Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Nanoliposome-encapsulated ellagic acid prevents cyclophosphamide-induced rat liver damage

    In this study, we aimed to evaluate whether the encapsulation of ellagic acid (EA) into nanoliposomes would improve its potential in preventing cyclophosphamide-induced liver damage. Stability and antioxidativ...

    Nenad Stojiljković, Sonja Ilić, Nikola Stojanović in Molecular and Cellular Biochemistry (2019)

  2. No Access

    Chapter

    Data Science in Healthcare: Benefits, Challenges and Opportunities

    The advent of digital medical data has brought an exponential increase in information available for each patient, allowing for novel knowledge generation methods to emerge. Tap** into this data brings clinic...

    Ziawasch Abedjan, Nozha Boujemaa, Stuart Campbell in Data Science for Healthcare (2019)

  3. No Access

    Book and Conference Proceedings

    Secure Data Management

    10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings

    Willem Jonker, Milan Petković in Lecture Notes in Computer Science (2014)

  4. No Access

    Chapter and Conference Paper

    Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler

    This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...

    Willem Jonker, Milan Petković in Secure Data Management (2014)

  5. Chapter and Conference Paper

    AU2EU: Privacy-Preserving Matching of DNA Sequences

    Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...

    Tanya Ignatenko, Milan Petković in Information Security Theory and Practice. … (2014)

  6. Chapter and Conference Paper

    Hunting the Unknown

    Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...

    Elisa Costante, Jerry den Hartog in Data and Applications Security and Privacy… (2014)

  7. Chapter and Conference Paper

    Data Leakage Quantification

    The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of p...

    Sokratis Vavilis, Milan Petković in Data and Applications Security and Privacy… (2014)

  8. No Access

    Chapter and Conference Paper

    What Websites Know About You

    The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...

    Elisa Costante, Jerry den Hartog in Data Privacy Management and Autonomous Spo… (2013)

  9. No Access

    Book and Conference Proceedings

    Secure Data Management

    9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings

    Willem Jonker, Milan Petković in Lecture Notes in Computer Science (2012)

  10. No Access

    Chapter and Conference Paper

    Measuring Privacy Compliance Using Fitness Metrics

    Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solut...

    Sebastian Banescu, Milan Petković, Nicola Zannone in Business Process Management (2012)

  11. No Access

    Chapter

    eConsent Management and Enforcement in Personal Telehealth

    Advances in information and communication technologies are expected to bring large benefits in the healthcare domain. Personal telehealth is one such example that has the potential to address some of the impor...

    Muhammad Asim, Paul Koster, Milan Petković in ISSE 2012 Securing Electronic Business Pr… (2012)

  12. No Access

    Chapter and Conference Paper

    An Encryption Scheme for a Secure Policy Updating

    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attribute...

    Luan Ibraimi, Muhammad Asim, Milan Petković in e-Business and Telecommunications (2012)

  13. Chapter and Conference Paper

    Impact of ICT on Home Healthcare

    Innovation in information and communication technology has a great potential to create large impact on modern healthcare. However, for the new technologies to be adopted, the innovations have to be meaningful ...

    Sokratis Vavilis, Milan Petković in ICT Critical Infrastructures and Society (2012)

  14. No Access

    Chapter and Conference Paper

    Towards Trustworthy Health Platform Cloud

    To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...

    Mina Deng, Marco Nalin, Milan Petković, Ilaria Baroni in Secure Data Management (2012)

  15. No Access

    Book and Conference Proceedings

    Secure Data Management

    8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings

    Willem Jonker, Milan Petković in Lecture Notes in Computer Science (2011)

  16. Chapter and Conference Paper

    Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme

    In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...

    Muhammad Asim, Luan Ibraimi, Milan Petković in Communications and Multimedia Security (2011)

  17. No Access

    Chapter and Conference Paper

    Purpose Control: Did You Process the Data for the Intended Purpose?

    Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: ...

    Milan Petković, Davide Prandi, Nicola Zannone in Secure Data Management (2011)

  18. No Access

    Book and Conference Proceedings

    Secure Data Management

    7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings

    Willem Jonker, Milan Petković in Lecture Notes in Computer Science (2010)

  19. No Access

    Chapter

    Towards Reliable Remote Healthcare Applications Using Combined Fuzzy Extraction

    There are several important trends in healthcare that call for the deployment of remote healthcare applications. It is expected that people will live longer and that chronic diseases, such as hypertension and ...

    Jorge Guajardo, Muhammad Asim, Milan Petković in Towards Hardware-Intrinsic Security (2010)

  20. No Access

    Book and Conference Proceedings

    Secure Data Management

    6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings

    Willem Jonker, Milan Petković in Lecture Notes in Computer Science (2009)

previous disabled Page of 3