About
39
Publications
3,337
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
90
Citations
Introduction
Publications
Publications (39)
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized u...
Smart, networked medical devices play a rapidly growing role in healthcare. Those devices and their data have to be integrated into the healthcare system. There are several reasons to reuse those data for well-defined purposes by well-defined partners; this reuse should be controlled by the patient and not depend on the manufacturer infrastructure....
The rise of internet of things (IoT) in medicine has generated tons of new data through connected devices. Medicine and research in medicine are interested in using those data for the personalization of patients' treatment. The authors present the system MIDATA where patients can transfer their medical IoT data and store them. They have also the po...
The goal of some medical databases is not to support the actual treatment of individual patients, but to provide the platform for medical research. Health data collected in such databases have to be anynomized - they should be analyzed only statistically and should not permit to retrieve the patient’s identity. Medical data collected for research s...
In the current trend towards the evidence based medicine we should not forget previously collected data, neither in hand-written records nor in legacy systems. In this paper we present a process to integrate the data gathered by therapeutic machines of our industrial partner used for treatment of neurological and orthopedic disorders. These devices...
In this paper we discuss the privacy aware management of data streams generated by wireless sensor networks (WSN) in medical applications. Such data are primarily used to ensure the direct health support for a specific patient. They can also be used for other purposes, like quality assurance of applied devices and comparative evaluation research of...
In this paper, the authors present a novel Web based architecture of a medical registry with enhanced protection of personal data of the patients. The goal of a medical registry is to gather experience from clinical practice concerning a disease or treatment e.g., hip replacement and to improve the future treatments by applying adequate methods and...
The problem of data protection in medical research regards various communities, among them: patients, doctors, approval authorities, researchers, technology suppliers, privacy protectors and lawyers. Therefore it can be seen from many perspectives. In particular, it seems to be common to underestimate the inherent difficulty of obtaining the scient...
Emerging Health Information Technologies (HIT) such as Electronic Health Record (EHR) and PHR systems and Heath Information Exchanges (HIEs) facilitate access to and sharing of patients' medical data distributed in different HIT systems. One of the many ...
Pervasive computing systems will provoke a massive transformation of our civilization. Wireless sensor networks will permit to gather information about the world and to act on it at an unprecedentedly detailed level. Wearable or implanted devices will improve our health condition. But also less friendly applications are to be expected, like robot s...
Wireless sensor networks permit to gather information about the world and to act on it at an unprecedentedly detailed level. They are transforming profoundly the way we live as individuals and interact with the society and our environment. In the medical context they can be used at following levels: (1) direct monitoring and supporting the health o...
What is a virtual person? What is it used for? What is its added value?
Virtual persons sometimes describe avatars and new forms of identities in online games. They also appear in other contexts; some authors use them in the legal domain. Within FIDIS, the concept of virtual person has been extended in order to better describe and understand new fo...
Status: [Final] Class: [Public] File: fidis-wp17-del17.1 Applicability_v1.0.doc Summary The objective of this document is to illustrate the applicability of the model based on virtual persons, model developed in FIDIS deliverable D2.13. First, typical use-cases are described using the model based on virtual persons as well as the traditional one-to...
In the present deliverable, we focus on the applicability of privacy models and
review as well as illustrate the applicability of models from Deliverable D13.6
using a real-world example. Besides, we show some shortcomings of the
approaches presented in D13.6 and include the aspects of combination of
information and of misinformation, i.e., informa...
Internet technology allows web site administrators to monitor users visiting their sites. In the beginning the basic protocol
used for the web (http) did not consider the concept of a session. It was impossible to recognise whether two requests came from the same user. Developers then found ways to follow visitors
and implemented logins and shoppin...
During the last decade, Internet-voting (i-voting) moved from the field of fundamental research to practical application. First, we will see that theoretical research provides satisfying algorithms for some of the challenges raised by i-voting and that some real world experiments have already been developed and performed.
Unfortunately, in current...
The objective of this deliverable is to provide a first attempt to answer the question whether citizens becomes more anonymous or more known by the government when digital identification and authentication technologies are applied in the process of public service provision. From a historical-philosophical and a sociological angle, arguments are bro...
Depuis avril 2004, une équipe de chercheurs de la BFH est membre d'un programme de recherche de l'Union Européenne. Dans le cadre du "Network of Excellence" FIDIS, nous nous intéressons à l'avenir de l'identité dans notre société de l'information. Nous avons défini un nouveau type d'identité, se rapportant à des "personnes virtuelles". Une personne...
This booklet is a high quality output for public diffusion.
It aims to raise awareness and better understanding of identity issues using a set of very different cases, stories, scenarios and perspectives coming from very different fields of interest.
It is based on several technically challenging contributions in FIDIS deliverable 2.2. Seven subjec...
The objective of this document is to propose a very concrete and multi-disciplinary presentation of identity issues via the provision of a series of cases, stories, scenarios and perspectives.
Each of these cases, stories, etc, has been elaborated by a different member of the FIDIS consortium.
This document proposes an inventory of topics and clusters for the Identity domain, which focuses on the identification and definition of the principal concepts and terms that are used in this field.
The objective is to provide to both the experts and the non-expert a vocabulary of well-defined terms facilitating the comprehension of the Identity d...
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Hor...