Blog"],"content":"I wrote this short piece about travelling with my baby. My point with this, is to bring attention to a compromise parents might not have to make anymore.\nWork traveling with Maria. In my home country, mothers can spend up to two years of almost fully paid maternal leave. The Netherlands, with their 16 weeks is a far cry. Luckily, my husband, a freelancing mathematician, can travel with me and take care of Maria while I am participating in the various work activities. As such, Maria has already joined the Nijmegen SusTrainable Teacher Training before she had turned 1, and then joined ICT4S and the SusTrainable summer school. It has not been easy, and the EU does not help in any way, but the UvA is a great employer in this sense, and I can focus much better while traveling for work, knowing I will join Maria in the late afternoon, as if a normal day at ‘home’.\n","date":1658448e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658448e3,"objectID":"b70236ef40928fa7faf1b2fbedcd5fdb","permalink":"https://cci-research.nl/post/ana-traveling-as-a-mom/","publishdate":"2022-07-22T00:00:00Z","relpermalink":"/post/ana-traveling-as-a-mom/","section":"post","summary":"I wrote this short piece about travelling with my baby. My point with this, is to bring attention to a compromise parents might not have to make anymore.\nWork traveling with Maria.","tags":["Social"],"title":"Ana Oprescu on Travelling as a Mom","type":"post"},{"authors":["Ana Oprescu"],"categories":["News"],"content":"Please send your Bachelor and/or Master thesis nominations here. There is a special second track supporting diversity. Contact Ana at a.m.oprescu[at]uva.nl for any questions or clarifications.\n","date":1658448e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658448e3,"objectID":"92d19287d5df3a36ea68b28416ac0844","permalink":"https://cci-research.nl/post/anna-join-ds-award/","publishdate":"2022-07-22T00:00:00Z","relpermalink":"/post/anna-join-ds-award/","section":"post","summary":"Please send your Bachelor and/or Master thesis nominations here. There is a special second track supporting diversity. Contact Ana at a.m.oprescu[at]uva.nl for any questions or clarifications.","tags":["Academic"],"title":"Ana Oprescu will join as co-chair the Amsterdam Data Science Thesis Award PC","type":"post"},{"authors":["Ana Oprescu"],"categories":["News"],"content":"Ana Oprescu presented her paper on the Energy Cost and Accuracy of K-anonymity in ICT4S (Mon 13 - Fri 17 June 2022 Plovdiv, Bulgaria).\nAbstract: European Union has aggregated the current societal concerns into two seemingly orthogonal directions: the Green Deal and the GDPR. In this paper, we begin to analyse trade-offs in preserving privacy, learning from the data, and saving energy. Considerable research studied the energy efficiency of software and the accuracy of machine learning models trained on anonymised datasets. However, to the best of our knowledge, no research has been conducted on the impact of anonymisation techniques on energy consumption. We measure the impact of anonymisation on the energy consumption and on the accuracy of machine learning models. We find that the k-value has a statistically significant impact on the energy consumption of the chosen anonymization algorithms. In terms of the accuracy of machine learning models, the generalisation and suppression performs better in almost all cases, provided that proper anonymization hierarchies are used in the anonymization process. However, we find that for the larger and more complex dataset, the reduction in accuracy is limited while there is a significant difference in energy consumption. Thus when considering energy consumption we conclude that for larger datasets it might be worthwhile to consider using microaggregation over generalisation and suppression. During the same event, Lukas Koedijk also presented the paper co-authored with Ana Oprescu based on his master graduation project on the Energy Footprint of Programming Languages. Lukas is an alumnus of the Software Engineering master, now working at KPMG.\nAbstract: The EU Green Deal mirrors the societal concern regarding climate change. In the software industry this means reducing the energy consumption of a program. This can be done by looking both at the hardware and the software used. We take a software approach and focus on the programming language choices and how a computer program is written. The programming languages we investigate are Java, JavaScript, Python, PHP, Ruby, C, C++ and C#. We compare programs from The Computer Language Benchmarks Game and these programs are divided in groups that solve the same problem.\nWe find that the choice of programming language and the way of writing your program influences the energy consumption. The programming languages that consume the least amount of energy over all the problems are C and C++, albeit these programming languages consume more energy when compilation flags are minimized. However, in some cases we could not prove that there was a difference in the energy consumption. We also find that the hardware used to run the programs has an influence on the energy consumption. We find that the runtime of a program correlates with the energy consumption, but a shorter runtime does not necessarily result in a lower energy consumption.\nDuring the colocated SusTrainable workshop, Ana also presented current research efforts on Energy-driven Software Engineering. The workshop was organised by the Erasmus+ project SusTrainable, in which UvA is a partner.\nAbstract: The EU Climate Law targets climate neutrality by 2050. At the same time, the Knowledge Economy is deemed crucial to EU prosperity. Thus, the energy footprint of software services remains an important topic of research and education. In these lecture notes, we set out to educate students on energy-aware software engineering. We show how to establish whether some programming languages are inherently more “green”. We also show how to assess whether established software smells (anti-patterns) are also energy-related smells.\n","date":1658448e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658448e3,"objectID":"fea101c2f8b1d0a5081edbe5f9f68b89","permalink":"https://cci-research.nl/post/ana-presented-2/","publishdate":"2022-07-22T00:00:00Z","relpermalink":"/post/ana-presented-2/","section":"post","summary":"Ana Oprescu presented her paper on the Energy Cost and Accuracy of K-anonymity in ICT4S (Mon 13 - Fri 17 June 2022 Plovdiv, Bulgaria).\nAbstract: European Union has aggregated the current societal concerns into two seemingly orthogonal directions: the Green Deal and the GDPR.","tags":["Academic"],"title":"Paper Presentation by Ana Oprescu @ICT4S","type":"post"},{"authors":["Ana Oprescu"],"categories":["News"],"content":"Nuria Bruch, supervised by Ana Oprescu, Miroslav Zivkovic and Lodewijk Bergmans wins the VERSEN Master Thesis Award for her work on measuring the degree of library dependency!\nThe usage of libraries, both commercial and open-source, encapsulating the implementation of certain functionalities is a widespread practice among developers. However, when a developer uses a library in a software product, this creates a dependency, and if a library has a security issue, it can be propagated to the software product. Developers can use package managers, however, these generally offer a simple binary evaluation of the dependencies: either there is one or not. Hence, a detailed evaluation of the dependencies is missing, which could help developers deal with vulnerabilities, breaking changes, and deprecated dependencies. Nuria proposes a model for software dependencies, which can help provide a fine-grained evaluation of them. The model includes three types of metrics: coupling, coverage, and usage per class. For each metric in the model, Nuria provides a formal definition and a theoretical validation by proving the metrics’ properties. She additionally implemented a proof-of-concept tool that, given a library from the Maven Central Repository, calculates the metrics of the model for each of the dependencies using bytecode analysis. Moreover, the proof-of-concept includes a visualisation of the dependency tree, including the calculated metrics. Finally, she conducted experiments to validate the model, the implementation of the proof-of-concept, and the visualisation. The experiments include interviews with 15 professional developers who evaluated the clarity and actionability of the model’s metrics and the proposed visualisations.\n","date":1658448e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658448e3,"objectID":"62427271fc30c9cfdef8bfceba33a074","permalink":"https://cci-research.nl/post/nuria-versen-award/","publishdate":"2022-07-22T00:00:00Z","relpermalink":"/post/nuria-versen-award/","section":"post","summary":"Nuria Bruch, supervised by Ana Oprescu, Miroslav Zivkovic and Lodewijk Bergmans wins the VERSEN Master Thesis Award for her work on measuring the degree of library dependency!\nThe usage of libraries, both commercial and open-source, encapsulating the implementation of certain functionalities is a widespread practice among developers.","tags":["Academic"],"title":"Software Engineering master student Nuria Bruch wins VERSEN Master Thesis Award!","type":"post"},{"authors":["Ana Oprescu"],"categories":["News"],"content":"During the Rijeka SusTrainable summer school (4-8 July 2022, Rijeka, Croatia) organised by the Erasmus+ project SusTrainable Ana Oprescu gave a lecture on the methodologies employed for Energy-driven Software Engineering research. This was followed by a hands-on session prepared together with Kyrian Maat and based on work by Lukas Koedijk, Stephan Kok and Sander van Oostveen. The school was well attended by UvA master and PhD students, as well as junior lecturers. ","date":1658448e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1658448e3,"objectID":"403f3a84ef58cd3b6aa478e3952eb6d7","permalink":"https://cci-research.nl/post/ana-presented-1/","publishdate":"2022-07-22T00:00:00Z","relpermalink":"/post/ana-presented-1/","section":"post","summary":"During the Rijeka SusTrainable summer school (4-8 July 2022, Rijeka, Croatia) organised by the Erasmus+ project SusTrainable Ana Oprescu gave a lecture on the methodologies employed for Energy-driven Software Engineering research.","tags":["Academic"],"title":"SusTrainable summer school","type":"post"},{"authors":["Cees de Laat"],"categories":["News"],"content":"Last week we had a visit from Inder Monga, director ESnet, Lawrence Berkeley National Laboratory. In this visit we had many discussions on the already 2 decades of working together on different advanced networking topics. In particular we are starting up cooperation on Quantum Networking and we are a partner in the experimental networks testbed FABRIC, where prof. de Laat serves on the Scientific Advisory Board. FABRIC (FABRIC is Adaptive ProgrammaBle Research Infrastructure for Computer Science and Science Applications) is an International infrastructure that enables cutting-edge experimentation and research at-scale in the areas of networking, cybersecurity, distributed computing, storage, virtual reality, 5G, machine learning, and science applications.\nLater this year (components shortage permitting) we will receive a FABRIC node in Amsterdam for our students and researchers to experiment on with our programmable networks and data exchange research.\nOn Friday July 8th Inder presented a colloquium with the title:\nESnet: Advancing networking for Science and the science of Networking\nAbstract: Research and Education networks play a key role in providing the data infrastructure to accelerate scientific discovery. This talk will discuss how the leading Department of Energy user facility in the United States, ESnet, contributes to scientific discovery and the set of network research activities including quantum networking currently in progress.\nBiographical Sketch: Inder Monga provides research and technology direction, actively leads research projects and manages software engineering efforts for ESnet. He focuses on advancing networking services for accelerating collaborative and distributed science, as well as contributes actively to efforts in the industry related to Software-Defined Networking, Science DMZ, performance management as well as the Advanced Network Testbed Initiatives. He is appointed as the chair of ONF\u0026rsquo;s Research Associates, and contributes actively to the Global Network Architecture activity. Monga’s research interests include network virtualization, software- defined networking, grid/cloud computing and sensor networking, and he holds 17 granted patents. His work experience in the private sector has included software development, research and network engineering for Wellfleet Communications and Nortel, where he focused on application and network convergence.\n","date":1657584e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1657584e3,"objectID":"637174ac992b5814fdbb489d7d064d45","permalink":"https://cci-research.nl/post/visit-indermonga/","publishdate":"2022-07-12T00:00:00Z","relpermalink":"/post/visit-indermonga/","section":"post","summary":"Last week we had a visit from Inder Monga, director ESnet, Lawrence Berkeley National Laboratory. In this visit we had many discussions on the already 2 decades of working together on different advanced networking topics.","tags":["Academic"],"title":"Visit of Inder Monga","type":"post"},{"authors":["Xin Zhou","Adam Belloum","Michael H. Lees","Tom van Engers","Cees de Laat"],"categories":null,"content":"","date":1657324800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1657324800,"objectID":"8efb741497c35cc3f6f45b4269a42db7","permalink":"https://cci-research.nl/publication/proceeding_a_xin_2022/","publishdate":"2022-07-09T00:00:00Z","relpermalink":"/publication/proceeding_a_xin_2022/","section":"publication","summary":"Incentives are usually introduced by the regulator entity (third-party), to promote cooperation in a market. The implementation of incentives is always costly and thus might fail to be enforced sustainably. This work aims at exploring the effects of incentives from an institutional perspective, while coping with the scenario where the third-party is part of the system but not composed by players. The evolutionary game theory (EGT) framework is applied to identify the incentives that lead to pure cooperation. In contrast to traditional EGT, this paper introduces an elimination mechanism that can reduce the market size. The incentives identified in the EGT analysis are further examined in simulation experiments which measure the market size, affluence and sustainability. The findings show\u0026#58; (1) light punishment leads to a reduction of the market size, yet heavier punishment is beneficial to the market size and wealth; (2) mixed incentives will generally lead to different wealth of the third party and of the participants. While under moderate strength, the wealth of both parties is the same and their overall wealth is maximal; (3) for sustainability, pure punishment (resp. reward) is sustainable (resp. unsustainable), the sustainability of mixed incentives depends on both their strength and agents’ rationality level.","tags":["Computer modelling and simulation","Applied mathematics","Institutional incentive","Sustainability","Evolutionary game theory"],"title":"Costly incentives design from an institutional perspective: cooperation, sustainability and affluence","type":"publication"},{"authors":["Yuri Demchenko"],"categories":["News"],"content":"Scientific Large Scale Infrastructure for Computing/Communication Experimental Studies -preparation project (SLICES-PP) is a project with 25 partners and a budget of 3 M€ for 4 years. The UvA will receive 303 K€ and it will be led by Yuri Demchenko of the Informatics Institute.\nDemchenko, from the CCI (Complex Cyber Infrastructure) group, will coordinate two topics in SLICES-PP, first Research Data Management in the SLICES infrastructure, and secondly SLICES capacity building and career management.\nAs a part of activities in SLICES-PP, UvA will also facilitate creating a SLICES-NL community and involving Dutch research organizations and universities. The goal is to define the research agenda for SLICES-NL and coordinate efforts to obtain national funding. In this connection, new SLICES-NL coordination meetings will be organised.\nSLICES as a European Research Infrastructure aims to make a fundamental contribution to research and innovation in digital sciences and infrastructures, future Internet technologies, future smart networks and services by providing high quality experimentation services with emerging technologies around the area of digital sciences.\nThe new research infrastructure will allow academics and industry to experiment and test future, possibly disruptive digital technologies, essential for European research. This infrastructure can be beneficial for other scientific and engineering domains, such as smart cities, energy, green technologies and healthcare.\nSLICES-PP will coordinate the preparatory stage to build the future SLICES Research Infrastructure for Digital Technologies experimentation. The project was submitted by consortium of 25 research institutions and centers from 15 countries.\nSLICES-RI (Research Infrastructure) is included in the ESFRI Roadmap 2021 as a new RI for digital technologies experimentation, together with other already existing RI and e-Infrastructures.\nMore Information\n","date":1656460800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1656460800,"objectID":"1e4e67b16148d41aa30ecd7cdcabfa9d","permalink":"https://cci-research.nl/post/slices-pp/","publishdate":"2022-06-29T00:00:00Z","relpermalink":"/post/slices-pp/","section":"post","summary":"Scientific Large Scale Infrastructure for Computing/Communication Experimental Studies -preparation project (SLICES-PP) is a project with 25 partners and a budget of 3 M€ for 4 years. The UvA will receive 303 K€ and it will be led by Yuri Demchenko of the Informatics Institute.","tags":["Academic"],"title":"SLICES-PP Receives Funding from the European Commission","type":"post"},{"authors":["Zoltan Mann"],"categories":["News"],"content":"The paper \u0026ldquo;UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems\u0026rdquo; has been accepted as a full paper at the 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2022). The paper, authored by Zoltan Mann with co-authors from the University of Duisburg-Essen, presents a new UML profile for improved modeling of data protection aspects in edge computing systems. The practical applicability of the new UML profile is demonstrated with the use cases of the EU-funded research project FogProtect.\n","date":1655424e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1655424e3,"objectID":"f665ffac5ced504af79ad46ec695f526","permalink":"https://cci-research.nl/post/paper-accept-seaa2022/","publishdate":"2022-06-17T00:00:00Z","relpermalink":"/post/paper-accept-seaa2022/","section":"post","summary":"The paper \u0026ldquo;UMLsec4Edge: Extending UMLsec to model data-protection-compliant edge computing systems\u0026rdquo; has been accepted as a full paper at the 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA 2022).","tags":["Academic"],"title":"Paper accepted at SEAA 2022","type":"post"},{"authors":["Zoltan Mann","Cees de Laat"],"categories":["News"],"content":"As of 1 June 2022, leadership of the Complex Cyber Infrastructure research group was transferred from Prof. Cees de Laat to Dr. Zoltan Mann.\nProf.dr.ir. Cees de Laat chaired the System and Network Engineering (SNE) research group since 2006. SNE became so large that on his proposal it was split into three successful research groups in 2020: Complex Cyber Infrastructure (CCI), the Multiscale Networked Systems (MNS), and Parallel Computing Systems (PCS) research groups. Prof. de Laat chaired CCI since the split. His retirement is coming up later this year.\nDr. Zoltan Mann is an experienced researcher, who is committed to lead CCI to a further successful future, leveraging his international research and teaching background and industrial leadership experience.\nProf. de Laat and dr. Mann will continue to closely work together to make the transition as smooth as possible.\n","date":1654473600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1654473600,"objectID":"7de50201d9feb4ed672eaa4800a3e3a2","permalink":"https://cci-research.nl/post/change-leader/","publishdate":"2022-06-06T00:00:00Z","relpermalink":"/post/change-leader/","section":"post","summary":"As of 1 June 2022, leadership of the Complex Cyber Infrastructure research group was transferred from Prof. Cees de Laat to Dr. Zoltan Mann.\nProf.dr.ir. Cees de Laat chaired the System and Network Engineering (SNE) research group since 2006.","tags":["Academic"],"title":"Change of Group Leadership","type":"post"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","Tom van Engers"],"categories":null,"content":"","date":1649030400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1649030400,"objectID":"8dad8b9201e53de3c930b70b370bb3da","permalink":"https://cci-research.nl/publication/aamas_2022_mostafa/","publishdate":"2022-04-04T00:00:00Z","relpermalink":"/publication/aamas_2022_mostafa/","section":"publication","summary":"Computational agents based on the BDI framework typically rely on abstract plans and plan refinement to reach a degree of autonomy in dynamic environments, agents are provided with the ability to select how-to achieve their goals by choosing from a set of options. In this work we focus on a related, yet under-studied feature, abstract goals. These constructs refer to the ability of agents to adopt goals that are not fully grounded at the moment of invocation, refining them only when and where needed, the ability to select what-to (concretely) achieve at run-time. We present a preference-based approach to goal refinement, defining preferences based on extended Ceteris Paribus Networks (CP-Nets) for an AgentSpeak(L)-like agent programming language, and mapping the established CP-Nets logic and algorithms to guide the goal refinement step. As a technical contribution, we present an implementation of this method that solely uses a Prolog-like inference engine of the agent's belief-base to reason about preferences, thus minimally affecting the decision-making mechanisms hard-coded in the agent framework.","tags":["Data","AOP","BDI","Preferences"],"title":"Preference-Based Goal Refinement in BDI Agents","type":"publication"},{"authors":["Mostafa Mohajeri Parizi","L. Thomas van Binsbergen","Giovanni Sileno","Tom van Engers"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"9504441e90d041193e0c230f5616890c","permalink":"https://cci-research.nl/publication/mohajeri-parizi-2022/","publishdate":"2022-01-01T00:00:00Z","relpermalink":"/publication/mohajeri-parizi-2022/","section":"publication","summary":"","tags":[],"title":"A Modular Architecture for Integrating Normative Advisors in MAS","type":"publication"},{"authors":["Zoltan Mann","Andreas Metzger","Johannes Prade","Robert Seidl","Klaus Pohl"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653988636,"objectID":"d9830bafb43ba73b06c052485023561e","permalink":"https://cci-research.nl/publication/mann-cost-optimized-2022/","publishdate":"2022-05-31T09:17:16.646034Z","relpermalink":"/publication/mann-cost-optimized-2022/","section":"publication","summary":"An edge data center can host applications that require low-latency access to nearby end devices. If the resource requirements of the applications exceed the capacity of the edge data center, some non-latency-critical application components may be offloaded to the cloud. Such offloading may incur financial costs both for the use of cloud resources and for data transfer between the edge data center and the cloud. Moreover, such offloading may violate data protection requirements if components process sensitive data. The operator of the edge data center has to decide which components to keep in the edge data center and which ones to offload to the cloud. In this paper, we formalize this problem and prove that it is strongly NP-hard. We introduce an optimization algorithm that is fast enough to be run online for dynamic and automatic offloading decisions, guarantees that the solution satisfies hard constraints regarding latency, data protection, and capacity, and achieves near-optimal costs. We also show how the algorithm can be extended to handle multiple edge data centers. Experiments show that the cost of the solution found by our algorithm is on average only 2.7% higher than the optimum.","tags":["Data centers","Cloud computing","Costs","Data protection","Connectors","Optimization","Heuristic algorithms","Edge computing","Fog computing","Edge data center","Offloading","Resource optimization","Data protection"],"title":"Cost-optimized, data-protection-aware offloading between an edge data center and the cloud","type":"publication"},{"authors":["Zoltan Mann"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653988636,"objectID":"0163a4f30a2b56315e8e6b29b64849ba","permalink":"https://cci-research.nl/publication/mann-decentralized-2022/","publishdate":"2022-05-31T09:17:16.441299Z","relpermalink":"/publication/mann-decentralized-2022/","section":"publication","summary":"In recent years, cloud computing concepts have been extended towards the network edge, leading to paradigms like edge computing and fog computing. As a result, applications can be placed on a variety of resources, including fog nodes and cloud data centers. Application placement has significant impact on important metrics like latency. Finding an optimal application placement is computationally challenging, particularly because of the potentially huge number of infrastructure nodes and application components. To overcome the limited scalability of application placement algorithms, optimization can be decentralized, i.e., performed separately for different parts of the infrastructure. The infrastructure can be split into fog colonies, where a fog colony consists of the computational resources in a given geographical region. Application placement can then be performed for the individual fog colonies, thus mitigating the scalability problem. However, independent optimization of application placement in different fog colonies may lead to missed synergies and thus to sub-optimal overall results. Hence, some kind of coordination between fog colonies may be beneficial. In this paper, we analyze the effects of decentralization and coordination on the optimization results. In particular, we compare empirically four different approaches: (i) centralized decision-making, where decisions are made in one go for the entire infrastructure, (ii) independent fog colonies, where optimization is carried out in each fog colony independently from each other, (iii) fog colonies with communication, where excess application components in one fog colony can be sent to a neighboring fog colony, and (iv) fog colonies with overlaps, where shared resources may be dynamically distributed between neighboring fog colonies. Our experiments show that, for large problem instances, decentralization combined with coordination leads to the best results.","tags":["Peer-to-peer computing","Cloud computing","Optimization","Scalability","Edge computing","Task analysis","Bandwidth","Fog computing","Edge computing","Application placement","Distributed algorithms","Fog colonies"],"title":"Decentralized application placement in fog computing","type":"publication"},{"authors":["L. Thomas van Binsbergen","Milen Girma Kebede","Joshua Baugh","Tom van Engers","Dannis G. van Vuurden"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985656,"objectID":"bac1218d5400d692ca7449463761f74a","permalink":"https://cci-research.nl/publication/van-binsbergen-dynamic-2022/","publishdate":"2022-05-31T08:27:36.444893Z","relpermalink":"/publication/van-binsbergen-dynamic-2022/","section":"publication","summary":"","tags":[],"title":"Dynamic generation of access control policies from social policies","type":"publication"},{"authors":["Christopher Esterhuyse","Tim Müller","L. Thomas van Binsbergen","Adam Belloum"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"9649d48a9b905fd357d8ab1de729b2aa","permalink":"https://cci-research.nl/publication/salt-lake-city-2022/","publishdate":"2022-01-01T00:00:00Z","relpermalink":"/publication/salt-lake-city-2022/","section":"publication","summary":"","tags":[],"title":"Exploring the Enforcement of Private, Dynamic Policies on Medical Workflow Execution","type":"publication"},{"authors":["Koen van der Zwet","Ana I Barros","Tom van Engers","Peter M A Sloot"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985659,"objectID":"18695c0b854ac14f881f3d845d820723","permalink":"https://cci-research.nl/publication/van-der-zwet-promises-2022/","publishdate":"2022-05-31T08:27:38.931824Z","relpermalink":"/publication/van-der-zwet-promises-2022/","section":"publication","summary":"Insurgency conflicts pose significant challenges to societies globally. The increase of insurgency conflicts creates a need to understand how insurgencies arise, and to identify societal drivers of insurgencies or effective strategies to counter them. In this paper, we analyze the contributions of computational modeling methods for the analysis of insurgent conflicts. We formalize a specific literature-based analysis framework using the identified key factors and drivers, which enables the evaluation of specific models in this domain. Through a systematic literature search, we identify 64 computational models to apply our framework. We highlight the development and contributions of various methodologies through an in-depth analysis of 13 high-quality models. The evaluation of these computational models revealed promising directions and future topics to design specific simulation models for all identified factors. In addition, our analysis revealed specific pitfalls concerning validity issues for each of the modeling methods.","tags":[],"title":"Promises and pitfalls of computational modelling for insurgency conflicts","type":"publication"},{"authors":["Zoltan Mann"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653988637,"objectID":"4dffde7bfe84678e048d236e8111c98f","permalink":"https://cci-research.nl/publication/mann-security-2022/","publishdate":"2022-05-31T09:17:16.849585Z","relpermalink":"/publication/mann-security-2022/","section":"publication","summary":"Applications for the Internet of Things (IoT) may use, beyond the IoT devices themselves, also edge and cloud resources. Thus, the modules of an application can be placed on a variety of nodes with different capabilities in terms of security, trustworthiness, and capacity. Application modules may exist in multiple instances. This makes it possible to assign users to the most appropriate module instances, taking into account requirements on security, privacy, and latency. There is a non-trivial interplay between application placement decisions and user assignment decisions. For example, if a certain user is assigned to a module, then that module may not be allowed to be placed on nodes not trusted by the user. However, most existing research neglects this interplay and its implications on security and privacy. In this paper, we address the joint problem of application placement and user assignment. Beside capacity and latency constraints, we consider several types of security and privacy constraints: (i) module-level location constraints, (ii) user-level location constraints, (iii) co-location constraints, and (iv) k-anonymity constraints. We formalize the problem and develop an algorithm to solve it using quadratically constrained mixed integer programming. We demonstrate the applicability of the proposed approach by applying it to an IoT system in the smart home domain. Controlled experiments on problem instances of increasing size show that the algorithm can solve even large problem instances in acceptable time.","tags":[],"title":"Security- and Privacy-Aware IoT Application Placement and User Assignment","type":"publication"},{"authors":["Jamila Alsayed Kassem","Adam Belloum","Tim Müller","Paola Grosso"],"categories":[],"content":"","date":1640995200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"97c6f26d6a29b94c45c1aec99ac7f963","permalink":"https://cci-research.nl/publication/alsayed-kassem-2022/","publishdate":"2022-01-01T00:00:00Z","relpermalink":"/publication/alsayed-kassem-2022/","section":"publication","summary":"","tags":[],"title":"Utilisation Profiles of Bridging Function Chain for Healthcare Use Cases","type":"publication"},{"authors":["Jonathan Kwik","Tom van Engers"],"categories":[],"content":"","date":1638316800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985659,"objectID":"85abb8aca1e7ffa607ca685abf5024be","permalink":"https://cci-research.nl/publication/kwik-algorithmic-2021/","publishdate":"2022-05-31T08:27:39.143995Z","relpermalink":"/publication/kwik-algorithmic-2021/","section":"publication","summary":"Under international law, weapon capabilities and their use are regulated by legal requirements set by International Humanitarian Law (IHL). Currently, there are strong military incentives to equip capabilities with increasingly advanced artificial intelligence (AI), which include opaque (less transparent) models. As opaque models sacrifice transparency for performance, it is necessary to examine whether their use remains in conformity with IHL obligations. First, we demonstrate that the incentives for automation drive AI toward complex task areas and dynamic and unstructured environments, which in turn necessitates resort to more opaque solutions. We subsequently discuss the ramifications of opaque models for foreseeability and explainability. Then, we analyse their impact on IHL requirements from a development, pre-deployment and post-deployment perspective. We find that while IHL does not regulate opaque AI directly, the lack of foreseeability and explainability frustrates the fulfilment of key IHL requirements to the extent that the use of fully opaque AI could violate international law. States are urged to implement interpretability during development and seriously consider the challenging complication of determining the appropriate balance between transparency and performance in their capabilities.","tags":[],"title":"Algorithmic fog of war: When lack of transparency violates the law of armed conflict","type":"publication"},{"authors":["Matteo Pascucci","Giovanni Sileno"],"categories":[],"content":"","date":1638316800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985657,"objectID":"825d22925ad36bc50888ef7eec54cda6","permalink":"https://cci-research.nl/publication/schweighofer-computability-2021-1/","publishdate":"2022-05-31T08:27:37.683821Z","relpermalink":"/publication/schweighofer-computability-2021-1/","section":"publication","summary":"Normative positions are sometimes illustrated in diagrams, in particular in didactic contexts. Traditional examples are the Aristotelian polygons of opposition for deontic modalities (squares, triangles, hexagons, etc.), and the Hohfeldian squares for obligative and potestative concepts. Relying on previous work, we show that Hohfeld’s framework can be used as a basis for developing several Aristotelian polygons and more complex diagrams. Then, we illustrate how logical theories of increasing strength can be built based on these diagrams, and how those theories enable us to determine in a computably efficient way whether a set of normative positions can be derived from another set of normative positions.","tags":[],"title":"Computability of Diagrammatic Theories for Normative Positions","type":"publication"},{"authors":["Matteo Pascucci","Giovanni Sileno"],"categories":[],"content":"","date":1638316800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985657,"objectID":"f4c25b2dfbbd45f0435952bfb6576a99","permalink":"https://cci-research.nl/publication/schweighofer-computability-2021/","publishdate":"2022-05-31T08:27:37.264114Z","relpermalink":"/publication/schweighofer-computability-2021/","section":"publication","summary":"Normative positions are sometimes illustrated in diagrams, in particular in didactic contexts. Traditional examples are the Aristotelian polygons of opposition for deontic modalities (squares, triangles, hexagons, etc.), and the Hohfeldian squares for obligative and potestative concepts. Relying on previous work, we show that Hohfeld’s framework can be used as a basis for developing several Aristotelian polygons and more complex diagrams. Then, we illustrate how logical theories of increasing strength can be built based on these diagrams, and how those theories enable us to determine in a computably efficient way whether a set of normative positions can be derived from another set of normative positions.","tags":[],"title":"Computability of Diagrammatic Theories for Normative Positions","type":"publication"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","Tom van Engers"],"categories":null,"content":"","date":1634256e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1634256e3,"objectID":"3411cb2e50096433775d6fd2d71d4836","permalink":"https://cci-research.nl/publication/emas_2021_mostafa/","publishdate":"2022-02-15T00:00:00Z","relpermalink":"/publication/emas_2021_mostafa/","section":"publication","summary":"Testing undeniably plays a central role in the daily practice of software engineering, and this explains why better and more efficient libraries and services are continuously made available to developers and designers. Could the MAS developers community similarly benefit from utilizing state-of-the-art testing approaches? The paper investigates the possibility of bringing modern software testing tools as those used in mainstream software engineering into multi-agent systems engineering. Our contribution explores and illustrates, by means of a concrete example, the possible interactions between the agent-based programming framework ASC2 (AgentScript Cross-Compiler) and various testing approaches (unit/agent testing, integration/system testing, continuous integration) and elaborate on how the design choices of ASC2 enable these interactions.","tags":["Data","AOP","BDI","Testing"],"title":"Seamless Integration and Testing for MAS Engineering","type":"publication"},{"authors":["Davide Bellizia","Nadia El Mrabet","Apostolos P. Fournaris","Simon Pontie","Francesco Regazzoni","Francois-Xavier Standaert","Elise Tasso","Emanuele Valea"],"categories":[],"content":"","date":1633046400,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985661,"objectID":"370a431b1d79d60bf6de4dbc689c3a16","permalink":"https://cci-research.nl/publication/bellizia-post-quantum-2021/","publishdate":"2022-05-31T08:27:41.015202Z","relpermalink":"/publication/bellizia-post-quantum-2021/","section":"publication","summary":"","tags":[],"title":"Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design","type":"publication"},{"authors":["Giovanni Sileno","Paola Grosso"],"categories":[],"content":"","date":1627776e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"1da7b81af3e279d6d26987013c9372dc","permalink":"https://cci-research.nl/publication/sileno-accounting-2021/","publishdate":"2022-05-31T08:27:38.11125Z","relpermalink":"/publication/sileno-accounting-2021/","section":"publication","summary":"","tags":[],"title":"Accounting Value Effects for Responsible Networking","type":"publication"},{"authors":["Si Gao","Johann Großschädl","Ben Marshall","Dan Page","Thinh Pham","Francesco Regazzoni"],"categories":[],"content":"","date":1627776e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985662,"objectID":"08960185c8f72e3087e617bda35f0388","permalink":"https://cci-research.nl/publication/gao-instruction-2021/","publishdate":"2022-05-31T08:27:41.861752Z","relpermalink":"/publication/gao-instruction-2021/","section":"publication","summary":"In both hardware and software, masking can represent an effective means of hardening an implementation against side-channel attack vectors such as Differential Power Analysis (DPA). Focusing on software, however, the use of masking can present various challenges: specifically, it often 1) requires significant effort to translate any theoretical security properties into practice, and, even then, 2) imposes a significant overhead in terms of efficiency. To address both challenges, this paper explores the use of an Instruction Set Extension (ISE) to support masking in software-based implementations of a range of (symmetric) cryptographic kernels including AES: we design, implement, and evaluate such an ISE, using RISC-V as the base ISA. Our ISE-supported first-order masked implementation of AES, for example, is an order of magnitude more efficient than a software-only alternative with respect to both execution latency and memory footprint; this renders it comparable to an unmasked implementation using the same metrics, but also first-order secure.","tags":[],"title":"An Instruction Set Extension to Support Software-Based Masking","type":"publication"},{"authors":["Rosario Cammarota","Francesco Regazzoni"],"categories":[],"content":"","date":1622505600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985661,"objectID":"b5fe06d72ab1442085a7aca722e8022d","permalink":"https://cci-research.nl/publication/cammarota-guest-2021/","publishdate":"2022-05-31T08:27:41.638524Z","relpermalink":"/publication/cammarota-guest-2021/","section":"publication","summary":"","tags":[],"title":"Guest Editors’ Introduction: Special Issue on Top Picks in Hardware and Embedded Security","type":"publication"},{"authors":["Jaume Abella","Sergi Alcaide","Jens Anders","Francisco Bas","Steffen Becker","Elke De Mulder","Nourhan Elhamawy","Frank K. Gurkaynak","Helena Handschuh","Carles Hernandez","Mike Hutter","Leonidas Kosmidis","Ilia Polian","Matthias Sauer","Stefan Wagner","Francesco Regazzoni"],"categories":[],"content":"","date":1619827200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985660,"objectID":"48d2716acdaefd05df046fa2bcd33a08","permalink":"https://cci-research.nl/publication/abella-security-2021/","publishdate":"2022-05-31T08:27:40.809297Z","relpermalink":"/publication/abella-security-2021/","section":"publication","summary":"","tags":[],"title":"Security, Reliability and Test Aspects of the RISC-V Ecosystem","type":"publication"},{"authors":["Primavera De Filippi","Chris Wray","Giovanni Sileno"],"categories":[],"content":"","date":1617235200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985657,"objectID":"65c5400bf134741f85845dddf697fe99","permalink":"https://cci-research.nl/publication/de-filippi-smart-2021/","publishdate":"2022-05-31T08:27:36.867149Z","relpermalink":"/publication/de-filippi-smart-2021/","section":"publication","summary":"","tags":[],"title":"Smart contracts","type":"publication"},{"authors":["Shivam Bhasin","Siddharth Garg","Francesco Regazzoni"],"categories":[],"content":"","date":1614556800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985661,"objectID":"07ddadea7e363f712b18a1c5cb2ae0d0","permalink":"https://cci-research.nl/publication/bhasin-special-2021/","publishdate":"2022-05-31T08:27:41.237412Z","relpermalink":"/publication/bhasin-special-2021/","section":"publication","summary":"","tags":[],"title":"Special Section on Attacking and Protecting Artificial Intelligence","type":"publication"},{"authors":["Andrea Caforio","Fatih Balli","Subhadeep Banik","Francesco Regazzoni"],"categories":[],"content":"","date":1612137600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985661,"objectID":"fb79649c5e800dff4073b64396191be8","permalink":"https://cci-research.nl/publication/caforio-deeper-2021/","publishdate":"2022-05-31T08:27:41.434309Z","relpermalink":"/publication/caforio-deeper-2021/","section":"publication","summary":"","tags":[],"title":"A Deeper Look at the Energy Consumption of Lightweight Block Ciphers","type":"publication"},{"authors":["Milen Girma Kebede","Giovanni Sileno","Tom van Engers"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985657,"objectID":"0011f45ee12ccbe551650f08ba5d37bb","permalink":"https://cci-research.nl/publication/rodriguez-doncel-critical-2021/","publishdate":"2022-05-31T08:27:37.06263Z","relpermalink":"/publication/rodriguez-doncel-critical-2021/","section":"publication","summary":"","tags":[],"title":"A Critical Reflection on ODRL","type":"publication"},{"authors":["Damian Frolich","L. Thomas van Binsbergen"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985656,"objectID":"01d2f0ccf11da0557c228d5e4f53f68d","permalink":"https://cci-research.nl/publication/frolich-generic-2021/","publishdate":"2022-05-31T08:27:36.0429Z","relpermalink":"/publication/frolich-generic-2021/","section":"publication","summary":"Exploratory programming is a form of incremental program development in which the programmer can try and compare definitions, receives immediate feedback and can simultaneously experiment with the language, the program and input data. Read-Eval-Print-Loop interpreters (REPLs) and computational notebooks are popular tools for exploratory programming. However, their usability, capabilities and user-friendliness are strongly dependent on the underlying interpreter and, in particular, on the ad hoc engineering required to ready the underlying interpreter for incremental program development. To break this dependency, this paper adopts a principled approach and implements a so-called exploring interpreter as a back-end to support various development environments for exploratory programming.","tags":[],"title":"A Generic Back-End for Exploratory Programming","type":"publication"},{"authors":["Onno Valkering","Reginald Cushing","Adam Belloum"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"04148e48dff82c458c229bda8cecbc1b","permalink":"https://cci-research.nl/publication/valkering-2021/","publishdate":"2021-01-01T00:00:00Z","relpermalink":"/publication/valkering-2021/","section":"publication","summary":"","tags":[],"title":"Brane: A Framework for Programmable Orchestration of Multi-Site Applications","type":"publication"},{"authors":["Jamila Alsayed Kassem","Onno Valkering","Adam Belloum","Paola Grosso"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"4586d4387db709fb180bc9e26f6b8ee8","permalink":"https://cci-research.nl/publication/alsayed-kassem-2021/","publishdate":"2021-01-01T00:00:00Z","relpermalink":"/publication/alsayed-kassem-2021/","section":"publication","summary":"","tags":[],"title":"EPI Framework: Approach for Traffic Redirection Through Containerised Network Functions","type":"publication"},{"authors":["Giovanni Sileno","Alexander Boer","Geoff Gordon","Bernhard Rieder"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"b1de39c9c0161274ab8d7eeb0253441a","permalink":"https://cci-research.nl/publication/rodriguez-doncel-like-2021/","publishdate":"2022-05-31T08:27:38.307356Z","relpermalink":"/publication/rodriguez-doncel-like-2021/","section":"publication","summary":"","tags":[],"title":"Like Circles in the Water: Responsibility as a System-Level Function","type":"publication"},{"authors":["Lu Zhang","Reginald Cushing","Ralph Koning","Cees de Laat","Paola Grosso"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"59970810807ddc5f7ff9d9f8547d0325","permalink":"https://cci-research.nl/publication/zhang-2021/","publishdate":"2021-01-01T00:00:00Z","relpermalink":"/publication/zhang-2021/","section":"publication","summary":"","tags":[],"title":"Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM)","type":"publication"},{"authors":["Geerten Rijsdijk","Giovanni Sileno"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"b30ec4adb1db27683826d791d43a77c0","permalink":"https://cci-research.nl/publication/baratchi-solving-2021/","publishdate":"2022-05-31T08:27:37.890871Z","relpermalink":"/publication/baratchi-solving-2021/","section":"publication","summary":"","tags":[],"title":"Solving Hofstadter’s Analogies Using Structural Information Theory","type":"publication"},{"authors":["Matteo Pascucci","Giovanni Sileno"],"categories":[],"content":"","date":1609459200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985657,"objectID":"90ac49f1d86ee7f72f05e81fa0c49032","permalink":"https://cci-research.nl/publication/basu-search-2021/","publishdate":"2022-05-31T08:27:37.483504Z","relpermalink":"/publication/basu-search-2021/","section":"publication","summary":"","tags":[],"title":"The Search for Symmetry in Hohfeldian Modalities","type":"publication"},{"authors":["Lu-Chi Liu","Giovanni Sileno","Tom van Engers"],"categories":[],"content":"","date":1606780800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"7f9c795e1658241b2a968c114736bfac","permalink":"https://cci-research.nl/publication/villata-digital-2020/","publishdate":"2022-05-31T08:27:38.734417Z","relpermalink":"/publication/villata-digital-2020/","section":"publication","summary":"The combination of smart contracts with blockchain technology enables the authentication of the contract and limits the risks of non-compliance. In principle, smart contracts can be processed more efficiently compared to traditional paper-based contracts. However, current smart contracts have very limited capabilities with respect to normative representations, making them too distant from actual contracts. In order to reduce this gap, the paper presents an architectural analysis to see the role of computational artifacts in terms of various ex-ante and ex-post enforcement mechanisms. The proposed framework is assessed using scenarios concerning data-sharing operations bound by legal requirements from the General Data Protection Regulation (GDPR) and data-sharing agreements.","tags":[],"title":"Digital Enforceable Contracts (DEC): Making Smart Contracts Smarter","type":"publication"},{"authors":["Xin Zhou","Reginald Cushing","Ralph Koning","Adam Belloum","Paola Grosso","Sander Klous","Tom van Engers","Cees de Laat"],"categories":[],"content":"","date":1606780800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985659,"objectID":"38e217f37338665710bf423d6f42367c","permalink":"https://cci-research.nl/publication/zhou-policy-2020/","publishdate":"2022-05-31T08:27:39.56304Z","relpermalink":"/publication/zhou-policy-2020/","section":"publication","summary":"","tags":[],"title":"Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures","type":"publication"},{"authors":["L. Thomas van Binsbergen","Mauricio Verano Merino","Pierre Jeanjean","Tijs van der Storm","Benoit Combemale","Olivier Barais"],"categories":[],"content":"","date":1604188800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985656,"objectID":"19e3e24d1575eca1f55d74ea479ee174","permalink":"https://cci-research.nl/publication/van-binsbergen-principled-2020/","publishdate":"2022-05-31T08:27:36.637503Z","relpermalink":"/publication/van-binsbergen-principled-2020/","section":"publication","summary":"Read-eval-print-loops (REPLs) allow programmers to test out snippets of code, explore APIs, or even incrementally construct code, and get immediate feedback on their actions. However, even though many languages provide a REPL, the relation between the language as is and what is accepted at the REPL prompt is not always well-defined. Furthermore, implementing a REPL for new languages, such as DSLs, may incur significant language engineering cost. In this paper we survey the domain of REPLs and investigate the (formal) principles underlying REPLs. We identify and define the class of sequential languages, which admit a sound REPL implementation based on a definitional interpreter, and present design guidelines for extending existing language implementations to support REPL-style interfaces (including computational notebooks). The obtained REPLs can then be generically turned into an exploring interpreter, to allow exploration of the user's interaction. The approach is illustrated using three case studies, based on MiniJava, QL (a DSL for questionnaires), and eFLINT (a DSL for normative rules). We expect sequential languages, and the consequent design principles, to be stepping stones towards a better understanding of the essence of REPLs.","tags":["Interpreters","Note- books","Software language engineering","Language workbenches","Meta-languages","Repls"],"title":"A principled approach to REPL interpreters","type":"publication"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","Tom van Engers"],"categories":null,"content":"","date":160272e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":160272e4,"objectID":"310ee43d59da0960ee43a487cd03b85f","permalink":"https://cci-research.nl/publication/prima2020_mostafa/","publishdate":"2020-10-15T00:00:00Z","relpermalink":"/publication/prima2020_mostafa/","section":"publication","summary":"Current agent architectures implementing the belief-desire-intention (BDI) model consider agents which respond reactively to internal and external events by selecting the first-available plan. Priority between plans is hard-coded in the program, and so the reasons why a certain plan is preferred remains in the programmer's mind. Recent works that attempt to include explicit preferences in BDI agents treat preferences essentially as a rationale for planning tasks to be performed at run-time, thus disrupting the reactive nature of agents. In this paper we propose a method to include declarative preferences (i.e. concerning states of affairs) in the agent program, and to use them in a manner that preserves reactivity. To achieve this, the plan prioritization step is performed offline, by (a) generating all possible outcomes of situated plan executions, (b) selecting a relevant subset of situation/outcomes couplings as representative summary for each plan, (c) sorting the plans by evaluating summaries through the agent's preferences. The task of generating outcomes in several conditions is performed by translating the agent's procedural knowledge to an ASP program using discrete-event calculus.","tags":["Preferences","AOP","BDI"],"title":"Declarative Preferences in Reactive BDI Agents","type":"publication"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","Tom van Engers","Sander Klous"],"categories":null,"content":"","date":160272e4,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":160272e4,"objectID":"53259ce57f329dfb66ac092168918b33","permalink":"https://cci-research.nl/publication/agere2020_mostafa/","publishdate":"2020-10-15T00:00:00Z","relpermalink":"/publication/agere2020_mostafa/","section":"publication","summary":"The paper introduces an Agent-Oriented Programming (AOP) framework based on the Belief-Desire-Intention (BDI) model of agency. The novelty of this framework is in relying on the Actor model, instantiating each intentional agent as an autonomous micro-system run by actors. The working hypothesis behind this choice is that defining the agents via actors results in a more fine-grained modular architecture and that the execution of agent-oriented programs is enhanced (in scalability as well as in performance) by relying on robust implementations of Actor models such as Akka. The framework is benchmarked and analyzed quantitatively and qualitatively against three other AOP frameworks; Jason, ASTRA and Sarl.","tags":["Data","AOP","BDI"],"title":"Run, Agent, Run! Architecture and Benchmark of Actor-based Agents","type":"publication"},{"authors":null,"categories":null,"content":"The AgentScript Cross-Compiler (ASC) is an Agent-Oriented Programming Framework created to bridge the high-level abstraction power of AOP into modern development and deployment environments.\n","date":1592697600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1592697600,"objectID":"3c3449d962ab6ddbac8eb29700769c45","permalink":"https://cci-research.nl/software/asc/","publishdate":"2020-06-21T00:00:00Z","relpermalink":"/software/asc/","section":"software","summary":"Fast and Flexible Agent-Oriented Programming Framework","tags":["AOP","BDI"],"title":"AgentScript Cross-Compiler","type":"software"},{"authors":null,"categories":null,"content":"The Amsterdam Data Exchange aims to provide broad access to data for researchers, companies and private individuals. Inspired by the Open Science Cloud of the European Commission, the project is intended to connect with similar projects across Europe. And eventually even become part of a global movement to share data more easily.\n","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"998396532629a011d63ce92dfc206018","permalink":"https://cci-research.nl/project/amdex/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/project/amdex/","section":"project","summary":"Amsterdam Data Exchange","tags":["Data"],"title":"AMdEX","type":"project"},{"authors":null,"categories":null,"content":"Software systems that share potentially sensitive data are subjected to laws, regulations, policies and/or contracts. The monitoring, control and enforcement processes applied to these systems are currently to a large extent manual, which we rather automate by embedding the processes as dedicated and adaptable software services in order to improve efficiency and effectiveness. This approach requires such regulatory services to be closely aligned with a formal description of the relevant norms.\neFLINT is a domain-specific language developed for formalizing norms from a variety of sources. The theoretical foundations of the language are found in transition systems and in Hohfeld’s framework of legal fundamental conceptions. The language can be used to formalize norms from a large variety of sources. The resulting specifications are executable and support several forms of reasoning such as automatic case assessment, manual exploration and simulation. Moreover, the specifications can be used to develop regulatory services for several types of monitoring, control and enforcement. The language is evaluated through a case study formalizing articles 6(1)(a) and 16 of the General Data Protection Regulation (GDPR). A prototype implementation of eflint is discussed and is available online here.\n","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"e908b461ba5d284799096393c19a0683","permalink":"https://cci-research.nl/software/eflint/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/software/eflint/","section":"software","summary":"A domain-specific language for executable norm specifications","tags":["Norms"],"title":"eFlint","type":"software"},{"authors":null,"categories":null,"content":"","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"14d13f9c99ea04f33bc6483d9a30fda9","permalink":"https://cci-research.nl/project/erasmus/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/project/erasmus/","section":"project","summary":"EU's programme to support education, training, youth and sport in Europe","tags":["Data"],"title":"Erasmus+","type":"project"},{"authors":null,"categories":null,"content":"","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"79e3920e79c77bff78be94eb3beb8670","permalink":"https://cci-research.nl/project/fogprotect/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/project/fogprotect/","section":"project","summary":"Protecting sensitive data in the computing continuum","tags":["Data"],"title":"FogProtect","type":"project"},{"authors":null,"categories":null,"content":"","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"d74257e6b9144c1d79de216b184c017a","permalink":"https://cci-research.nl/project/slices/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/project/slices/","section":"project","summary":"Large-scale Infrastructure for Computing/Communication Experimental Studies","tags":["Data"],"title":"SLICES","type":"project"},{"authors":null,"categories":null,"content":"","date":1587945600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1587945600,"objectID":"c5e7cb2193d25dc9502faa738c0aa5f1","permalink":"https://cci-research.nl/project/vision/","publishdate":"2020-04-27T00:00:00Z","relpermalink":"/project/vision/","section":"project","summary":"Virtual Interface for Smart Interaction Online","tags":["Data"],"title":"VISION","type":"project"},{"authors":["L. Thomas van Binsbergen","Lu-Chi Liu","Robert van Doesburg","Tom van Engers"],"categories":[],"content":"","date":1577836800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985656,"objectID":"3bffcb19d44af3fe3d619f5ed531e999","permalink":"https://cci-research.nl/publication/van-binsbergen-eflint-2020/","publishdate":"2022-05-31T08:27:36.24603Z","relpermalink":"/publication/van-binsbergen-eflint-2020/","section":"publication","summary":"","tags":[],"title":"eFLINT: a domain-specific language for executable norm specifications","type":"publication"},{"authors":["Peter Fratric","Giovanni Sileno","Tom van Engers","Sander Klous"],"categories":[],"content":"","date":1577836800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985658,"objectID":"7d3479f7f412f601aa0cb3d62d2153fa","permalink":"https://cci-research.nl/publication/krzhizhanovskaya-integrating-2020/","publishdate":"2022-05-31T08:27:38.511129Z","relpermalink":"/publication/krzhizhanovskaya-integrating-2020/","section":"publication","summary":"","tags":[],"title":"Integrating Agent-Based Modelling with Copula Theory: Preliminary Insights and Open Problems","type":"publication"},{"authors":["Mostafa Mohajeri Parizi","Giovanni Sileno","Tom van Engers"],"categories":null,"content":"","date":1571097600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1571097600,"objectID":"63679cf588b7ba7aae064d904011bea3","permalink":"https://cci-research.nl/publication/prima2019_mostafa/","publishdate":"2019-10-15T00:00:00Z","relpermalink":"/publication/prima2019_mostafa/","section":"publication","summary":"Computational agents based upon the belief-desire-intention (BDI) architecture generally use reactive rules to trigger the execution of plans. For various reasons, certain plans might be preferred over others at design time. Most BDI agents platforms use hard-coding these preferences in some form of the static ordering of the reactive rules, but keeping the preferential structure implicit limits script reuse and generalization. This paper proposes an approach to add qualitative preferences over adoption/avoidance of procedural goals into an agent script, building upon the well-known notation of conditional ceteris paribus preference networks (CP-nets). For effective execution, the procedural knowledge and the preferential structure of the agent are mapped in an off-line fashion into a new reactive agent script. This solution contrasts with recent proposals integrating preferences as a rationale in the decision making cycle, and so overriding the reactive nature of BDI agents.","tags":["Preferences","AOP","BDI"],"title":"Integrating CP-Nets in Reactive BDI Agents","type":"publication"},{"authors":["Ameneh Deljoo","Ralph Koning","Tom van Engers","Leon Gommans","Cees de Laat"],"categories":[],"content":"","date":1569888e3,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985659,"objectID":"9d1f1fa39a13c7d22c41a7b921c6ec6a","permalink":"https://cci-research.nl/publication/deljoo-managing-2019/","publishdate":"2022-05-31T08:27:39.767068Z","relpermalink":"/publication/deljoo-managing-2019/","section":"publication","summary":"","tags":[],"title":"Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust","type":"publication"},{"authors":["Yuri Demchenko"],"categories":[],"content":"","date":1564617600,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985660,"objectID":"f8ae81c199235cdee0f96a26532d34b8","permalink":"https://cci-research.nl/publication/demchenko-big-2019/","publishdate":"2022-05-31T08:27:40.389276Z","relpermalink":"/publication/demchenko-big-2019/","section":"publication","summary":"","tags":[],"title":"Big Data Platforms and Tools for Data Analytics in the Data Science Engineering Curriculum","type":"publication"},{"authors":["Yuri Demchenko","Reggie Cushing","Wouter Los","Paola Grosso","Cees de Laat","Leon Gommans"],"categories":[],"content":"","date":1561939200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985660,"objectID":"009880e590f71e893cc31ef476aa60c9","permalink":"https://cci-research.nl/publication/demchenko-open-2019/","publishdate":"2022-05-31T08:27:40.186684Z","relpermalink":"/publication/demchenko-open-2019/","section":"publication","summary":"","tags":[],"title":"Open Data Market Architecture and Functional Components","type":"publication"},{"authors":["Yuri Demchenko","Luca Comminiello","Gianluca Reali"],"categories":[],"content":"","date":1546300800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1653985660,"objectID":"35620628a788000bb30b3fb50a4f006a","permalink":"https://cci-research.nl/publication/demchenko-designing-2019/","publishdate":"2022-05-31T08:27:40.611427Z","relpermalink":"/publication/demchenko-designing-2019/","section":"publication","summary":"","tags":[],"title":"Designing Customisable Data Science Curriculum Using Ontology for Data Science Competences and Body of Knowledge","type":"publication"},{"authors":null,"categories":null,"content":"The DL4lD research project aims to help the Dutch logistics sector with digitalisation of their busines processes. To do so, DL4LD focuses on the trustworthy sharing of an organizations (potentially sensitive) data. Trust that the organization’s (potentially sensitive) data is handled in a controlled and secure way, is for many organizations a prerequisite sine qua non the organization may not be prepared to share its data.\nA focal point of the DL4LD research is on maintaining sovereignty by the data owner over the access, usage, processing and proliferation of his data DL4LD shows how to digitally support sufficient trust and sovereignty enablers to establish a trustworthy data sharing relationship between two logistic partners that didn\u0026rsquo;t have so a priori.\nThe DL4LD-project runs from January 2018 to December 2022.\n","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"bba883e081fda2f974e38a8e2fbcb10d","permalink":"https://cci-research.nl/project/dl4ld/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/dl4ld/","section":"project","summary":"Data Logistics for Logistics Data","tags":["Data"],"title":"DL4LD","type":"project"},{"authors":null,"categories":null,"content":"The DMI ecosystem is a public-private partnership that facilitates the responsible sharing and use of data on a solid foundation of mutual trust, clear agreements and open standards. This creates new business opportunities for a variety of market players, which in turn enables government bodies to give concrete form and substance to mobility innovation and smart and sustainable urbanisation. The DMI ecosystem ensures a better connection between the various domains and stakeholders, in order to be able to optimise continuously and coherently on that same basis. As a result, the intended agglomeration effects and a sustainable society with vibrant towns and cities will be achieved faster.\n","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"b904e7a6d53eb82234bdd8a41bc3e39e","permalink":"https://cci-research.nl/project/dmi/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/dmi/","section":"project","summary":"Dutch Metropolitan Innovations","tags":["Data"],"title":"DMI","type":"project"},{"authors":null,"categories":null,"content":"Knowledge is power \u0026ndash; and in healthcare, that holds absolutely true. Yet, for an industry that is under financial stress, increasing complexity of disease and co-morbidity, and burdened by capacity constraints \u0026ndash; why has data not been healthcare\u0026rsquo;s savvier? Three major challenges have inhibited this:\ndata is not accessible and remains in silos; data is not analysed to derive meaningful clinical insights; insight isn\u0026rsquo;t accessible for actioning by providers or patients to self/joint manage their condition. Our consortium of medical professionals, data scientists, IT-infrastructure experts, machine learning researchers and legal experts have designed Enabling Patient Interventions to liberate, analyse, and action that data in a trustworthy way. EPI aims to empower patients and providers through self-management, shared management, and personalization across the full health spectrum. To do so, we will build a fuller picture of the person by linking traditional eHealth data sets with new sources of data. Further, we will develop a platform based upon a secure and trustworthy distributed data infrastructure, combining data analytics, including machine learning, and health decision support algorithms to create new, actionable, and personalized insights for prevention, management, and intervention to providers and patients. We will develop new machine learning methods for determining and analysing optimal interventions within small patient groups.\nOur insights will be applied in healthcare use cases representing a spectrum of health management challenges ranging from common chronic to highly lethal orphan diseases, and will empower better self/joint management of these conditions to improve cost, quality, and outcomes of care.\n","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"99e32802bbdd31cfadcc2b7dfe6c4f21","permalink":"https://cci-research.nl/project/epi/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/epi/","section":"project","summary":"Enabling Personalized Interventions","tags":["Data"],"title":"EPI","type":"project"},{"authors":null,"categories":null,"content":"This proposal concerns multidisciplinary fundamental and applied research on developing a secure, end-to-end trusted, scalable and future-proof solution for distributed dynamic data sharing across multiple logistic domains. Sharing data across organizations in a secure, trusted and policy based manner, and enforcing the agreed use of that data is a hard problem. Many partial solutions already exist in the form of platforms, standards and directives, and back office solutions, all of them aimed at sharing data with their own goals and objectives. The absence of integrated solutions is hindering the potential exploitation of fused big data. Indeed, the research line “Data security in logistics” in the call underlines the importance of integrated cryptographically secure solutions.\nIn our proposal, typical logistics application profiles on specific demands in security, privacy, performance and policy will be identified. The goal of the proposed research is to develop end-to-end trusted and scalable solutions for typical application profiles that allow policy enforced data sharing and analysis across multiple IT domains based on negotiation of smart multi-party contracts. To achieve our goals, we will develop and integrate techniques for secure data sharing, scalability for big data, and policy-based data sharing and analytics. The ability to form temporary business alliances relies on the ability to implement ways to keep track of business agreements and transaction information in ways trusted by community members. The agility and diversity of market players, its data sources and potential risks if data is misused, is helped by creating a commonly trusted and governed infrastructure to access and share data. Such type of infrastructure is subject of research in Compartiment 1 of this call. In this proposal we will work alongside this work in order to investigate the value that blockchain technology will bring tosharing big data assets in a big data sharing infrastructure. The ability to provided trusted information from many distributed sources, such as mobile of tablet style devices that to not have to computational power to participate in traditional blockchain approaches, is an important topic address by this work. The aim is to not only protect primary data and limit accessibility via policy, but also to secure access to the provenance trails and other meta-data that are sensitive.\nThe main goals of this project are: Prove the value of distribute block chain approaches that can be applied to logistic use-cases (provided by industry partners and compartment 1 collaborators) Provide a future proof cryptographic approach considering the processing power quantum computing and other high performance compute technologies may bring. Provide an environment allowing parties to create data sharing agreements compliant to the digital market place policy thus guaranteeing secure and trustworthy real time sharing of big data. Provide secure mechanisms for compliancy checking using provenance trails and audit trails, and mechanisms for dispute settlement in case of breaches. ","date":1461715200,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":1461715200,"objectID":"240a6e389c2858ce25422c0da5232b01","permalink":"https://cci-research.nl/project/sspddp/","publishdate":"2016-04-27T00:00:00Z","relpermalink":"/project/sspddp/","section":"project","summary":"Secure Scalable Policy-enforced Distributed Data Processing","tags":["Data"],"title":"SSPDDP","type":"project"},{"authors":null,"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":-62135596800,"objectID":"8e7bc052bdfc6746ea2bb6595e8093eb","permalink":"https://cci-research.nl/home/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/home/","section":"","summary":"","tags":null,"title":"","type":"widget_page"},{"authors":null,"categories":null,"content":"","date":-62135596800,"expirydate":-62135596800,"kind":"page","lang":"en","lastmod":-62135596800,"objectID":"c9fb0139e1aaa066f215af1612b3ef87","permalink":"https://cci-research.nl/project/humainer/","publishdate":"0001-01-01T00:00:00Z","relpermalink":"/project/humainer/","section":"project","summary":"HUman and Mathematical Approach to Implementing and Navigating Explainable and Responsible AI","tags":["Data"],"title":"Humainer AI","type":"project"}]