Skip to main content
European Commission logo
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare

Leistungen

ASCLEPIOS Reference Architecture, Security and eHealth Use Cases, and Acceptance Criteria

Documentation of the overall architecture describing the main components and artefacts of ASCLEPIOS, the interconnection scheme and the specific interfaces for exchange of information among them will be designed and described in detail. Furthermore, a description of the security and eHealth use cases to be implemented and evaluated in WP6 will be described, as well as a suitable set of acceptance criteria for the validation of the mechanisms developed within ASCLEPIOS.

Data Owners' and Personal Health Data Privacy-Preserving Analytics

Documentation of the design and security techniques for computing on data distributed across multiple data custodians that protect privacy The techniques will be developed based on the use cases and the security and privacy requirements of the project

Design of protocols for key, firmware and workload management in ITEEs for medical devices

Document describing software and hardware features necessary to implement ITEEs that support efficient and scalable execution of workloads, isolated from powerful adversaries. This deliverable will further contain a set of protocols for key, firmware and workload management in ITEEs.

Remote attestation of workloads in ITEEs

This deliverable will contain a set of protocols for remote attestation of ITEEs on commodity platforms. Whenever a clear gap is identified, additional protocols will be developed based on security best practices and with a clear emphasis on robustness and scalability – two aspects that have not been sufficiently addressed by existing attestation protocols.

ASCLEPIOS Technical, Security, Healthcare and Data Privacy Requirements

Documentation of the technical and security requirements that will guide the development and will define the capabilities of the IT components of ASCLEPIOS. Furthermore, documentation of the specific requirements of participating healthcare organizations will be provided. This concrete list of requirements will also provide a complete strategy that will give valuable insights to healthcare organizations that wish to be GDPR compliant.

Final Project Exploitation and Sustainability Report

A report including all activities performed in Tasks T74 T75 and T77 during the second reporting period indicating the exploitation and business plan paths of the partners and the consortium as a whole as well as the sustainability strategy for the period after the projects completion

Attribute-Based Encryption, Dynamic Credentials and Ciphertext Delegation and Integration in Medical Devices

Overview of the existing Attribute-Based Encryption and Ciphertext Delegation schemes and analysis on how such schemes can help healthcare organizations to securely share data by also preserving users’ privacy. Finally, an analysis on how these schemes can be implemented in medical devices will be provided (i.e. devices with constraint resources).

Context-aware ABAC Enforcement Mechanism

This deliverable will provide and discuss all the software components designed for enabling the context-aware ABAC enforcement and raising the involved actors’ security awareness by indicating the logic of each authorization decision.

ASCLEPIOS Security and Policies Model

This deliverable will provide a model for formally capturing the background knowledge for enabling the ABAC and ABE paradigms, in terms of the ASCLEPIOS project, and it will also report on the semantics of context-based access control and ABE related policies.

ASCLEPIOS Models Editor and Interpretation Mechanism

This deliverable will report on the ASCLEPIOS’s policies editing and lifecycle management software components for ABAC and ABE in the healthcare application domain.

Technical Integration Points and Testing Plan

In-detail documentation of the technical architecture for the ASCLEPIOS platform and the detailed integration points among the framework's mechanisms. Documentation of an integration plan to guide the integration of the mechanisms of the ASCLEPIOS platform. In-detail documentation of the testing and evaluation plan to verify the proper functioning and performance of the integrated ASCLEPIOS platform.

Symmetric Searchable Encryption and Integration in Medical Devices

Documentation that reveals advantages and limitations of Symmetric Searchable Encryption schemes. Furthermore, a detailed analysis on how and under which conditions such schemes could be used by healthcare services will be provided.

Final Dissemination, Communication and Stakeholders' Activity Report

A report including all activities performed in Tasks T71 T72 T73 and T76 during the second reporting period

Interim Dissemination, Communication and Stakeholders’ Activity Report

An interim report including all activities performed in Tasks T7.1, T7.2, T7.3 and T7.6 during the first reporting period, and a plan for the second period of the project.

GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers

D2.3 will focus on the provision of a set of GDPR-compliant analytics that can offer analytics services to providers that have access to encrypted data. The deliverable will also report on investigated analytics techniques used by CSPs and Healthcare Providers in order to secure their infrastructures.

Plan for Project’s Dissemination, Communication and Stakeholder’s Plan

This deliverable is related to the provision of a detailed plan for all dissemination, standardisation and communication activities that will be scheduled for the 1st reporting period of the project.

Interoperability of ITEEs in the context of eHealth systems

This deliverable will contain a framework of components and enablers to facilitate the development of applications that are portable across ITEEs from different vendors and effectively address the security needs specific to the context of eHealth systems. The framework will be described through an open specification that will facilitate further development of the framework.

Report on Cloud Computing Testbed

This deliverable will describe the architecture, components and operational policies of the cloud computing testbed that will be set up to host the ASCLEPIOS applications and demonstrators.

Project Website and Web 2.0 Channels

This deliverable is related to the provision of the Website of the project and will set up all needed Web 2.0 and social channels that will be used during the project for communication.

Final Demonstrators

This deliverable will be a report and a set of final near production quality demonstrators describing and showcasing the three selected healthcare applications on the final version of the ASCLEPIOS Integrated Platform The deliverable will also report on the operation experiences of the cloud testbed and its applications

Early Prototype Demonstrators

This deliverable will be a report and a set of early demonstrators describing and showcasing the three selected healthcare applications on the first prototype of the ASCLEPIOS Integrated Platform

ASCLEPIOS Integrated Platform - Early Release

Early release of the integrated ASCLEPIOS Platform that constitutes the main result of the ASCLEPIOS project Moreover documentation regarding the development and integration of the ASCLEPIOS Platform

ASCLEPIOS Integrated Platform - Final Release

Final release of the integrated ASCLEPIOS Platform that constitutes the main result of the ASCLEPIOS project Moreover documentation regarding the development and integration of the platform including an engineers installation and utilization guidelines manual will be provided Finally the documentation of the evaluation of the technical testing of the integrated ASCLEPIOS Platform and the software quality assurance processes tools and activities will be included

Veröffentlichungen

Attestation Waves: Platform Trust via Remote Power Analysis

Autoren: Delgado-Lozano, Ignacio M.; Martínez-Rodríguez, Macarena C.; Bakas, Alexandros; Brumley, Billy Bob; Michalas, Antonis
Veröffentlicht in: International Conference on Cryptology and Network Security, Ausgabe 7, 2021
Herausgeber: Springer

MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX

Autoren: A. Michalas, A. Bakas, H-V Dang , A. Zalitko
Veröffentlicht in: NordSec 2019: Secure IT Systems, 2019, Seite(n) 254-270, ISBN 978-3-030-35055-0
Herausgeber: Springer
DOI: 10.1007/978-3-030-35055-0_18

Industry Simulation Gateway on a Scalable Cloud

Autoren: Kovacs, J., Kiss, T., Taylor, S.J.E., Farkas, A, Anagnostou, A., Pattison, G, Emodi, M, Kite, S., Petry, J, Snookes, G, Kacsuk, P. and Lovas, R.
Veröffentlicht in: Proceedings of the 12th International Workshop on Science Gateways (IWSG 2020), 2020
Herausgeber: CEUR Workshop Proceedings

Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments

Autoren: Michalas, A., Kiss, T.
Veröffentlicht in: 2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020, ISSN 2158-8481
Herausgeber: IEEE
DOI: 10.1109/melecon48756.2020.9140712

Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care

Autoren: L. H. A. Reis, M. T. de Oliveira, D. M. F. Mattos, S. D. Olabarriaga
Veröffentlicht in: Proceedings of 2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS), 2021, Seite(n) 568-573, ISBN 978-1-6654-4121-6
Herausgeber: IEEE
DOI: 10.1109/cbms52027.2021.00039

Towards a Cloud Native Big Data Platform using MiCADO

Autoren: Mosa, A., Kiss, T., Pierantoni, G., DesLauriers, J., Kagialis, D., Terstyanszky, G.
Veröffentlicht in: Proceedings of 2020 19th International Symposium on Parallel and Distributed Computing (ISPDC), 2020, ISBN 978-1-7281-8946-8
Herausgeber: IEEE
DOI: 10.1109/ispdc51135.2020.00025

Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives

Autoren: Bakas, A., Michalas, A.
Veröffentlicht in: Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021, Seite(n) 1105-1112, ISSN 2324-898X
Herausgeber: IEEE
DOI: 10.1109/trustcom50675.2020.00146

Attribute-Based Symmetric Searchable Encryption

Autoren: Dang, H., Ullah, A., Bakas, A., & Michalas, A.
Veröffentlicht in: Proceedings of ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, 2020, ISBN 978-3-030-61638-0
Herausgeber: Springer
DOI: 10.1007/978-3-030-61638-0_18

On-demand Key Distribution for Cloud Networks

Autoren: N. Paladi, M. Tiloca, P. N. Bideh, M. Hell
Veröffentlicht in: 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2021, Seite(n) 80-82, ISBN 978-1-7281-7705-2
Herausgeber: IEEE
DOI: 10.1109/icin51074.2021.9385528

Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX

Autoren: A. Michalas, A. Bakas, H-V Dang, A. Zalitko
Veröffentlicht in: Proceedings of the 10th ACM Cloud Computing Security Workshop (CCSW) in Conjunction with ACM Conference on Computer and Communications Security (CCS’19), 2019
Herausgeber: ACM
DOI: 10.1145/3338466.3358929

Nowhere to Leak: A Multi-Client Forward and Backward Private Symmetric Searchable Encryption Scheme

Autoren: Bakas, A., Michalas, A.
Veröffentlicht in: Barker K., Ghazinour K. (eds) Data and Applications Security and Privacy XXXV. DBSec 2021, 2021, Seite(n) 84-95, ISBN 978-3-030-81242-3
Herausgeber: Springer
DOI: 10.1007/978-3-030-81242-3_5

ASCLEPIOS: Sharing and Analysing Healthcare Data in the Cloud with New Cryptographic Methods

Autoren: Krefting, D., Bowden, J., Michalas, A., Yitbarek Yigzaw, K., Y., Kiss, T., Penzel, T., Olabarriaga, S., D., Tuler de Oliveira, M., Verginadis, Y.
Veröffentlicht in: 65th Annual Meeting of the German Association for Medical Informatics, Biometry and Epidemiology (GMDS), Meeting of the Central European Network (CEN: German Region, Austro-Swiss Region and Polish Region) of the International Biometric Society (IBS), 2021
Herausgeber: GMS
DOI: 10.3205/20gmds163

Private Lives Matter: A Differential Private Functional Encryption Scheme

Autoren: Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
Veröffentlicht in: CODASPY '22: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy, 2022, Seite(n) 300-311, ISBN 9781450392204
Herausgeber: ACM
DOI: 10.1145/3508398.3511514

Science gateways with embedded ontology-based e-learning support

Autoren: Kiss, T., Bolotov, A.,Pierantoni, G., Deslauriers, J., Mosa, A.,Kagialis, D., Terstyanszky, G., & Chan, D.
Veröffentlicht in: Proceedings of the 12th International Workshop on Science Gateways (IWSG 2020), 2020
Herausgeber: CEUR Workshop Proceedings

Healthcare and data privacy requirements for health institution cloud infrastructures: a qualitative analysis of clinician perspectives

Autoren: Chomutare, T., Yigzaw, K. Y., Olabarriaga, S. D., Makhlysheva, A., Tuler de Oliveira, M., Silsand, L., Krefting, D., Penzel, T., Hillen, C., & Bellika, J. G.
Veröffentlicht in: Proceedings of 2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM), 2021, Seite(n) 1-8, ISBN 978-1-7281-6267-6
Herausgeber: IEEE
DOI: 10.1109/healthcom49281.2021.9399006

The lord of the shares - combining attribute-based encryption and searchable encryption for flexible data sharing

Autoren: Antonis Michalas
Veröffentlicht in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, Seite(n) 146-155, ISBN 9781-450359337
Herausgeber: ACM
DOI: 10.1145/3297280.3297297

Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices

Autoren: Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
Veröffentlicht in: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 2020, Seite(n) 119-129, ISBN 978-989-758-426-8
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009413801190129

Protecting OpenFlow Flow Tables with Intel SGX

Autoren: Nicolae Paladi, Jakob Svenningsson, Jorge Medina, Patrik Arlos
Veröffentlicht in: Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos on - SIGCOMM Posters and Demos '19, 2019, Seite(n) 146-147, ISBN 9781-450368865
Herausgeber: ACM Press
DOI: 10.1145/3342280.3342339

Protecting OpenFlow using Intel SGX

Autoren: Jorge Medina, Nicolae Paladiy, Patrik Arlosz
Veröffentlicht in: 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2019, Seite(n) 1-6, ISBN 978-1-7281-4545-7
Herausgeber: IEEE
DOI: 10.1109/nfv-sdn47374.2019.9039980

Red Alert: Break-Glass Protocol to Access Encrypted Medical Records in the Cloud

Autoren: Marcela Tuler de Oliveira, Antonis Michalas, Adrien E. D. Groot, Henk A. Marquering, Silvia Delgado Olabarriaga
Veröffentlicht in: 2019 IEEE International Conference on E-health Networking, Application & Services (HealthCom), 2019, Seite(n) 1-7, ISBN 978-1-7281-0402-7
Herausgeber: IEEE
DOI: 10.1109/healthcom46333.2019.9009598

A Secure Cloud-based Platform to Host Healthcare Applications

Autoren: Pierantoni, G., Kiss, T., Terstyanszky, G., Dang, H., Delgado Olabarriaga, S., Tuler de Olivera, M., Yigzaw, K. Y., Belika, J. G., Krefting, D. and Penzel, T
Veröffentlicht in: 11th International Workshop on Science Gateways, IWSG 2019, 2019
Herausgeber: IWSG 2019

A generic cloud-agnostic platform to support the execution of deadline-constrained workloads,

Autoren: Ullah, A., Deslauriers, J., Kiss, T
Veröffentlicht in: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020, 2020
Herausgeber: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries

Autoren: Baka, A.; Michalas, A.
Veröffentlicht in: Proceedings of the 25th IEEE International Conference on Communications (ISCC), 2019
Herausgeber: Proceedings of the 25th IEEE International Conference on Communications (ISCC)

A context-aware security model for a combination of attribute-based access control and attribute-based encryption in the healthcare domain

Autoren: Psarra, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Menztas, G.
Veröffentlicht in: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), 2020
Herausgeber: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)

Deploying and auto-scaling scientific applications in the cloud using Terraform and MiCADO

Autoren: Ariyattu, R. Deslauriers, J., Kiss T
Veröffentlicht in: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020, 2020
Herausgeber: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020

Securing Access to Healthcare Data with Context-aware Policies

Autoren: Psara, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Menztas, G
Veröffentlicht in: Proceedings of The 11th International Conference on Information, Intelligence, Systems and Applications (IISA 2020, 2020
Herausgeber: Proceedings of The 11th International Conference on Information, Intelligence, Systems and Applications (IISA 2020

Cryptography on Untrustworthy Cloud Storage for Healthcare Applications: A Performance Analysis

Autoren: Lúcio H A Reis, Marcela T. de Oliveira, James Bowden, Dagmar Krefting, Silvia D Olabarriga & Diogo M F Mattos
Veröffentlicht in: 2021 XI Brazilian Symposium on Computing Systems Engineering (SBESC), 2021, ISSN 2324-7894
Herausgeber: IEEE
DOI: 10.1109/sbesc53686.2021.9628260

Innovations in Simulation: Experiences With Cloud-Based Simulation Experimentation

Autoren: Simon J E Taylor, Anastasia Anagnostou, Nura Abubakar, Tamas Kiss, James Deslauriers, Gabor Terstyanszky, Peter Kacsuk, Jozsef Kovacs, Shane Kite, Gary Pattison, James Petry
Veröffentlicht in: Proceedings of 2020 Winter Simulation Conference (WSC), 2020
Herausgeber: IEEE
DOI: 10.1109/wsc48552.2020.9383971

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Autoren: Bakas, A., Michalas, A., Ullah, A.
Veröffentlicht in: Proceedings of 5th Nordic Conference, NordSec 2020, 2020, Seite(n) 111-126, ISBN 978-3-030-70852-8
Herausgeber: Springer
DOI: 10.1007/978-3-030-70852-8_7

Blind Faith: Privacy-Preserving Machine Learning Using Function Approximation

Autoren: Khan, T., Bakas, A., Michalas, A.
Veröffentlicht in: Proceedings of 2021 IEEE Symposium on Computers and Communications (ISCC), 2021, Seite(n) 1-7, ISSN 2642-7389
Herausgeber: IEEE
DOI: 10.1109/iscc53001.2021.9631509

Accessing electronic health records in criticalincidents using context-aware attribute-basedaccess control

Autoren: Evgenia Psarra, Yiannis Verginadis, Ioannis Patiniotakis, Dimitris Apostolou, Gregoris Mentzas
Veröffentlicht in: Intelligent Decision Technologies, Ausgabe 15, 2022, Seite(n) 667-679, ISSN 1872-4981
Herausgeber: IOS Press
DOI: 10.3233/idt-210214

Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review

Autoren: T. Tervoort, M. T. De Oliveira, W. Pieters, P. Van Gelder, S. D. Olabarriaga and H. Marquering
Veröffentlicht in: IEEE Access, Ausgabe 8, 2020, Seite(n) 84352-84361, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2984376

Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud

Autoren: Gabriele Pierantoni, Tamas Kiss, Gabor Terstyanszky, James Deslauriers, Gregoire Gesmier,Hai-Van Dang
Veröffentlicht in: Journal of Grid Computing, 2020, ISSN 1570-7873
Herausgeber: Kluwer Academic Publishers
DOI: 10.1007/s10723-020-09524-0

Privacy-preserving audit and feedback on the antibiotic prescribing of General Practitioners

Autoren: Kassaye Yitbarek Yigzaw, Taridzo Chomutare, Rolf Wynn, Gro Karine Rosvold Berntsen, Johan Gustav Bellika
Veröffentlicht in: JMIR Formative Research, 2022, ISSN 1438-8871
Herausgeber: Journal of medical Internet Research
DOI: 10.2196/31650

The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds

Autoren: ALEXANDROS BAKAS, HAI-VAN DANG, ANTONIS MICHALAS, ALEXANDR ZALITKO
Veröffentlicht in: IEEE Access, 2020, Seite(n) 210462-210477, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3038838

Cloud Apps To-Go: Cloud Portability with TOSCA and MiCADO

Autoren: Deslauriers, J., Kiss, T., Ariyattu, R., Dang, H-V., Ullah, A., Bowden, J., Krefting, D., Pierantoni, G., & Terstyanszky, G.
Veröffentlicht in: Concurrency and Computation: Practice and Experience, 2020, ISSN 1532-0634
Herausgeber: John Wiley & Sons
DOI: 10.1002/cpe.6093

Measuring success for a future vision: Defining impact in science gateways/virtual research environments

Autoren: Calyam, P., et al
Veröffentlicht in: Concurrency and Computation: Practice and Experience, 2021, ISSN 1532-0626
Herausgeber: John Wiley & Sons Inc.
DOI: 10.1002/cpe.6099

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Autoren: Ullah, A., Dagdeviren, H., Arjun, R., Deslauriers, J., Kiss, T., & Bowden, J.
Veröffentlicht in: Journal of Grid Computing, 2021, ISSN 1570-7873
Herausgeber: Kluwer Academic Publishers
DOI: 10.1007/s10723-021-09589-5

AC-AC: Dynamic revocable access control for acute care teams to access medical records

Autoren: Marcela T. de Oliveira, Hai-Van Dang, Lúcio H. A. Reis, Henk A. Marquering, Sílvia D. Olabarriaga
Veröffentlicht in: Smart Health, 2021, ISSN 2352-6483
Herausgeber: Elsevier
DOI: 10.1016/j.smhl.2021.100190

Test, Trace, and Put on the Blockchain?: A Viewpoint Evaluating the Use of Decentralized Systems for Algorithmic Contact Tracing to Combat a Global Pandemic

Autoren: Platt M, Hasselgren A, Román-Belmonte JM, Tuler de Oliveira M, De la Corte-Rodríguez H, Delgado Olabarriaga S, Rodríguez-Merchán EC, Mackey TK
Veröffentlicht in: JMIR Public Health and Surveillance, 2021, ISSN 2369-2960
Herausgeber: JMIR Publications
DOI: 10.2196/26460

A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud

Autoren: Marcela T. de Oliveira, Alexandros Bakas, Eugene Frimpong, Adrien E. D. Groot, Henk A. Marquering, Antonis Michalas, Silvia D. Olabarriaga
Veröffentlicht in: Annals of Telecommunications, Ausgabe 75/3-4, 2020, Seite(n) 103-119, ISSN 0003-4347
Herausgeber: Springer Verlag
DOI: 10.1007/s12243-020-00759-2

Network physiology in insomnia patients: Assessment of relevant changes in network topology with interpretable machine learning models

Autoren: Christoph Jansen, Thomas Penzel, Stephan Hodel, Stefanie Breuer, Martin Spott, Dagmar Krefting
Veröffentlicht in: Chaos: An Interdisciplinary Journal of Nonlinear Science, Ausgabe 29/12, 2019, Seite(n) 123129, ISSN 1054-1500
Herausgeber: American Institute of Physics
DOI: 10.1063/1.5128003

Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications

Autoren: """Marcela T. de Oliveira, Lúcio H. A. Reis Dianne S. V. Medeiros, Ricardo C. Carrano, Sílvia D. Olabarriaga, Diogo M.F. Mattos"""
Veröffentlicht in: Computer Networks, 2020, ISSN 1389-1286
Herausgeber: Elsevier BV
DOI: 10.1016/j.comnet.2020.107367

Health data security and privacy: Challenges and solutions for the future

Autoren: Kassaye Yitbarek Yigzaw, Sílvia Delgado Olabarriaga, Antonis Michalas, Luis Marco-Ruiz, Christiaan Hillen, Yiannis Verginadis, Marcela Tuler de Oliveira, Dagmar Krefting, Thomas Penzel, James Bowden, Johan Gustav Bellika, Taridzo Chomutare
Veröffentlicht in: In Roadmap to Successful Digital Health Ecosystems: A Global Perspective, 2022, Seite(n) 335-362, ISBN 978-0-12-823413-6
Herausgeber: Elsevier
DOI: 10.1016/b978-0-12-823413-6.00014-8

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX

Autoren: Alexandros Bakas, Antonis Michalas
Veröffentlicht in: Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II, Ausgabe 305, 2019, Seite(n) 472-486, ISBN 978-3-030-37230-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-37231-6_28

Privacy-preserving architecture for providing feedback to clinicians on their clinical performance

Autoren: Yigzaw K. Y., Budrionis A., Marco-Ruiz L., Henriksen T. D., Halvorsen P. A., Bellika J. G.
Veröffentlicht in: BMC Medical Informatics and Decision Making, 2020
Herausgeber: Springer Nature

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor