Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings

Conference item


Nnawuchi, U., George, C. and Kammueller, F. 2024. Transparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings. Santos M., Machado, J., Novais, P., Cortez, P. and Moreira, P. (ed.) 23rd International Conference on Artificial Intelligence. Viana do Castelo, Portugal 03 - 06 Sep 2024 Springer. pp. 270-283 https://doi.org/10.1007/978-3-031-73497-7_22
TitleTransparency vs explanation of machine learning algorithms: perspectives from recent legal proceedings
AuthorsNnawuchi, U., George, C. and Kammueller, F.
Abstract

The extensive use of Machine Learning (ML) algorithms has significantly altered decision-making processes, societal structures, and power dynamics. These algorithms, known for their efficiency, are increasingly making critical decisions. However, concerns about their opacity and biases persist. Some legal scholars and data scientists argue that the GDPR includes a right to explanation to address ML opacity, while others advocate for transparency as a better solution. This study explores the debate between transparency and explanation within the GDPR's regulatory framework, focusing on Articles 15, 22 and recent EU court rulings. By examining judicial developments and scholarly perspectives, the study highlights the GDPR's efforts to promote transparency and accountability in automated decision-making. Despite the GDPR's provisions, the lack of an explicit right to explanation has led to ongoing legal and ethical discussions. This research aims to provide insights into how transparency, explanation, and individual rights intersect in the realm of algorithmic decision-making under the GDPR.

KeywordsMachine Learning; Right to Explanation; Transparency; Automated decision-making; GDPR
Sustainable Development Goals16 Peace, justice and strong institutions
Middlesex University ThemeSustainability
Research GroupAspects of Law and Ethics Related to Technology group
Conference23rd International Conference on Artificial Intelligence
Page range270-283
Proceedings TitleProgress in Artificial Intelligence: 23rd EPIA Conference on Artificial Intelligence, EPIA 2024, Viana do Castelo, Portugal, September 3–6, 2024, Proceedings, Part I
SeriesLecture Notes in Computer Science
EditorsSantos M., Machado, J., Novais, P., Cortez, P. and Moreira, P.
ISSN0302-9743
Electronic1611-3349
ISBN
Paperback9783031734960
Electronic9783031734977
PublisherSpringer
Copyright Year2025
Publication dates
Online16 Nov 2024
Print16 Nov 2024
Publication process dates
Accepted29 Jun 2024
Deposited11 Oct 2024
Output statusPublished
Accepted author manuscript
File Access Level
Open
Copyright Statement

This version of the paper has been accepted for publication, after peer review and is subject to Springer Nature’s AM terms of use (https://www.springernature.com/gp/open-research/policies/accepted-ma...), but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: http://dx.doi.org/10.1007/978-3-031-73497-7_22

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

Additional information

Cite this paper as:
Nnawuchi, U., George, C., Kammueller, F. (2025). Transparency vs Explanation of Machine Learning Algorithms: Perspectives from Recent Legal Proceedings. In: Santos, M.F., Machado, J., Novais, P., Cortez, P., Moreira, P.M. (eds) Progress in Artificial Intelligence. EPIA 2024. Lecture Notes in Computer Science(), vol 14967. Springer, Cham. https://doi.org/10.1007/978-3-031-73497-7_22

Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-031-73497-7_22
Web address (URL) of conference proceedingshttps://doi.org/10.1007/978-3-031-73497-7
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/1q1xqw

Restricted files

Accepted author manuscript

  • 33
    total views
  • 1
    total downloads
  • 6
    views this month
  • 0
    downloads this month

Export as

Related outputs

Orwellian odyssey: smart borders and the imperative for explainability
Nnawuchi, U. and George, C. 2024. Orwellian odyssey: smart borders and the imperative for explainability. Farhaoui, Y., Herawan, T., Imoize, A.L. and El Allaoui, A. (ed.) 6th International Conference on Artificial Intelligence and Smart Environments. Errachidia, Morocco 07 - 09 Nov 2024 Springer.
Formalizing federated learning and differential privacy for GIS systems in IIIf
Kammueller, F., Piras, L., Fields, B. and Nagarajan, R. 2024. Formalizing federated learning and differential privacy for GIS systems in IIIf. 3rd International Workshop on System Security Assurance. Bydgoszcz, Poland 19 - 20 Sep 2024 Springer.
Addressing the interoperability of electronic health records: the technical and semantic interoperability, preserving privacy and security framework
Ademola, A., George, C. and Mapp, G. 2024. Addressing the interoperability of electronic health records: the technical and semantic interoperability, preserving privacy and security framework. Applied System Innovation. 7 (6). https://doi.org/10.3390/asi7060116
Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework
Mpungu, C, George, C. and Mapp, G. 2024. Enhancing digital forensics readiness in big data wireless medical networks: A secure decentralised framework. International Journal of Network Security & Its Applications (IJNSA) . 16 (4), pp. 13-30. https://doi.org/10.5121/ijnsa.2024.16402
Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments
Mpungu, C., George, C. and Mapp, G. 2024. Digital forensics readiness in big data networks: a novel framework and incident response script for Linux-Hadoop environments. Applied System Innovation. 7 (5). https://doi.org/10.3390/asi7050090
Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf
Kammueller, F. 2024. Analyzing air-traffic security using GIS-``blur'' with information flow control in the IIIf. 19th International Conference on Availability, Reliability and Security. Vienna, Austria 30 Jul - 02 Aug 2024 New York, NY Association for Computing Machinery (ACM). pp. 68 https://doi.org/10.1145/3664476
Introducing distributed ledger security into system specifications with the Isabelle RR-cycle
Kammueller, F. 2024. Introducing distributed ledger security into system specifications with the Isabelle RR-cycle. 28th European Symposium on Research in Computer Security: 2nd International Workshop on System Security Assurance (SecAssure). The Hague, The Netherlands 29 - 29 Sep 2023 Springer. pp. 330-340 https://doi.org/10.1007/978-3-031-54129-2_19
Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging
Mpungu, C., George, C. and Mapp, G. 2023. Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging. Jahankhani, H. (ed.) 14th ICGS3-22: International Conference on Global Security, Safety and Sustainability. Virtual Conference 07 - 08 Sep 2022 Springer. pp. 203-226 https://doi.org/10.1007/978-3-031-20160-8_12
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2022. Explanation by automated reasoning using the Isabelle Infrastructure framework. Human Computer Interaction International. Virtual 26 Jun - 01 Jul 2022
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2022. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. Moallem, A. (ed.) HCI-CPT: 4th International Conference on HCI for Cybersecurity, Privacy and Trust. Virtual 26 Jun - 01 Jul 2022 Springer. pp. 340-357 https://doi.org/10.1007/978-3-031-05563-8_22
Explanation by automated reasoning using the Isabelle Infrastructure framework
Kammueller, F. 2021. Explanation by automated reasoning using the Isabelle Infrastructure framework. arxiv.org. https://doi.org/10.48550/arXiv.2112.14809
Explanation of black box AI for GDPR related privacy using Isabelle
Kammueller, F. 2022. Explanation of black box AI for GDPR related privacy using Isabelle. Garcia-Alfaro, J., Navarro-Arribas, G. and Dragoni, N. (ed.) 17th DPM International Workshop on Data Privacy Management. Copenhagen, Denmark 29 - 30 Sep 2022 Cham Springer. https://doi.org/10.1007/978-3-031-25734-6_5
Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes
Vithanwattana, N., Karthick, G., Mapp, G., George, C. and Samuels, A. 2022. Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes. Journal of Reliable Intelligent Environments. 8 (3), pp. 299-315. https://doi.org/10.1007/s40860-022-00180-7
A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world
Jusob, F., George, C. and Mapp, G. 2022. A new privacy framework for the management of chronic diseases via mHealth in a post-Covid-19 world. Journal of Public Health. 30 (1), pp. 37-47. https://doi.org/10.1007/s10389-021-01608-9
Dependability engineering in Isabelle
Kammueller, F. 2021. Dependability engineering in Isabelle. arxiv.org.
Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders
Kammueller, F. and Alvarado, C. 2021. Exploring rationality of self awareness in social networking for logical modeling of unintentional insiders. arxiv.org.
Exploring a new security framework for future healthcare systems
Vithanwattana, N., Karthick, G., Mapp, G. and George, C. 2021. Exploring a new security framework for future healthcare systems. IEEE Global Communications Conference: Workshop on Securing Next-Generation Connected Healthcare Systems using Futuristic Technologies. Madrid, Spain [Hybrid: In-Person and Virtual] 07 - 11 Dec 2021 IEEE. pp. 1-6 https://doi.org/10.1109/GCWkshps52748.2021.9681967
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
Applying the Isabelle insider framework to airplane security
Kammueller, F. and Kerber, M. 2021. Applying the Isabelle insider framework to airplane security. Science of Computer Programming. 206. https://doi.org/10.1016/J.SCICO.2021.102623
A formal development cycle for security engineering in Isabelle
Kammueller, F. 2020. A formal development cycle for security engineering in Isabelle. arxiv.org.
Applying the Isabelle Insider framework to airplane security
Kammueller, F. and Kerber, M. 2020. Applying the Isabelle Insider framework to airplane security. arxiv.org.
A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry
Juddoo, S. and George, C. 2020. A qualitative assessment of machine learning support for detecting data completeness and accuracy issues to improve data analytics in big data for the healthcare industry. ELECOM 2020 - 3rd International Conference on Emerging Trends in Electrical, Electronic and Communications Engineering (ELECOM). Mauritius, Mauritius 25 - 27 Nov 2020 IEEE. pp. 58-66 https://doi.org/10.1109/ELECOM49001.2020.9297009
Masterminding change by combining secure system design with security risk assessment
Kammueller, F., Legay, A. and Schivo, S. 2021. Masterminding change by combining secure system design with security risk assessment. International Journal on Software Tools for Technology Transfer. 23 (1), pp. 69-70. https://doi.org/10.1007/s10009-020-00595-8
Combining secure system design with risk assessment for IoT healthcare systems
Kammueller, F. 2019. Combining secure system design with risk assessment for IoT healthcare systems. SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things, colocated with IEEE PerCom 2019. Kyoto, Japan 11 - 15 Mar 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 961-966 https://doi.org/10.1109/PERCOMW.2019.8730776
Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework
Kammueller, F. and Lutz, B. 2020. Modeling and analyzing the Corona-virus warning app with the Isabelle infrastructure framework. Garcia-Alfaro, J., Navarro-Arribas, G. and Herrera-Joancomarti, J. (ed.) International Workshop of Data Privacy Management, DPM'20. University of Surrey, UK 17 - 18 Sep 2020 Springer. pp. 128-144 https://doi.org/10.1007/978-3-030-66172-4_8
Inter-blockchain protocols with the Isabelle Infrastructure framework
Kammueller, F. and Nestmann, U. 2020. Inter-blockchain protocols with the Isabelle Infrastructure framework. Bernardo, B. and Marmsoler, D. (ed.) 2nd Workshop on Formal Methods for Blockchain, co-located with CAV'20. Los Angeles, CA, USA Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH. pp. 11:1-11:12 https://doi.org/10.4230/OASIcs.FMBC.2020.11
Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems
Kammueller, F. 2020. Attack Trees in Isabelle for GDPR compliance of IoT healthcare systems.
Describing and simulating concurrent quantum systems
Bornat, R., Boender, J., Kammueller, F., Poly, G. and Nagarajan, R. 2020. Describing and simulating concurrent quantum systems. Biere, A. and Parker, D. (ed.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 20). Dublin 27 - 30 Apr 2020 Springer. pp. 271-277 https://doi.org/10.1007/978-3-030-45237-7_16
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
Attack trees in Isabelle
Kammueller, F. 2018. Attack trees in Isabelle. 20th International Conference on Information and Communications Security, ICICS 2018. Lille, France 29 - 31 Oct 2018 Springer. pp. 611-628 https://doi.org/10.1007/978-3-030-01950-1_36
Attack trees in Isabelle extended with probabilities for Quantum Cryptography
Kammueller, F. 2019. Attack trees in Isabelle extended with probabilities for Quantum Cryptography. Computers and Security. 87. https://doi.org/10.1016/j.cose.2019.101572
Discovering the most important data quality dimensions in health big data using latent semantic analysis
Juddoo, S. and George, C. 2018. Discovering the most important data quality dimensions in health big data using latent semantic analysis. 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD). Durban, South Africa 06 - 07 Aug 2018 IEEE. https://doi.org/10.1109/ICABCD.2018.8465129
Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases
Jusob, F., George, C. and Mapp, G. 2017. Exploring the need for a suitable privacy framework for mHealth when managing chronic diseases. Journal of Reliable Intelligent Environments. 3 (4), pp. 243-256. https://doi.org/10.1007/s40860-017-0049-7
Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics
Windridge, D. and Kammueller, F. 2020. Edit distance Kernelization of NP theorem proving for polynomial-time machine learning of proof heuristics. FICC 2019: Future of Information and Communications Conference. San Francisco, USA 14 - 15 Mar 2019 Springer. pp. 271-283 https://doi.org/10.1007/978-3-030-12385-7_22
Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems
Kammueller, F. 2018. Formal modeling and analysis of data protection for GDPR compliance of IoT healthcare systems. IEEE SMC 2018: IEEE International Conference on Systems, Man and Cybernetics. Miyazaki, Japan 08 - 10 Oct 2018 Institute of Electrical and Electronics Engineers (IEEE).
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
Data governance in the health industry: investigating data quality dimensions within a big data context
Juddoo, S., George, C., Duquenoy, P. and Windridge, D. 2018. Data governance in the health industry: investigating data quality dimensions within a big data context. Applied System Innovation. 1 (4), pp. 1-16. https://doi.org/10.3390/asi1040043
A proof calculus for attack trees in Isabelle
Kammueller, F. 2017. A proof calculus for attack trees in Isabelle. 12th International Workshop on Data Privacy Management (DPM 2017). Oslo, Norway 14 - 15 Sep 2017 Springer. pp. 3-18 https://doi.org/10.1007/978-3-319-67816-0_1
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Developing a comprehensive information security framework for mHealth: a detailed analysis
Vithanwattana, N., Mapp, G. and George, C. 2017. Developing a comprehensive information security framework for mHealth: a detailed analysis. Journal of Reliable Intelligent Environments. 3 (1), pp. 21-39. https://doi.org/10.1007/s40860-017-0038-x
Model based analysis of insider threats
Chen, T., Han, T., Kammueller, F., Nemli, I. and Probst, C. 2016. Model based analysis of insider threats. 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). London, United Kingdom 13 - 14 Jun 2016 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CyberSecPODS.2016.7502350
Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle
Kammueller, F., Augusto, J. and Jones, S. 2017. Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle. IEEE/ACIS 15th International Conference on Software Engineering Research, Management and Application, SERA2017. University of Greenwich, London, United Kingdom 07 - 09 Jun 2017 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/SERA.2017.7965758
Formal modeling and analysis with humans in infrastructures for IoT health care systems
Kammueller, F. 2017. Formal modeling and analysis with humans in infrastructures for IoT health care systems. 5th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2017. Vancouver, BC, Canada 09 - 14 Jul 2017 Springer. pp. 339-352 https://doi.org/10.1007/978-3-319-58460-7_24
Human centric security and privacy for the IoT using formal techniques
Kammueller, F. 2018. Human centric security and privacy for the IoT using formal techniques. 3rd International Conference on Human Factors in Cybersecurity. Los Angeles, CA, United States 17 - 21 Jul 2017 Springer. pp. 106-116 https://doi.org/10.1007/978-3-319-60585-2_12
Insider threats for auctions: formalization, mechanized proof, and code generation
Kammueller, F., Kerber, M. and Probst, C. 2017. Insider threats for auctions: formalization, mechanized proof, and code generation. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). 8 (1), pp. 44-78. https://doi.org/10.22667/JOWUA.2017.03.31.044
Modeling and verification of insider threats using logical analysis
Kammueller, F. and Probst, C. 2017. Modeling and verification of insider threats using logical analysis. IEEE Systems Journal. 11 (2), pp. 534-545. https://doi.org/10.1109/JSYST.2015.2453215
Towards formal analysis of insider threats for auctions
Kammueller, F., Kerber, M. and Probst, C. 2016. Towards formal analysis of insider threats for auctions. ACM-CCS Workshop on Management of Security of Insider Threats. Vienna, Austria 28 Oct 2016 Association for Computing Machinery (ACM). pp. 23-34 https://doi.org/10.1145/2995959.2995963
Isabelle Modelchecking for insider threats
Kammueller, F. 2016. Isabelle Modelchecking for insider threats. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 196-210 https://doi.org/10.1007/978-3-319-47072-6_13
Refactoring preserves security
Kammueller, F. 2016. Refactoring preserves security. 11th DPM International Workshop on Data Privacy Management (DPM 2016) co-located with ESORICS 2016. Heraklion, Crete, Greece 26 - 27 Sep 2016 Springer. pp. 238-245 https://doi.org/10.1007/978-3-319-47072-6_17
Verification of statecharts using data abstraction
Helke, S. and Kammueller, F. 2016. Verification of statecharts using data abstraction. International Journal of Advanced Computer Science and Applications. 7 (1), pp. 571-583. https://doi.org/10.14569/IJACSA.2016.070179
Formal modelling and analysis of socio-technical systems
Probst, C., Kammueller, F. and Hansen, R. 2016. Formal modelling and analysis of socio-technical systems. in: Semantics, Logics, and Calculi Springer International.
Attack tree analysis for insider threats on the IoT using Isabelle
Kammueller, F., Nurse, J. and Probst, C. 2016. Attack tree analysis for insider threats on the IoT using Isabelle. 4th International Conference on Human Aspects of Security, Privacy and Trust, HCII-HAS 2016. Toronto, ON, Canada 17 - 24 Jul 2016 Springer International. pp. 234-246 https://doi.org/10.1007/978-3-319-39381-0_21
Investigating airplane safety and security against insider threats using logical modeling
Kammueller, F. and Kerber, M. 2016. Investigating airplane safety and security against insider threats using logical modeling. 2016 IEEE Security and Privacy Workshops SPW'16: Workshop on Research in Insider Threats WRIT'16. San Jose, CA, USA 22 - 26 May 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 304-313 https://doi.org/10.1109/SPW.2016.47
Secure refactoring with Java information flow
Helke, S., Kammueller, F. and Probst, C. 2016. Secure refactoring with Java information flow. 10th International Workshop on Data Privacy Management (DPM 2015). Vienna, Austria 21 - 22 Sep 2015 Springer. pp. 264-272 https://doi.org/10.1007/978-3-319-29883-2_19
Transforming graphical system models to graphical attack models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2016. Transforming graphical system models to graphical attack models. 2nd International Workshop on Graphical Models for Security, GraMSec 2015, co-located with CSF2015. Verona, Italy 13 Jul 2015 Springer. pp. 82-96 https://doi.org/10.1007/978-3-319-29968-6_6
Attack tree generation by policy invalidation
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2015. Attack tree generation by policy invalidation. 9th WISTP International Conference on Information Security Theory and Practice (WISTP 2015). Heraklion, Crete, Greece 24 - 25 Aug 2015 Springer. pp. 249-259 https://doi.org/10.1007/978-3-319-24018-3_16
Formalization of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2015. Formalization of quantum protocols using Coq. The 12th International Workshop on Quantum Physics and Logic (QPL 2015). Oxford, United Kingdom 15 - 17 Jul 2015 pp. 71-83
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2013. Invalidating policies using structural information. IEEE CS Security and Privacy Workshops, SPW, WRIT'13.
Network information flow control: proof of concept
Alghothami, A. and Kammueller, F. 2013. Network information flow control: proof of concept. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 2957-2962 https://doi.org/10.1109/SMC.2013.504
Privacy analysis of a hidden friendship protocol
Kammueller, F. and Preibusch, S. 2013. Privacy analysis of a hidden friendship protocol. The 8th International Workshop on Data Privacy Management, DPM 2013. Egam, UK 12 - 13 Sep 2013 Springer. pp. 83-99
Externalizing behaviour for analysing system models
Ivanova, M., Probst, C., Hansen, R. and Kammueller, F. 2013. Externalizing behaviour for analysing system models. 5th International Workshop on Managing Insider Security Threats, MIST, 2013..
Verification of quantum protocols using Coq
Boender, J., Kammueller, F. and Nagarajan, R. 2014. Verification of quantum protocols using Coq. 17th Conference on Quantum Information Processing (QIP). Barcelona, Spain 03 - 07 Feb 2014
Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013.
Kammueller, F. 2014. Reviews for the American Mathematical Society (AMS): Paul Howells, Mark d’Inverno. Specifying termination in CSP. Theoretical Computer Science, 503:31–61, 2013. MathSciNet: Mathematical Reviews.
Combining generated data models with formal invalidation for insider threat analysis
Kammueller, F. and Probst, C. 2014. Combining generated data models with formal invalidation for insider threat analysis. 2014 IEEE Security and Privacy Workshops (SPW): Workshop on Research for Insider Threat (WRIT 2014). San Jose, California, USA 17 - 18 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 229-235 https://doi.org/10.1109/SPW.2014.45
Verification of DNSsec delegation signatures
Kammueller, F. 2014. Verification of DNSsec delegation signatures. 21st International IEEE Conference on Telecommunication. Lisbon 04 - 07 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-392 https://doi.org/10.1109/ICT.2014.6845127
Invalidating policies using structural information
Kammueller, F. and Probst, C. 2014. Invalidating policies using structural information. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 5 (2), pp. 59-79. https://doi.org/10.22667/JOWUA.2014.06.31.059
Modeling human behaviour with higher order logic: insider threats
Boender, J., Kammueller, F., Ivanova, M. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust. Vienna Technical University, Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 31-39
A probabilistic analysis framework for malicious insider threats
Chen, T., Kammueller, F., Nemli, I. and Probst, C. 2015. A probabilistic analysis framework for malicious insider threats. 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, HAS 2015, held as part of HCI International 2015. Los Angeles, California, USA 02 - 07 Aug 2015 Springer. pp. 178-189
Confinement for active objects
Kammueller, F. 2015. Confinement for active objects. International Journal of Advanced Computer Science and Applications. 6 (2), pp. 246-261. https://doi.org/10.14569/IJACSA.2015.060236
Modeling human behaviour with higher order logic: insider threats
Boender, J., Ivanova, M., Kammueller, F. and Primiero, G. 2014. Modeling human behaviour with higher order logic: insider threats. 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014). Vienna, Austria 18 Jul 2014 Institute of Electrical and Electronics Engineers. pp. 31-39 https://doi.org/10.1109/STAST.2014.13
Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know
Sallavaci, O. and George, C. 2013. Procedural aspects of the new regime for the admissibility of expert evidence: what the digital forensic expert needs to know. International Journal of Electronic Security and Digital Forensics. 5 (3/4), pp. 161-171. https://doi.org/10.1504/IJESDF.2013.058645
New admissibility regime for expert evidence: the likely impact on digital forensics
Sallavaci, O. and George, C. 2013. New admissibility regime for expert evidence: the likely impact on digital forensics. International Journal of Electronic Security and Digital Forensics. 5 (1), pp. 67-79. https://doi.org/10.1504/IJESDF.2013.054420
The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union
George, C. 2013. The Internet and pharmaceutical drugs in the era of interoperable eHealth systems across the European Union. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 135-164
Assessing legal, ethical and governance challenges in eHealth
George, C., Whitehouse, D. and Duquenoy, P. 2013. Assessing legal, ethical and governance challenges in eHealth. in: George, C., Whitehouse, D. and Duquenoy, P. (ed.) eHealth: Legal, Ethical and Governance Challenges Berlin, Germany Springer. pp. 3-22
DNSsec in Isabelle – replay attack and origin authentication
Kammueller, F., Kirsal-Ever, Y. and Cheng, X. 2013. DNSsec in Isabelle – replay attack and origin authentication. SMC 2013: IEEE International Conference on Systems, Man, and Cybernetics. Manchester, UK 13 - 16 Oct 2013 IEEE. pp. 4772-4777 https://doi.org/10.1109/SMC.2013.812
A semi-lattice model for multi-lateral security
Kammueller, F. 2013. A semi-lattice model for multi-lateral security. in: Data privacy management and autonomous spontaneous security Berlin, Germany Springer.
A security model for functional active objects
Kammueller, F. 2012. A security model for functional active objects. Francisco, C., Kim, V., Miguel, C. and Andreas, K. (ed.) First International Symposium Communicability, Computer Graphics and Innovative Design for Interactive Systems (CCGIDIS 2011). Berlin Springer. https://doi.org/10.1007/978-3-642-33760-4_4
A security model for functional active objects with an implementation in Erlang
Fleck, A. and Kammueller, F. 2011. A security model for functional active objects with an implementation in Erlang. in: Ficarra, F., Kratky, A., Veltman, K., Ficarra, M., Nicol, E. and Brie, M. (ed.) Computational informatics, social factors and new information technologies: hypermedia perspectives and avant-garde experiences in the era of communicability expansion Bergamo, Italy Blue Herons.
Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol.
Kammueller, F., Mapp, G., Patel, S. and Sani, A. 2012. Engineering security protocols with modelchecking – Radius-SHA256 and secured simple protocol. International Conference on Internet Monitoring and Protection (ICIMP 2012). Stuttgart, Germany 27 May - 01 Jun 2012 Xpert Publishing Service.
Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011
Kammueller, F. 2012. Review for the American Mathematical Society (AMS): A. Francalanza et al. Permission-based separation logic for message-passing concurrency. Logical methods in computer science, 7: 1-47, 2011. Mathematical Reviews.
Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010.
Kammueller, F. 2012. Reviews for the American Mathematical Society (AMS): Russell O’Connor. Classical mathematics for a constructive world. MSCS (21): 861–882, Cambridge University Press. 2010. Mathematical Reviews.
A locally nameless theory of objects
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. A locally nameless theory of objects. SAFA Annual Workshop on Formal Techniques (SAFA’2010). 2229 Route des Crêtes, 06560, Valbonne, Provence-Alpes-Côte d'Azur, France
Locally nameless sigma calculus
Henrio, L., Kammueller, F., Lutz, B. and Sudhof, H. 2010. Locally nameless sigma calculus. Archive of Formal Proof.
Formalizing statecharts using hierarchical automata
Helke, S. and Kammueller, F. 2010. Formalizing statecharts using hierarchical automata. Archive of Formal Proof.
Radius-SHA256 – verified remote authentication with secure hashing.
Kammueller, F. and Patel, S. 2011. Radius-SHA256 – verified remote authentication with secure hashing. First Global Conference on Communication, Science and Information Engineering, CCSIE’11. Middlesex University 25 - 27 Jul 2011
ASPfun: a typed functional active object calculus
Henrio, L., Kammueller, F. and Lutz, B. 2012. ASPfun: a typed functional active object calculus. Science of Computer Programming. 77 (7-8), pp. 823-847. https://doi.org/10.1016/j.scico.2010.12.008
Application of verification techniques to security: model checking insider attacks
Kammueller, F., Probst, C. and Raimondi, F. 2012. Application of verification techniques to security: model checking insider attacks. 1st International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2012): New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy 28 - 29 Mar 2012 Blue Herons editions.
eHealth: legal, ethical and governance challenges: an overview.
Whitehouse, D., George, C. and Duquenoy, P. 2011. eHealth: legal, ethical and governance challenges: an overview. Med-e-Tel 2011. Luxembourg 06 - 08 Apr 2011
Modelchecking non-functional requirements for interface specifications.
Kammueller, F. and Preibusch, S. 2008. Modelchecking non-functional requirements for interface specifications. European Joint Conference on Theory and Practice of Software, 2008, (Foundations of Interface technologies). Budapest 29 Mar - 06 Apr 2008
Compositionality of aspect weaving.
Kammueller, F. and Sudhof, H. 2008. Compositionality of aspect weaving. in: Mahr, B. and Sheng, H. (ed.) Autonomous systems: self-organisation, management, and control. Springer Verlag. pp. 87-96
Interactive theorem proving in software engineering.
Kammueller, F. 2008. Interactive theorem proving in software engineering. Saarbrücken, Germany VDM Verlag Dr. Mueller.
Using functional active objects to enforce privacy
Kammueller, F. 2010. Using functional active objects to enforce privacy. 5th Conference on Network Architectures and Information Systems Security. Menton, France 18 - 21 May 2010
Enhancing privacy implementations of database enquiries
Kammueller, F. and Kammueller, R. 2009. Enhancing privacy implementations of database enquiries. IEEE. pp. 45-50 https://doi.org/10.1109/ICIMP.2009.15
Implementing privacy with Erlang active objects
Fleck, A. and Kammueller, F. 2010. Implementing privacy with Erlang active objects. International Conference on Internet Monitoring and Protection. Barcelona 09 - 15 May 2010 IEEE. pp. 141-146 https://doi.org/10.1109/ICIMP.2010.27
Privacy by flexible parameterization with Erlang active objects.
Fleck, A. and Kammueller, F. 2010. Privacy by flexible parameterization with Erlang active objects. International Journal on Advances in Software. 3 (3-4), pp. 461-473.
Functional active objects: typing and formalisation
Henrio, L. and Kammueller, F. 2009. Functional active objects: typing and formalisation. Elsevier. https://doi.org/10.1016/j.entcs.2009.10.026
Feature link propagation across variability representations with Isabelle/HOL
Kammueller, F., Rein, A. and Reiser, M. 2010. Feature link propagation across variability representations with Isabelle/HOL. Rubin, J., Botterweck, G., Mezini, M., Maman, I. and Lero, A. (ed.) New York Association for Computing Machinery (ACM). pp. 48-53
Checking the TWIN elevator system by translating object-Z to SMV
Preibusch, S. and Kammueller, F. 2008. Checking the TWIN elevator system by translating object-Z to SMV. Lecture Notes in Computer Science. 4916, pp. 38-55. https://doi.org/10.1007/978-3-540-79707-4
Composing safely: a type system for aspects
Kammueller, F. and Sudhof, H. 2008. Composing safely: a type system for aspects. Lecture Notes in Computer Science. 4954, pp. 231-247. https://doi.org/10.1007/978-3-540-78789-1_18
Security analysis of private data enquiries in Erlang
Kammueller, F. and Kammueller, R. 2009. Security analysis of private data enquiries in Erlang. International Journal on Advances in Security. 2 (2&3), pp. 242-255.
An asynchronous distributed component model and its semantics
Henrio, L., Kammueller, F. and Rivera, M. 2009. An asynchronous distributed component model and its semantics. Lecture Notes in Computer Science. 5751, pp. 159-179. https://doi.org/10.1007/978-3-642-04167-9_9
A framework for reasoning on component composition
Henrio, L., Kammueller, F. and Khan, M. 2010. A framework for reasoning on component composition. Lecture Notes in Computer Science. 6286, pp. 1-20. https://doi.org/10.1007/978-3-642-17071-3_1
Formalizing non-interference for a simple bytecode language in Coq
Kammueller, F. 2008. Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing. 20 (3), pp. 259-275.
Mechanical analysis of finite idempotent relations
Kammueller, F. 2011. Mechanical analysis of finite idempotent relations. Fundamenta Informaticae. 107 (1), pp. 43-65. https://doi.org/10.3233/FI-2011-392
Privacy enforcement and analysis for functional active objects
Kammueller, F. 2011. Privacy enforcement and analysis for functional active objects. Lecture Notes in Computer Science. 6514, pp. 93-107. https://doi.org/10.1007/978-3-642-19348-4_8
Electronic medical records: addressing privacy & security concerns in the UK and US
George, C. and Berčič, B. 2009. Electronic medical records: addressing privacy & security concerns in the UK and US. BILETA 2009 - To Infinity and Beyond: Law and Technology in Harmony?. University of Winchester, UK 21 - 23 Apr 2009
Illegal activities, preventative technologies & ISP immunity: where should the buck stop?
George, C. 2008. Illegal activities, preventative technologies & ISP immunity: where should the buck stop? BILETA 2008: the 23rd annual conference. Glasgow Caledonian University 27 - 28 Mar 2008
Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information
George, C. 2007. Regulatory challenges in the era of the convergence of telecommunications, broadcasting and information. 15th Telecommunications Forum, TELFOR 2007. Belgrade, Serbia 20 - 22 Nov 2007
Legal challenges of cybercrime
George, C. 2007. Legal challenges of cybercrime. 15th Telecommunications Forum, TELFOR 2007. Sava Centre, Belgrade, Serbia 20 - 22 Nov 2007
Players’ image management in the UK football industry
Futre, D., George, C. and Coathup, R. 2007. Players’ image management in the UK football industry. 15th Congress of the European Sports Management Association (EASM 2007). Torino, Italy 12 - 15 Sep 2007
Data protection: peeking over the study cubicle online!
George, C. 2005. Data protection: peeking over the study cubicle online! JISClegal: Legal Issues of Online Learning Environments.. University of Warwick, UK 01 - 02 Jun 2005 pp. 4-5
Online healthcare: internet pharmacies may not be good for your health
George, C. 2005. Online healthcare: internet pharmacies may not be good for your health. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. Netherlands Springer.
Copyright management systems: assessing the power balance.
George, C. 2005. Copyright management systems: assessing the power balance. in: Zielinski, C., Duquenoy, P. and Kimppa, K. (ed.) The information society: emerging landscapes: IFIP International Conference on Landscapes of ICT and Social Accountability, Turku, Finland, June 27-29, 2005. New York Springer.
Pursuing electronic health: a UK primary health care perspective
Ndeti, M. and George, C. 2005. Pursuing electronic health: a UK primary health care perspective. in: Funabashi, M. and Grzech, A. (ed.) Challenges of expanding Internet: e-commerce, e-business, and e-government: 5th IFIP Conference on e-Commerce, e-Business, and e-Government (13E'2005), October 28-30, 2005, Poznan, Poland. New York Springer.
Challenges of identity theft in the information society.
Jahankhani, H. and George, C. 2008. Challenges of identity theft in the information society. in: Kiekegaard, S. (ed.) Synergies and conflicts in cyberlaw. International Association of IT Lawyers. pp. 42-51
Ethical, legal and social issues in medical informatics.
Duquenoy, P., George, C. and Kimppa, K. 2008. Ethical, legal and social issues in medical informatics. Hershey, PA. Medical Information Science Reference.
Compiling medical data into national medical databases: legitimate practice or data protection concern?
Berčič, B. and George, C. 2008. Compiling medical data into national medical databases: legitimate practice or data protection concern? in: Duquenoy, P., George, C. and Kimppa, K. (ed.) Ethical, legal and social issues in medical informatics Hershey, PA. Medical Information Science Reference. pp. 228-247
Managing social irresponsibility in cyberspace: the walled garden approach
George, C. 2008. Managing social irresponsibility in cyberspace: the walled garden approach. The 11th International Symposium - Management and Social Responsibility, (SymOrg2008). Belgrade, Serbia 10 - 13 Sep 2008
Issues and challenges in securing interoperability of DRM systems in the digital music market
George, C. and Chandak, N. 2006. Issues and challenges in securing interoperability of DRM systems in the digital music market. International Review of Law Computers and Technology. 20 (3), pp. 271-285. https://doi.org/10.1080/13600860600852143
Web 2.0 and user-generated content: legal challenges in the new frontier.
George, C. and Skerri, J. 2007. Web 2.0 and user-generated content: legal challenges in the new frontier. Journal of Information, Law and Technology.
Internet pharmacies: global threat requires a global approach to regulation.
George, C. 2006. Internet pharmacies: global threat requires a global approach to regulation. Hertfordshire law journal. 4 (1), pp. 12-25.
Identifying personal data using relational database design principles
Berčič, B. and George, C. 2009. Identifying personal data using relational database design principles. International Journal of Law and Information Technology. 17 (3), pp. 233-251. https://doi.org/10.1093/ijlit/ean007
Investigating the legal protection of data, information and knowledge under the EU data protection regime
Berčič, B. and George, C. 2009. Investigating the legal protection of data, information and knowledge under the EU data protection regime. International Review of Law Computers and Technology. 23 (3), pp. 189-201. https://doi.org/10.1080/13600860903262255
Information systems failures: whose responsibility?
Georgiadou, E. and George, C. 2006. Information systems failures: whose responsibility? in: Dawson, R. (ed.) Learning and teaching issues in software quality [INSPIRE XI] Swindon British Computer Society.
Online medical consultations: are we heading in the right direction?
George, C. and Duquenoy, P. 2005. Online medical consultations: are we heading in the right direction? Ethicomp 2005, Looking back to the future. Linköping, Sweden. 12 - 15 Sep 2005
Exploring legal & ethical aspects of IPR management in e-learning
George, C., Duquenoy, P. and Middlesex Univerity: School of computing science 2007. Exploring legal & ethical aspects of IPR management in e-learning. London School of Computing Science, Middlesex University.
Online medical consultations: legal, ethical and social perspectives
George, C. and Duquenoy, P. 2008. Online medical consultations: legal, ethical and social perspectives. in: Duquenoy, P., George, C. and Kimppa, K. (ed.) Ethical, legal, and social issues in medical informatics Medical Information Science Reference.
ICT in medicine and health care: assessing social, ethical and legal issues.
Duquenoy, P., George, C., Colliste, G., Hedstrom, K., Kimppa, K. and Mordini, E. 2006. ICT in medicine and health care: assessing social, ethical and legal issues. in: Berleur, J., Markku, I. and Nurminen, J. (ed.) Social informatics: an information society for all? In remembrance of Rob Kling: proceedings of the seventh international conference on human choice and computers (HCC7). Boston IFIP Press.
Managing IPR in a successful e-learning enterprise: the global campus, Middlesex University, UK
Bacsich, P., Duquenoy, P., George, C., Weldon, J., Bakry, W., Davis, G. and Middlesex Univerity: School of computing science 2006. Managing IPR in a successful e-learning enterprise: the global campus, Middlesex University, UK. in: Proceedings of the IPR in E-learning Workshop/Conference 21st March, 2006. London School of Computing Science, Middlesex University.
Considering something ELSE: ethical, legal and socio-economic factors in medical imaging and medical informatics
Duquenoy, P., George, C. and Solomonides, A. 2008. Considering something ELSE: ethical, legal and socio-economic factors in medical imaging and medical informatics. Computer Methods and Programs in Biomedicine. 92 (3), pp. 227-237. https://doi.org/10.1016/j.cmpb.2008.06.001
What ELSE? Regulation and compliance in medical imaging and medical informatics
Duquenoy, P., George, C. and Solomonides, A. 2008. What ELSE? Regulation and compliance in medical imaging and medical informatics. Gao, X., Müller, H., Loomes, M., Comley, R. and Luo, S. (ed.) International Conference on Medical Imaging and Informatics (MIMI 2007). Beijing, China 14 - 16 Aug 2007 Berlin Springer. pp. 340-357 https://doi.org/10.1007/978-3-540-79490-5_41