Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler

    This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...

    Willem Jonker, Milan Petković in Secure Data Management (2014)

  2. Chapter and Conference Paper

    AU2EU: Privacy-Preserving Matching of DNA Sequences

    Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...

    Tanya Ignatenko, Milan Petković in Information Security Theory and Practice. … (2014)

  3. No Access

    Chapter and Conference Paper

    What Websites Know About You

    The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...

    Elisa Costante, Jerry den Hartog in Data Privacy Management and Autonomous Spo… (2013)

  4. No Access

    Chapter and Conference Paper

    Towards Trustworthy Health Platform Cloud

    To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...

    Mina Deng, Marco Nalin, Milan Petković, Ilaria Baroni in Secure Data Management (2012)

  5. Chapter and Conference Paper

    Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

    In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...

    Muhammad Asim, Luan Ibraimi, Milan Petković in Communications and Multimedia Security (2011)

  6. No Access

    Chapter and Conference Paper

    Purpose Control: Did You Process the Data for the Intended Purpose?

    Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: ...

    Milan Petković, Davide Prandi, Nicola Zannone in Secure Data Management (2011)

  7. Chapter and Conference Paper

    The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers

    The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2...

    Anna Zych, Milan Petković, Willem Jonker in Data and Applications Security XXI (2007)

  8. No Access

    Chapter and Conference Paper

    User-Attributed Rights in DRM

    Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper pre...

    Milan Petković, R. Paul Koster in Digital Rights Management. Technologies, I… (2006)

  9. No Access

    Chapter and Conference Paper

    Privacy-Preserving Digital Rights Management

    DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is...

    Claudine Conrado, Milan Petković, Willem Jonker in Secure Data Management (2004)