Emmanuel Benoist

Emmanuel Benoist
Bern University of Applied Sciences | BFH · Department of Engineering and Information Technology

PhD

About

39
Publications
3,337
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
90
Citations
Additional affiliations
October 1999 - present
Bern University of Applied Sciences
Position
  • Professor (Full)
October 1999 - present
Bern University of Applied Sciences
Position
  • Professor (Full)
Description
  • Teaching computer science courses: Algorithmic and data structures (1999 -2007) Web Programming (1999- 2014) Assembly and C language programming (2014 - ) Web Programming with Java (2002 - )

Publications

Publications (39)
Book
Full-text available
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized u...
Chapter
Smart, networked medical devices play a rapidly growing role in healthcare. Those devices and their data have to be integrated into the healthcare system. There are several reasons to reuse those data for well-defined purposes by well-defined partners; this reuse should be controlled by the patient and not depend on the manufacturer infrastructure....
Chapter
The rise of internet of things (IoT) in medicine has generated tons of new data through connected devices. Medicine and research in medicine are interested in using those data for the personalization of patients' treatment. The authors present the system MIDATA where patients can transfer their medical IoT data and store them. They have also the po...
Data
Full-text available
Data
Full-text available
Conference Paper
The goal of some medical databases is not to support the actual treatment of individual patients, but to provide the platform for medical research. Health data collected in such databases have to be anynomized - they should be analyzed only statistically and should not permit to retrieve the patient’s identity. Medical data collected for research s...
Conference Paper
In the current trend towards the evidence based medicine we should not forget previously collected data, neither in hand-written records nor in legacy systems. In this paper we present a process to integrate the data gathered by therapeutic machines of our industrial partner used for treatment of neurological and orthopedic disorders. These devices...
Conference Paper
In this paper we discuss the privacy aware management of data streams generated by wireless sensor networks (WSN) in medical applications. Such data are primarily used to ensure the direct health support for a specific patient. They can also be used for other purposes, like quality assurance of applied devices and comparative evaluation research of...
Article
Full-text available
In this paper, the authors present a novel Web based architecture of a medical registry with enhanced protection of personal data of the patients. The goal of a medical registry is to gather experience from clinical practice concerning a disease or treatment e.g., hip replacement and to improve the future treatments by applying adequate methods and...
Conference Paper
The problem of data protection in medical research regards various communities, among them: patients, doctors, approval authorities, researchers, technology suppliers, privacy protectors and lawyers. Therefore it can be seen from many perspectives. In particular, it seems to be common to underestimate the inherent difficulty of obtaining the scient...
Article
Emerging Health Information Technologies (HIT) such as Electronic Health Record (EHR) and PHR systems and Heath Information Exchanges (HIEs) facilitate access to and sharing of patients' medical data distributed in different HIT systems. One of the many ...
Article
Pervasive computing systems will provoke a massive transformation of our civilization. Wireless sensor networks will permit to gather information about the world and to act on it at an unprecedentedly detailed level. Wearable or implanted devices will improve our health condition. But also less friendly applications are to be expected, like robot s...
Article
Wireless sensor networks permit to gather information about the world and to act on it at an unprecedentedly detailed level. They are transforming profoundly the way we live as individuals and interact with the society and our environment. In the medical context they can be used at following levels: (1) direct monitoring and supporting the health o...
Chapter
Full-text available
What is a virtual person? What is it used for? What is its added value? Virtual persons sometimes describe avatars and new forms of identities in online games. They also appear in other contexts; some authors use them in the legal domain. Within FIDIS, the concept of virtual person has been extended in order to better describe and understand new fo...
Technical Report
Full-text available
Status: [Final] Class: [Public] File: fidis-wp17-del17.1 Applicability_v1.0.doc Summary The objective of this document is to illustrate the applicability of the model based on virtual persons, model developed in FIDIS deliverable D2.13. First, typical use-cases are described using the model based on virtual persons as well as the traditional one-to...
Technical Report
Full-text available
In the present deliverable, we focus on the applicability of privacy models and review as well as illustrate the applicability of models from Deliverable D13.6 using a real-world example. Besides, we show some shortcomings of the approaches presented in D13.6 and include the aspects of combination of information and of misinformation, i.e., informa...
Chapter
Internet technology allows web site administrators to monitor users visiting their sites. In the beginning the basic protocol used for the web (http) did not consider the concept of a session. It was impossible to recognise whether two requests came from the same user. Developers then found ways to follow visitors and implemented logins and shoppin...
Conference Paper
During the last decade, Internet-voting (i-voting) moved from the field of fundamental research to practical application. First, we will see that theoretical research provides satisfying algorithms for some of the challenges raised by i-voting and that some real world experiments have already been developed and performed. Unfortunately, in current...
Technical Report
Full-text available
The objective of this deliverable is to provide a first attempt to answer the question whether citizens becomes more anonymous or more known by the government when digital identification and authentication technologies are applied in the process of public service provision. From a historical-philosophical and a sociological angle, arguments are bro...
Article
Full-text available
Depuis avril 2004, une équipe de chercheurs de la BFH est membre d'un programme de recherche de l'Union Européenne. Dans le cadre du "Network of Excellence" FIDIS, nous nous intéressons à l'avenir de l'identité dans notre société de l'information. Nous avons défini un nouveau type d'identité, se rapportant à des "personnes virtuelles". Une personne...
Book
Full-text available
This booklet is a high quality output for public diffusion. It aims to raise awareness and better understanding of identity issues using a set of very different cases, stories, scenarios and perspectives coming from very different fields of interest. It is based on several technically challenging contributions in FIDIS deliverable 2.2. Seven subjec...
Technical Report
Full-text available
The objective of this document is to propose a very concrete and multi-disciplinary presentation of identity issues via the provision of a series of cases, stories, scenarios and perspectives. Each of these cases, stories, etc, has been elaborated by a different member of the FIDIS consortium.
Technical Report
Full-text available
This document proposes an inventory of topics and clusters for the Identity domain, which focuses on the identification and definition of the principal concepts and terms that are used in this field. The objective is to provide to both the experts and the non-expert a vocabulary of well-defined terms facilitating the comprehension of the Identity d...
Article
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Hor...

Network

Cited By