3,115 Hits in 3.4 sec

A RESTful interface to pseudonymization services in modern web applications

Martin Lablans, Andreas Borg, Frank Ückert
2015 BMC Medical Informatics and Decision Making  
In this article, we propose a new RESTful pseudonymization interface tailored for use in web applications accessed by modern web browsers.  ...  Conclusion: The RESTful pseudonymization interface fits the requirements of web-based scenarios and allows building applications that make pseudonymization transparent to the user using ordinary web technology  ...  RESTful web service.  ... 
doi:10.1186/s12911-014-0123-5 pmid:25656224 pmcid:PMC4350982 fatcat:sjfb5arg2rf25drqf43lkyeoma

A generic solution for web-based management of pseudonymized data

Ronald Lautenschläger, Florian Kohlmayer, Fabian Prasser, Klaus A. Kuhn
2015 BMC Medical Informatics and Decision Making  
Security measures are multi-tier pseudonymity and physical separation of data over independent backend servers. Integrated views are provided by a web-based user interface.  ...  Neither the formulation in laws and regulations nor existing pseudonymization concepts, however, are precise enough to directly provide an implementation guideline.  ...  As a consequence, the backends only need to implement very little business logic. Access to backends is, e.g., provided via a Web Application Programming Interface (Web API).  ... 
doi:10.1186/s12911-015-0222-y pmid:26621059 pmcid:PMC4665916 fatcat:6ayseypmbfgkndygwca3gakbya

A Framework for Building Secure, Scalable, Networked Enclaves [article]

Philipp Winter, Ralph Giles, Alex Davidson, Gonçalo Pestana
2022 arXiv   pre-print
While their security properties are attractive, Nitro enclaves are difficult to write code for and are not meant to be used as a networked service, which greatly limits their potential.  ...  In this paper, we built a framework that allows for convenient and flexible use of Nitro enclaves by abstracting away complex aspects like remote attestation and end-to-end encryption between an enclave  ...  IP Address Pseudonymizer Our first application is the system that originally motivated us to build the enclave framework. Consider a service provider that offers various services to its users.  ... 
arXiv:2206.04123v1 fatcat:ja62jfophbawnfuc2cbacwtc5e

A Performant Web-Based Visualization, Assessment, and Collaboration Tool for Multidimensional Biosignals

Maximilian Beier, Thomas Penzel, Dagmar Krefting
2019 Frontiers in Neuroinformatics  
This paper introduces a new web-based application for interactive biosignal visualization and assessment. A focus has been placed on performance to allow for handling files of any size.  ...  The data can then be scored, annotated, pseudonymized and uploaded to a clinical data management system for further analysis. The data and all actions can be interactively shared with a second party.  ...  XNAT offers a comprehensive REST API, which makes it easy for other applications to interact with it over the web.  ... 
doi:10.3389/fninf.2019.00065 pmid:31607882 pmcid:PMC6769110 fatcat:owsntymqp5aw3n6jezsmq2gcwe

Development of a Web GIS for small-scale detection and analysis of COVID-19 (SARS-CoV-2) cases based on volunteered geographic information for the city of Cologne, Germany, in July/August 2020

Fabian Schmidt, Arne Dröge-Rothaar, Andreas Rienow
2021 International Journal of Health Geographics  
The aim of this study is to describe the development of a Web GIS based on open source products for the collection and analysis of COVID-19 cases and its feasibility in terms of technical implementation  ...  Background Various applications have been developed worldwide to contain and to combat the coronavirus disease-19 (COVID-19) pandemic.  ...  We are grateful for his advice and explanations regarding the technical implementation of the Web GIS and data protection issues.  ... 
doi:10.1186/s12942-021-00290-0 pmid:34454536 fatcat:uoxxs6xhsvbfpkhvjcmbcy6xna

A Truly Self-Sovereign Identity System [article]

Quinten Stokkink, Dick Epema, Johan Pouwelse
2020 arXiv   pre-print
No other work has offered an operational prototype of an academically pure identity solution without any trusted third parties, critical external services, or any server in general.  ...  Digital identity is essential to access services such as: online banking, income tax portals, and online higher education.  ...  party-a pseudonym in itself (forming a web of trust between pseudonyms).  ... 
arXiv:2007.00415v1 fatcat:jc4rtlzggrb4zhyfe7kkb56g3m

DACAR Platform for eHealth Services Cloud

L. Fan, W. Buchanan, C. Thummler, O. Lo, A. Khedim, O. Uthmani, A. Lawson, D. Bell
2011 2011 IEEE 4th International Conference on Cloud Computing  
To assess the viability and performance of the platform, a demonstration application, namely the Early Warning Score (EWS), has been developed and deployed within a private Cloud infrastructure at Edinburgh  ...  The use of digital technologies in providing health care services is collectively known as eHealth.  ...  RESTful web services [24] are proposed to allow a service consumer to send dynamic queries in JSON [27] or AtomPub [28] format to a service provider, to retrieve exactly the data that the consumer  ... 
doi:10.1109/cloud.2011.31 dblp:conf/IEEEcloud/FanBTLKULB11 fatcat:6g5bhjyto5e6vihcrgit2wvdby

Towards a Collection of Security and Privacy Patterns

Manos Papoutsakis, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, Konstantina Koloutsou
2021 Applied Sciences  
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services  ...  The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across  ...  significant improvements to all aspects of modern life.  ... 
doi:10.3390/app11041396 fatcat:hdxs2tza7nctdibrxicin6taii

Pseudonymization for research data collection: is the juice worth the squeeze?

Florian Kohlmayer, Ronald Lautenschläger, Fabian Prasser
2019 BMC Medical Informatics and Decision Making  
The collection of data and biospecimens which characterize patients and probands in-depth is a core element of modern biomedical research.  ...  In this context, laws, regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means that directly identifying data of subjects (e.g. names and addresses) is stored  ...  Acknowledgements The authors would like to thank Klaus A. Kuhn for many insightful discussions on the topic.  ... 
doi:10.1186/s12911-019-0905-x pmid:31484555 pmcid:PMC6727563 fatcat:m3gpyosiiraqzbuxbnma7uurmy

Integration of mathematical model predictions into routine workflows to support clinical decision making in haematology

Katja Hoffmann, Katja Cazemier, Christoph Baldow, Silvio Schuster, Yuri Kheifetz, Sibylle Schirm, Matthias Horn, Thomas Ernst, Constanze Volgmann, Christian Thiede, Andreas Hochhaus, Martin Bornhäuser (+5 others)
2020 BMC Medical Informatics and Decision Making  
Individualization and patient-specific optimization of treatment is a major goal of modern health care.  ...  One way to achieve this goal is the application of high-resolution diagnostics together with the application of targeted therapies.  ...  Transfer Application Programming Interfaces (REST APIs).  ... 
doi:10.1186/s12911-020-1039-x pmid:32041606 pmcid:PMC7011438 fatcat:xdanzhocl5gqxlncoxnyemurga

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  In fact, this module is basically used to create digital twins of sensors and objects; • PI Web API: the PI Web API is the access layer that provides a RESTful interface to the PI system.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

D3.4 - Guidelines and recommendations for data privacy in public administration

Ahmed Khalid, Hassan Mehmood, Marta Cortes, Thuy Truong, Jun Sun, Panos Kostakos
2020 Zenodo  
This deliverable summarizes the lessons learned from the CUTLER project in terms of data interoperability and privacy with the intention to formally submit this document as part of EU's regulations and  ...  APIs API stands for Application Programming Interface. It refers to a software interface that acts as an intermediary for any data request.  ...  Centralized encryption service: To enable high flexibility and security, a service similar to encryption zones in HDFS can be developed and deployed for all applications and services running in the platform  ... 
doi:10.5281/zenodo.4381954 fatcat:37db4dsr55f3nmefndrostcqum

PhenoMeNal: processing and analysis of metabolomics data in the cloud

Kristian Peters, James Bradbury, Sven Bergmann, Marco Capuccini, Marta Cascante, Pedro de Atauri, Timothy M D Ebbels, Carles Foguet, Robert Glen, Alejandra Gonzalez-Beltran, Ulrich L Günther, Evangelos Handakas (+44 others)
2018 GigaScience  
However, the rapid progress has resulted in a mosaic of independent, and sometimes incompatible, analysis methods that are difficult to connect into a useful and complete data analysis solution.  ...  Metabolomics is the comprehensive study of a multitude of small molecules to gain insight into an organism's metabolism.  ...  From a web-based portal, users can deploy the CRE, which includes several web services and software tools (Fig. 2 ).  ... 
doi:10.1093/gigascience/giy149 pmid:30535405 pmcid:PMC6377398 fatcat:srtrsdrzd5bitjztymyqy4nypy

Designing and piloting a generic research architecture and workflows to unlock German primary care data for secondary use

Thomas Bahls, Johannes Pung, Stephanie Heinemann, Johannes Hauswaldt, Iris Demmer, Arne Blumentritt, Henriette Rau, Johannes Drepper, Philipp Wieder, Roland Groh, Eva Hummers, Falk Schlegelmilch
2020 Journal of Translational Medicine  
Background Medical data from family doctors are of great importance to health care researchers but seem to be locked in German practices and, thus, are underused in research.  ...  Additionally, a Trusted Third Party-approach can be used as core element to implement data privacy protection in such heterogeneous family doctor's settings.  ...  We thank Jonas Hügel for his support in the development and implementation of the RADAR software.  ... 
doi:10.1186/s12967-020-02547-x pmid:33076938 fatcat:cagymtoefzg35m2q6xrrkzywwq

Privacy Enhanced Technologies: Methods – Markets – Misuse [chapter]

Hannes Federrath
2005 Lecture Notes in Computer Science  
Research in Privacy Enhancing Technologies has a tradition of about 25 years.  ...  The question arises if there is a market for Privacy Enhanced Technology. The answer is yes, however Privacy Enhancing Technology may not have been broadly known yet in order to make it profitable.  ...  Acknowledgements I'd like to thank Patrizia Buckel, Stefan Köpsell, Henry Krasemann and Wolfgang Pöppl for their help in providing and analysing the empirical data on JAP usage, Thomas Nowey for critically  ... 
doi:10.1007/11537878_1 fatcat:od4quubqbzfnzoa74hrvqit3wa
« Previous Showing results 1 — 15 out of 3,115 results