Secure Data Management
10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings
Article
In this study, we aimed to evaluate whether the encapsulation of ellagic acid (EA) into nanoliposomes would improve its potential in preventing cyclophosphamide-induced liver damage. Stability and antioxidativ...
Chapter
The advent of digital medical data has brought an exponential increase in information available for each patient, allowing for novel knowledge generation methods to emerge. Tap** into this data brings clinic...
Book and Conference Proceedings
Chapter and Conference Paper
This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...
Chapter and Conference Paper
Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...
Chapter and Conference Paper
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...
Chapter and Conference Paper
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of p...
Chapter and Conference Paper
The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...
Book and Conference Proceedings
Chapter and Conference Paper
Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solut...
Chapter
Advances in information and communication technologies are expected to bring large benefits in the healthcare domain. Personal telehealth is one such example that has the potential to address some of the impor...
Chapter and Conference Paper
Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attribute...
Chapter and Conference Paper
Innovation in information and communication technology has a great potential to create large impact on modern healthcare. However, for the new technologies to be adopted, the innovations have to be meaningful ...
Chapter and Conference Paper
To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...
Book and Conference Proceedings
8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings
Chapter and Conference Paper
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...
Chapter and Conference Paper
Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: ...
Book and Conference Proceedings
Chapter
There are several important trends in healthcare that call for the deployment of remote healthcare applications. It is expected that people will live longer and that chronic diseases, such as hypertension and ...
Book and Conference Proceedings