Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 82) Show all publications
Fernández, S., Bodin, U. & Synnes, K. (2025). A Framework for Sustainable and Fair Demand-Supply Matchmaking Through Auctioning. Sustainability, 17(2), Article ID 572.
Open this publication in new window or tab >>A Framework for Sustainable and Fair Demand-Supply Matchmaking Through Auctioning
2025 (English)In: Sustainability, E-ISSN 2071-1050, Vol. 17, no 2, article id 572Article in journal (Refereed) Published
Abstract [en]

Environmental sustainability and fairness in auction systems are becoming increasingly important as systems evolve with the integration of digital technologies. This paper introduces a novel demand-supply matchmaking (DSM) framework designed to improve fairness and sustainability in auction environments, aligning with the principles of the circular economy. The framework addresses key challenges in supply chain management, such as equitable resource distribution and the reduction of environmental footprints. The framework integrates key aspects of environmental impact assessments, fairness assessments, and behavioral analytics. This enables the simulation of bidder behavior and assessment of auction scenarios. Our simulation results demonstrate that the platform can promote sustainable, fair, and informed auction practices. By comparing our approach with existing tools, we highlight the advantages of using the DSM framework to improve sustainability and fairness in digital marketplaces. This work supports the development of platforms that integrate economic efficiency with environmental responsibility and social equity.

Place, publisher, year, edition, pages
Multidisciplinary Digital Publishing Institute (MDPI), 2025
Keywords
environmental impact, auction systems, fairness, behavioral analytics, CO2 emissions. sustainable auctioning
National Category
Economics Transport Systems and Logistics Computer Sciences
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-111492 (URN)10.3390/su17020572 (DOI)001406259300001 ()2-s2.0-85215793576 (Scopus ID)
Note

Validerad;2025;Nivå 2;2025-03-12 (u5);

Full text license: CC BY 4.0;

Funder: European Union (101138627);

Available from: 2025-02-07 Created: 2025-02-07 Last updated: 2025-10-21Bibliographically approved
Sissodiya, A., Chiquito, E., Bodin, U. & Kristiansson, J. (2025). Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters. IEEE Access, 13, 141798-141813
Open this publication in new window or tab >>Formal Verification for Preventing Misconfigured Access Policies in Kubernetes Clusters
2025 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 13, p. 141798-141813Article in journal (Refereed) Published
Abstract [en]

Kubernetes clusters now underpin the bulk of modern production workloads, recent 2024 Cloud Native Computing Foundation surveys report >96% enterprise adoption, stretching from 5G edge nodes and AI/ML pipelines to heavily-regulated fintech and healthcare back-ends. Every action in those environments funnels through the API server, so a single access-control slip can jeopardise an entire fleet. Yet most deployments still rely on a patchwork of Role-Based Access Control (RBAC) rules and policy-as-code admission controllers such as OPA Gatekeeper or Kyverno. In practice these controls are brittle: minor syntactic oversights, wildcard privileges, or conflicting rules can silently create privilege-escalation paths that elude linters and manual review. This paper presents a framework that models both RBAC and admission policies as first-order logic and uses an SMT solver to exhaustively search for counter-examples to stated security invariants before policies reach the cluster. The approach detects policy conflicts, unreachable denies, and unintended permissions. Three real-world case studies are presented to illustrate how the framework reveals latent misconfigurations and validates the soundness of the corrected rules. These case studies include a supply-chain image bypass, an RBAC “shadow-admi” escalation, and a multi-tenant namespace breach. To aid replication and further study, we release a fully scripted GitHub testbed: a Minikube cluster, AuthzForce PDP, admission-webhook adapter, and Z3-backed CLI that recreates each scenario and verifies policies end-to-end. While the framework does not address runtime threats, it closes a critical verification gap and substantially raises the bar for attackers targeting the most widely deployed orchestration platform. 

Place, publisher, year, edition, pages
IEEE, 2025
Keywords
Attribute-based access control, cloud-native security, formal verification, kubernetes, policy-as-code, role-based access control, SMT solvers
National Category
Computer Sciences
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-114384 (URN)10.1109/access.2025.3597504 (DOI)001551612200016 ()2-s2.0-105013194144 (Scopus ID)
Projects
Green Transition North (GTN)Digitala Stambanan IndTechRemaNet
Funder
EU, Horizon Europe, 101138627European Regional Development Fund (ERDF)Norrbotten County CouncilLuleå University of TechnologyVinnova, 2024-02510
Note

Validerad;2025;Nivå 2;2025-11-04 (u4);

Funder: Skellefteå Municipality;

Full text license: CC BY

Available from: 2025-08-21 Created: 2025-08-21 Last updated: 2025-12-11Bibliographically approved
Sissodiya, A., Bodin, U. & Schelén, O. (2025). Objective-and Utility-Based Negotiation for Access Control. In: Roberto Di Pietro; Karen Renaud; Paolo Mori (Ed.), Proceedings of the 11th International Conference on Information Systems Security and Privacy: . Paper presented at 11th International Conference on Information Systems Security and Privacy, Porto, Portugal, February 20-22, 2025 (pp. 493-501). Science and Technology Publications, Lda, 2
Open this publication in new window or tab >>Objective-and Utility-Based Negotiation for Access Control
2025 (English)In: Proceedings of the 11th International Conference on Information Systems Security and Privacy / [ed] Roberto Di Pietro; Karen Renaud; Paolo Mori, Science and Technology Publications, Lda , 2025, Vol. 2, p. 493-501Conference paper, Published paper (Refereed)
Abstract [en]

Access control in modern digital ecosystems is challenging due to dynamic resources and diverse stakeholders. Traditional mechanisms struggle to adapt, causing inefficiencies and inequities. We propose a novel algorithm that automates access control policy negotiation via objective optimization and utility-based methods. It enables stakeholders to jointly select policies aligned with their preferences, provided a suitable policy exists. Suggested criteria guide the evaluation of predefined policies, and a mathematical formulation quantifies stakeholder preferences with utility functions, using optimization to achieve consensus. The algorithm’s multilinear scalability is demonstrated through time and space complexity analysis. An evaluation tool supports practical testing, and the approach enhances efficiency and trust by ensuring equitable data access within digital ecosystems.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2025
Series
ICISSP, ISSN 2184-4356
Keywords
Negotiation, Access Control, Automation, Digital Ecosystems, Stakeholder Collaboration, Interoperability
National Category
Electrical Engineering, Electronic Engineering, Information Engineering Computer and Information Sciences
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-112436 (URN)10.5220/0013130000003899 (DOI)2-s2.0-105001734630 (Scopus ID)
Conference
11th International Conference on Information Systems Security and Privacy, Porto, Portugal, February 20-22, 2025
Funder
European Regional Development Fund (ERDF)Norrbotten County CouncilLuleå University of Technology
Note

Funder: Skellefteå Municipality; Digitala Stambanan IndTech;

ISBN for host publication: 978-989-758-735-1;

Full text license: CC BY-NC-ND

Available from: 2025-04-16 Created: 2025-04-16 Last updated: 2025-12-11Bibliographically approved
Fernandez, S., Bodin, U. & Synnes, K. (2025). On the Interplay Between Behavior Dynamics, Environmental Impacts, and Fairness in the Digitalized Circular Economy with Associated Business Models and Supply Chain Management. Sustainability, 17(8), Article ID 3437.
Open this publication in new window or tab >>On the Interplay Between Behavior Dynamics, Environmental Impacts, and Fairness in the Digitalized Circular Economy with Associated Business Models and Supply Chain Management
2025 (English)In: Sustainability, E-ISSN 2071-1050, Vol. 17, no 8, article id 3437Article, review/survey (Refereed) Published
Abstract [en]

In contemporary research, the digital transformation of industries and societies has increased the importance of interdisciplinary exploration, particularly when addressing the complex challenges faced by modern organizations and social systems. From the perspective of digitalization, this literature review examines the intricate interactions between three key research domains: behavior dynamics, environmental impact, and fairness. By reviewing a wide range of studies and methodologies, it reveals new insights, challenges, and opportunities that arise at the intersection and through the interdependencies of these areas within digital ecosystems. Through a structured approach covering preliminary background, state-of-the-art methods, and comprehensive analysis, this document seeks to reveal the synergies and divergences among these domains. Special emphasis is placed on their implications in the digitalization of modern circular economy, business models, and supply chain management contexts where these domains converge in meaningful ways. Additionally, through an extensive review of the existing literature, this document highlights the current state of research and identifies notable gaps. These include issues such as ensuring fairness in digitalized sustainable strategies, understanding the role of digital behavior dynamics in promoting environmental management, and managing environmental impacts in new digitally driven business models. By weaving together these diverse elements, this work offers a novel perspective, emphasizing the importance of collaborative and integrative research in shaping a sustainable and equitable digital future.

Place, publisher, year, edition, pages
Multidisciplinary Digital Publishing Institute (MDPI), 2025
Keywords
fairness, environmental impact, behavior dynamics, circular economy, supply-chain management, business models, digital transformation
National Category
Information Systems, Social aspects Business Administration
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-112657 (URN)10.3390/su17083437 (DOI)001475820800001 ()2-s2.0-105003665038 (Scopus ID)
Note

Validerad;2025;Nivå 2;2025-05-14 (u2);

Full text: CC BY license;

Funder: European Union, RemaNet project (grant number 101138627);

Available from: 2025-05-14 Created: 2025-05-14 Last updated: 2025-10-21Bibliographically approved
Kerl, M., Bodin, U. & Schelén, O. (2025). Privacy-preserving attribute-based access control using homomorphic encryption. Cybersecurity, 8, Article ID 5.
Open this publication in new window or tab >>Privacy-preserving attribute-based access control using homomorphic encryption
2025 (English)In: Cybersecurity, E-ISSN 2523-3246, Vol. 8, article id 5Article in journal (Refereed) Published
Abstract [en]

Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. In some situations, making access decisions requires using user information, thereby challenging their privacy. Attribute-based access control (ABAC) supports dynamic and context-aware access decisions that are attractive in cyber-physical system environments. However, privacy preservation for access decisions is an open issue for authorization and is not supported by existing ABAC models. For example, if access decisions need to be made based on private attribute values such as health data, the corresponding access control policies need to be revealed. This paper reviews the ABAC, homomorphic encryption (HE), and zero-knowledge proof (ZKP) approaches, confirming the gap in privacy preservation in ABAC. Based on this observation, we further present the application of a new ZKP-based protocol in which ABAC allows for the privacy-preserving evaluation of attributes. This protocol is implemented and evaluated in terms of its performance and security. The evaluation demonstrates that there is a possibility for privacy-preserving ABAC, which may benefit the use of CPS, e.g., in underground and open-pit mines.

Place, publisher, year, edition, pages
BioMed Central (BMC), 2025
Keywords
Non-interactive zero knowledge proof, Privacy preservation, Authentication, Confdentiality, Cyber security, Data protection
National Category
Computer Sciences
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-111811 (URN)10.1186/s42400-024-00323-8 (DOI)001401218500001 ()2-s2.0-85218130923 (Scopus ID)
Funder
EU, Horizon Europe, 101091885
Note

Validerad;2025;Nivå 1;2025-03-03 (u8);

Full text license: CC BY

Available from: 2025-03-03 Created: 2025-03-03 Last updated: 2025-10-21Bibliographically approved
Araujo, A., Borngrund, C., Bodin, U., Schelen, O. & Zeitler, E. (2025). Terrain Issue Detection for Servitization of Autonomous Lawn Mowing. In: Luis Almeida, Marina Indria Mario de Sousa, Antonio Visioli, Mohammad Ashjaei, Pedro Santos (Ed.), 2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation, ETFA 2025: Proceedings. Paper presented at IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA), September 9-12, 2025, Porto, Portugal. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Terrain Issue Detection for Servitization of Autonomous Lawn Mowing
Show others...
2025 (English)In: 2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation, ETFA 2025: Proceedings / [ed] Luis Almeida, Marina Indria Mario de Sousa, Antonio Visioli, Mohammad Ashjaei, Pedro Santos, Institute of Electrical and Electronics Engineers Inc. , 2025Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2025
Series
IEEE International Conference on Emerging Technologies and Factory Automation, E-ISSN 1946-0759
National Category
Robotics and automation
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-115568 (URN)10.1109/ETFA65518.2025.11205594 (DOI)2-s2.0-105021800476 (Scopus ID)
Conference
IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA), September 9-12, 2025, Porto, Portugal
Note

ISBN for host publication: 979-8-3315-5383-8;

Funder: AIMS5.0 project (Chips JU grant 101112089);

Available from: 2025-11-26 Created: 2025-11-26 Last updated: 2025-11-26Bibliographically approved
Fink, C., Bodin, U. & Schelén, O. (2025). Why decision support systems are needed for addressing the theory-practice gap in assembly line balancing. Journal of manufacturing systems, 79, 515-527
Open this publication in new window or tab >>Why decision support systems are needed for addressing the theory-practice gap in assembly line balancing
2025 (English)In: Journal of manufacturing systems, ISSN 0278-6125, E-ISSN 1878-6642, Vol. 79, p. 515-527Article in journal (Refereed) Published
Abstract [en]

The efficiency of an assembly line depends on how the work is distributed along the line. This is known as the Assembly Line Balancing Problem, an NP-hard optimization problem. Automatic solvers for this problem have been studied for decades but have not been widely adopted in the industry, resulting in a theory-practice gap. The typical automation approach assumes that all constraints and objectives are known and can be statically defined ahead of time such that solvers with a precisely defined objective function can take a fully specified problem instance as input and produce a (near) optimal solution as output. In some industries, meeting these assumptions is particularly challenging because of properties such as mixed-model production with high model variance, multi-manned stations, large task graphs, etc. This paper explains why, in certain industries, such as automotive end assembly, complete automation is likely infeasible in practice due to challenges in modeling the problem, collecting data, and specifying the objective function. Manual intervention by an engineer as a decision-maker is therefore unavoidable. We argue that maximizing automation, by helping the decision-maker be as effective as possible, requires a decision support system (DSS) that supports an interactive and iterative workflow, thereby enabling assisted planning. Furthermore, we identify solver features that become relevant in the DSS context, thus making the case that focusing on standalone solvers, and treating the integration into a DSS as an implementation detail, is not a viable option. We conclude that decision support systems play a central role in closing the theory-practice gap.

Place, publisher, year, edition, pages
Elsevier, 2025
Keywords
Assembly line balancing, Decision support systems, Theory-practice gap, Rebalancing, Collaborative intelligence, Automotive industry
National Category
Computer Sciences Production Engineering, Human Work Science and Ergonomics
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-109997 (URN)10.1016/j.jmsy.2025.01.019 (DOI)001433886800001 ()2-s2.0-85217801633 (Scopus ID)
Funder
Vinnova, 2021-05071, 2023-00970, 2023-00450
Note

Validerad;2025;Nivå 2;2025-02-26 (u2);

Funder: KDT JU grant 2023-000450;

Full text: CC BY license;

This article has previously appeared as a manuscript in a thesis.

Available from: 2024-09-16 Created: 2024-09-16 Last updated: 2025-10-21Bibliographically approved
Borngrund, C., Bodin, U., Andreasson, H. & Sandin, F. (2024). Automating the Short-Loading Cycle: Survey and Integration Framework. Applied Sciences, 14(11), Article ID 4674.
Open this publication in new window or tab >>Automating the Short-Loading Cycle: Survey and Integration Framework
2024 (English)In: Applied Sciences, ISSN 2076-3417, Vol. 14, no 11, article id 4674Article in journal (Refereed) Published
Abstract [en]

The short-loading cycle is a construction task where a wheel loader scoops material from a nearby pile in order to move that material to the tipping body of a dump truck. The short-loading cycle is a vital task performed in high quantities and is often part of a more extensive never-ending process to move material for further refinement. This, together with the highly repetitive nature of the short-loading cycle, makes it a suitable candidate for automation. However, the short-loading cycle is a complex task where the mechanics of the wheel loader together with the interaction between the wheel loader and the environment needs to be considered. This must be achieved while maintaining some productivity goal and, concurrently, minimizing the used energy. The main objective of this work is to analyze the short-loading cycle, assess the current state of research in this field, and discuss the steps required to progress towards a minimal viable product consisting of individual automation solutions that can perform the short-loading cycle well enough to be used by early adopters. This is achieved through a comprehensive literature study and consequent analysis of the review results. From this analysis, the requirements of an MVP are defined and some gaps which are currently hindering the realization of the MVP are presented.

Place, publisher, year, edition, pages
MDPI, 2024
Keywords
short-loading cycle, automation, wheel loader, construction, data-driven approaches
National Category
Robotics and automation Computer Sciences
Research subject
Cyber-Physical Systems; Machine Learning
Identifiers
urn:nbn:se:ltu:diva-101849 (URN)10.3390/app14114674 (DOI)001245643100001 ()2-s2.0-85195976956 (Scopus ID)
Note

Validerad;2024;Nivå 2;2024-07-05 (joosat);

Full text: CC BY License;

Funder: Sweden’s Innovation Agency (grant number 2021-05035);

This article has previously appeared as a manuscript in a thesis.

Available from: 2023-10-30 Created: 2023-10-30 Last updated: 2025-10-21Bibliographically approved
Sandin, F., Bodin, U., Lindgren, A. & Schelén, O. (2024). Digital Computing Continuum Abstraction for Neuromorphic Systems. In: 2024 International Conference on Neuromorphic Systems (ICONS): . Paper presented at 2024 International Conference on Neuromorphic Systems (ICONS), July 30 - August 02, 2024, Arlington, USA (pp. 177-184). IEEE
Open this publication in new window or tab >>Digital Computing Continuum Abstraction for Neuromorphic Systems
2024 (English)In: 2024 International Conference on Neuromorphic Systems (ICONS), IEEE, 2024, p. 177-184Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Neuromorphic computing, Continuum computing, Event-driven, Non–von Neumann, Interoperability, Microservices, Frugal artificial intelligence
National Category
Computer Sciences
Research subject
Machine Learning; Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-110952 (URN)10.1109/ICONS62911.2024.00033 (DOI)001462433900025 ()2-s2.0-85214661835 (Scopus ID)979-8-3503-6866-6 (ISBN)979-8-3503-6865-9 (ISBN)
Conference
2024 International Conference on Neuromorphic Systems (ICONS), July 30 - August 02, 2024, Arlington, USA
Funder
Vinnova, 2023-01363The Kempe Foundations, JCSMKJF23-0003
Note

ISBN for host publication: 979-8-3503-6865-9;

Funder: Jubileumsfonden (LTU-1855-2023);

Available from: 2024-12-04 Created: 2024-12-04 Last updated: 2025-11-28Bibliographically approved
Chiquito, E., Bodin, U., Schelén, O. & Monrat, A. A. (2024). Digitalized and Decentralized Open-Cry Auctioning: Key Properties, Solution Design, and Implementation. IEEE Access, 12, 64686-64700
Open this publication in new window or tab >>Digitalized and Decentralized Open-Cry Auctioning: Key Properties, Solution Design, and Implementation
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 64686-64700Article in journal (Refereed) Published
Abstract [en]

Open-cry electronic auctions have revolutionized the landscape of high-value transactions for buying and selling goods. Online platforms such as eBay and Tradera have popularized these auctions due to their global accessibility and convenience. However, these centralized auctioning platforms rely on trust in a central entity to manage and control the processing of bids, e.g., the submission time and validity. The use of blockchain technologies for constructing decentralized systems has gained popularity for their versatility and useful properties toward decentralization. However, blockchain-based open-cry auctions, are sensitive to the order of transactions and deadlines which, in the absence of a governing party, need to be provided in the system design. In this paper, we identify the key properties for the development of decentralized open-cry auctioning systems, including verifiability, transaction immutability, ordering, and time synchronization. Three prominent blockchain platforms, namely, Ethereum, Hyperledger Fabric, and R3 Corda were analyzed in terms of their capabilities to ensure these properties for gap identification. We propose a solution design that addresses these key properties and presents a proof-of-concept (PoC) implementation of such design. Our PoC uses Hyperledger Fabric and mitigates the identified gaps related to the time synchronization of this system by utilizing an external component. During the chaincode execution, the creation and submission of bids initiate requests to the time service API. This API service retrieves trusted timestamps from NTP services to obtain accurate bid times. We then analyzed the system design and implementation in the context of the identified key properties. Lastly, we conducted a performance evaluation of the time service and the PoC system implementation in time-sensitive scenarios and assessed its overall performance.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Auctions, Blockchain, Blockchains, Decentralized systems, Distributed ledger, Fabrics, Iterative methods, Solution design, Synchronization, System implementation, Time synchronization
National Category
Computer Sciences Computer Systems Embedded Systems
Research subject
Cyber-Physical Systems; Cyber Security
Identifiers
urn:nbn:se:ltu:diva-105444 (URN)10.1109/ACCESS.2024.3395791 (DOI)001219245100001 ()2-s2.0-85192206856 (Scopus ID)
Projects
DigiPrimeRemaNet
Funder
EU, Horizon 2020, 873111EU, Horizon Europe, 101138627
Note

Validerad;2024;Nivå 2;2024-05-14 (hanlid);

Full text license: CC BY-NC-ND

Available from: 2024-05-14 Created: 2024-05-14 Last updated: 2025-10-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-5408-0008

Search in DiVA

Show all publications