![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
AU2EU: Privacy-Preserving Matching of DNA Sequences
Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...
-
Chapter and Conference Paper
Hunting the Unknown
Data leakage causes significant losses and privacy breaches worldwide. In this paper we present a white-box data leakage detection system to spot anomalies in database transactions. We argue that our approach rep...
-
Chapter and Conference Paper
Data Leakage Quantification
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of p...
-
Chapter and Conference Paper
Impact of ICT on Home Healthcare
Innovation in information and communication technology has a great potential to create large impact on modern healthcare. However, for the new technologies to be adopted, the innovations have to be meaningful ...
-
Chapter and Conference Paper
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...
-
Chapter and Conference Paper
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2...
-
Chapter and Conference Paper
Cryptographically Enforced Personalized Role-Based Access Control
The present paper addresses privacy and security enhancements to a basic role-based access control system. The contribution is twofold. First, the paper presents an approach to personalized access control, i.e...