![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler
This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...
-
Chapter and Conference Paper
AU2EU: Privacy-Preserving Matching of DNA Sequences
Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...
-
Chapter and Conference Paper
What Websites Know About You
The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...
-
Chapter and Conference Paper
Towards Trustworthy Health Platform Cloud
To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...
-
Chapter and Conference Paper
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...
-
Chapter and Conference Paper
Purpose Control: Did You Process the Data for the Intended Purpose?
Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: ...
-
Chapter and Conference Paper
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2...
-
Chapter and Conference Paper
User-Attributed Rights in DRM
Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper pre...
-
Chapter and Conference Paper
Privacy-Preserving Digital Rights Management
DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is...