SlideShare a Scribd company logo
1 of 18
Download to read offline
Ā 	
 Ā 
Guidelines for the technological
development in the e-health
application domain 
Ivano Malavolta
UniversitĆ  degli Studi dellā€™Aquila
Introduction

Great progress in the health sector applied to












 etc.







However, the health sector currently lags behind other sectors in
the use of advanced data management software Ć ļƒ  there is great
potential for rapid, sustained growth
image acquisition
image elaboration
 robotics
Introduction

The E-Health Technology project focusses on






Remote assistance via mobile devices
Modernization of business processes 
Design of new services in the cloud
Introduction

The role of University of Lā€™Aquila in the project
Research
Prototypes
development
Research actions
State of the art
Architectural
solutions
Introduction

In this talk we will present the main solutions for architecting an
e-health software system in terms of its
Security engineering 
Reliability assurance
etc.
Data management infrastructure
Ā 	
 Ā 
Remainder of the talk

ā€¢ā€Æ Introduction
ā€¢ā€Æ Cloud computing
ā€¢ā€Æ User authentication
ā€¢ā€Æ User authorization
ā€¢ā€Æ Data encryption
ā€¢ā€Æ Sensitive data separation
ā€¢ā€Æ Conclusions
Cloud computing


The use of computing power that is located ā€œelsewhereā€Ć ļƒ  in the cloud

Advantages:

no infrastructure
elasticity
low risk
Cloud computing


Challenges in the e-health application domain:
Who can enter the system?
Who can do what in the system?
Who can read my data?
Where is my data?
User authentication


Strong authentication is mandatory
ā€¢ā€Æ one possible implementation: two-factor + challenge-response
Something you know
 Something you have
ex. username and password
 ex. card or security token
+
OATH1


Open standard for the interoperability of authentication methods
ā€¢ā€Æ Supports both hardware and software implementations
http://www.openauthentication.org/
Advantages:

ā€¢ā€Æ always with the user
ā€¢ā€Æ low investment risk
ā€¢ā€Æ scalable
ā€¢ā€Æ customizable
ā€¢ā€Æ no waiting time for issuing a
new token
User authorization


Access control is the basis of Information Security






 
 
 
 
 prevent disclosure to unauthorized users

 
 
 prevent modiļ¬cation by unauthorized users
Conļ¬dentiality
Integrity
XACML


Open standard proposing
ā€¢ā€Æ a declarative language for deļ¬ning access control policies
ā€¢ā€Æ a run-time architecture for enforcing the policies
deļ¬ning
enforcing
Data encryption


Data encryption is the process of encoding messages or
information in such a way that only authorized parties can read it

In our project we encrypt data at two levels:









 
 
 
 
 prevent information disclosure while sending data

 
 
 prevent reading saved data in the database
Communication
Database
Sensitive data separation


Multi-tenant architecture with a dedicated database for each agency

Advantages:

ā€¢ā€Æ data isolation ( required by law)
ā€¢ā€Æ customized services
ā€¢ā€Æ easy disaster recovery
Conclusions (i)
Conclusions (ii)


What is not covered in this talk:
ā€¢ā€Æ digital documents with legal validity
ā€¢ā€Æ Analog copies of digital documents
ā€¢ā€Æ Graphometric signatures with legal
validity
These aspects are covered in
our research article*
* available also in English	
 Ā 
Ā 	
 Ā 
Contact


Ivano Malavolta
UniversitĆ  degli Studi dellā€™Aquila

ivano.malavolta@univaq.it
http://www.di.univaq.it/malavolta
Images credits


ā€¢ā€Æ http://www.tutorialspoint.com/shorttutorials/cloud-computing-from-the-home
ā€¢ā€Æ https://www.tcnp3.com/home/cloud-technology/what-is-cloud-computing-infographic/
ā€¢ā€Æ http://www.carestreamdental.com/it/it-it/computedradiography
ā€¢ā€Æ http://www.kavo.it/Prodotti/Imaging-Radiologia/Tomograļ¬a-volumetrica-3D.aspx
ā€¢ā€Æ http://www.siriweb.com/wp/?product_cat=ecograf_multi
ā€¢ā€Æ http://cdn.bills.com/images/articles/originals/rate-lock.jpg
ā€¢ā€Æ http://www.ftsafe.com/product/otp/hotp
ā€¢ā€Æ https://www.hidglobal.com/partner-products/single-button-time-based-oath-otp
ā€¢ā€Æ http://www.solidpass.com/authentication-methods/time-synchronized-security-token.html
ā€¢ā€Æ http://www.partnerdata.it/prodotti/identiļ¬cazione/one-time-pw/modelli-epass/
ā€¢ā€Æ http://www.telos.com/secure-communications/secure-uniļ¬ed-directory/

More Related Content

What's hot

eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?chronaki
Ā 
The Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyThe Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyPeter Killcommons
Ā 
Ehealth
EhealthEhealth
Ehealthfrickbob
Ā 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)Greenway Health
Ā 
E-Commerce Meets Healthcare
E-Commerce Meets Healthcare E-Commerce Meets Healthcare
E-Commerce Meets Healthcare arrayhealth
Ā 
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamHCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamApollo Hospitals Group and ATNF
Ā 
Mobile health trends and markets in india
Mobile health trends and markets in indiaMobile health trends and markets in india
Mobile health trends and markets in indiaDr Neelesh Bhandari
Ā 
HCS 483 Final Project
HCS 483 Final ProjectHCS 483 Final Project
HCS 483 Final Projectikearne
Ā 
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
eStandards: eHealth Standards & Profiles in Action for  Europe and beyondeStandards: eHealth Standards & Profiles in Action for  Europe and beyond
eStandards: eHealth Standards & Profiles in Action for Europe and beyondchronaki
Ā 
mHealth Project
mHealth ProjectmHealth Project
mHealth ProjectSour Punk
Ā 
Health care transformation in the pandemic era
Health care transformation in the pandemic eraHealth care transformation in the pandemic era
Health care transformation in the pandemic eraVeerendra Singh
Ā 
Mobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareMobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareDavid Lee Scher, MD
Ā 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13howch1961
Ā 
National digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetNational digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetYogesh Arora
Ā 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareDr. Priyanka Wandhe
Ā 
Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,Apollo Hospitals Group and ATNF
Ā 
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment ReportDigital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Reportcadhri_unc
Ā 

What's hot (20)

eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?
Ā 
The Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyThe Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st Century
Ā 
Ehealth
EhealthEhealth
Ehealth
Ā 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)
Ā 
E-Commerce Meets Healthcare
E-Commerce Meets Healthcare E-Commerce Meets Healthcare
E-Commerce Meets Healthcare
Ā 
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamHCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
Ā 
2009 Kegler Brown HIT Seminar
2009 Kegler Brown HIT Seminar2009 Kegler Brown HIT Seminar
2009 Kegler Brown HIT Seminar
Ā 
Mobile health trends and markets in india
Mobile health trends and markets in indiaMobile health trends and markets in india
Mobile health trends and markets in india
Ā 
HCS 483 Final Project
HCS 483 Final ProjectHCS 483 Final Project
HCS 483 Final Project
Ā 
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
eStandards: eHealth Standards & Profiles in Action for  Europe and beyondeStandards: eHealth Standards & Profiles in Action for  Europe and beyond
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
Ā 
mHealth Project
mHealth ProjectmHealth Project
mHealth Project
Ā 
Connected Health Progress Report
Connected Health Progress ReportConnected Health Progress Report
Connected Health Progress Report
Ā 
Health care transformation in the pandemic era
Health care transformation in the pandemic eraHealth care transformation in the pandemic era
Health care transformation in the pandemic era
Ā 
Mobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareMobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of Healthcare
Ā 
Uptake of eHealth in Australia
Uptake of eHealth in AustraliaUptake of eHealth in Australia
Uptake of eHealth in Australia
Ā 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13
Ā 
National digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetNational digital health mission- Dr. Gurmeet
National digital health mission- Dr. Gurmeet
Ā 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in Healthcare
Ā 
Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Ā 
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment ReportDigital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Ā 

Viewers also liked

JSON Schema MegaWat
JSON Schema MegaWatJSON Schema MegaWat
JSON Schema MegaWatIvan Goncharov
Ā 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Walid Maalej
Ā 
Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Chris Richardson
Ā 
Understand your Business Domain
Understand your Business DomainUnderstand your Business Domain
Understand your Business DomainFrank H. Ritz
Ā 
Simple Java Programs
Simple Java ProgramsSimple Java Programs
Simple Java ProgramsAravindSankaran
Ā 
Model Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresModel Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresMarkus Lanthaler
Ā 
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Alberto Brandolini
Ā 
The People Capability Maturity Model Overviewew
The People Capability Maturity Model OverviewewThe People Capability Maturity Model Overviewew
The People Capability Maturity Model Overviewewtheairliner
Ā 
Career options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainCareer options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainMukesh Chauhan
Ā 
Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10koolkampus
Ā 
A Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation SlidesA Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation Slidesthinkddd
Ā 
BDD with JBehave and Selenium
BDD with JBehave and SeleniumBDD with JBehave and Selenium
BDD with JBehave and SeleniumNikolay Vasilev
Ā 
Domain Driven Design 101
Domain Driven Design 101Domain Driven Design 101
Domain Driven Design 101Richard Dingwall
Ā 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory TrainingNishad Sukumaran
Ā 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineeringPreeti Mishra
Ā 

Viewers also liked (16)

JSON Schema MegaWat
JSON Schema MegaWatJSON Schema MegaWat
JSON Schema MegaWat
Ā 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Ā 
Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)
Ā 
Understand your Business Domain
Understand your Business DomainUnderstand your Business Domain
Understand your Business Domain
Ā 
Simple Java Programs
Simple Java ProgramsSimple Java Programs
Simple Java Programs
Ā 
Model Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresModel Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON Structures
Ā 
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Ā 
The People Capability Maturity Model Overviewew
The People Capability Maturity Model OverviewewThe People Capability Maturity Model Overviewew
The People Capability Maturity Model Overviewew
Ā 
Career options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainCareer options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domain
Ā 
Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10
Ā 
A Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation SlidesA Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation Slides
Ā 
Domain Modeling
Domain ModelingDomain Modeling
Domain Modeling
Ā 
BDD with JBehave and Selenium
BDD with JBehave and SeleniumBDD with JBehave and Selenium
BDD with JBehave and Selenium
Ā 
Domain Driven Design 101
Domain Driven Design 101Domain Driven Design 101
Domain Driven Design 101
Ā 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
Ā 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineering
Ā 

Similar to Guidelines for the technological development in the e-health application domain

Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Ā 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
Ā 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
Ā 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
Ā 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge GarcĆ­a
Ā 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
Ā 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
Ā 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Ā 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
Ā 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
Ā 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
Ā 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
Ā 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
Ā 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxkoushikichakraborty3
Ā 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
Ā 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).pptVarioTechnology
Ā 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxGhofraneFerchichi2
Ā 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Ā 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
Ā 

Similar to Guidelines for the technological development in the e-health application domain (20)

Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
Ā 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
Ā 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Ā 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
Ā 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
Ā 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Ā 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Ā 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Ā 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
Ā 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
Ā 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
Ā 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Ā 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Ā 
Emerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docxEmerging Trends in Web App Security.docx
Emerging Trends in Web App Security.docx
Ā 
B018211016
B018211016B018211016
B018211016
Ā 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
Ā 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
Ā 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
Ā 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
Ā 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
Ā 

More from Ivano Malavolta

Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Ivano Malavolta
Ā 
The H2020 experience
The H2020 experienceThe H2020 experience
The H2020 experienceIvano Malavolta
Ā 
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)Ivano Malavolta
Ā 
Software sustainability and Green IT
Software sustainability and Green ITSoftware sustainability and Green IT
Software sustainability and Green ITIvano Malavolta
Ā 
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Ivano Malavolta
Ā 
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]Ivano Malavolta
Ā 
Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Ivano Malavolta
Ā 
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Ivano Malavolta
Ā 
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Ivano Malavolta
Ā 
Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Ivano Malavolta
Ā 
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Ivano Malavolta
Ā 
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Ivano Malavolta
Ā 
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Ivano Malavolta
Ā 
Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Ivano Malavolta
Ā 
[2017/2018] Agile development
[2017/2018] Agile development[2017/2018] Agile development
[2017/2018] Agile developmentIvano Malavolta
Ā 
Reconstructing microservice-based architectures
Reconstructing microservice-based architecturesReconstructing microservice-based architectures
Reconstructing microservice-based architecturesIvano Malavolta
Ā 
[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design LanguageIvano Malavolta
Ā 
[2017/2018] Architectural languages
[2017/2018] Architectural languages[2017/2018] Architectural languages
[2017/2018] Architectural languagesIvano Malavolta
Ā 
[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software ArchitectureIvano Malavolta
Ā 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineeringIvano Malavolta
Ā 

More from Ivano Malavolta (20)

Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Ā 
The H2020 experience
The H2020 experienceThe H2020 experience
The H2020 experience
Ā 
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
Ā 
Software sustainability and Green IT
Software sustainability and Green ITSoftware sustainability and Green IT
Software sustainability and Green IT
Ā 
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Ā 
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
Ā 
Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...
Ā 
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Ā 
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Ā 
Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...
Ā 
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Ā 
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Ā 
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Ā 
Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...
Ā 
[2017/2018] Agile development
[2017/2018] Agile development[2017/2018] Agile development
[2017/2018] Agile development
Ā 
Reconstructing microservice-based architectures
Reconstructing microservice-based architecturesReconstructing microservice-based architectures
Reconstructing microservice-based architectures
Ā 
[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language
Ā 
[2017/2018] Architectural languages
[2017/2018] Architectural languages[2017/2018] Architectural languages
[2017/2018] Architectural languages
Ā 
[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture
Ā 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering
Ā 

Recently uploaded

Kolkata Call Girls Naktala šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Girl Se...
Kolkata Call Girls Naktala  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Girl Se...Kolkata Call Girls Naktala  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Girl Se...
Kolkata Call Girls Naktala šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Girl Se...Namrata Singh
Ā 
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...Oleg Kshivets
Ā 
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...Sheetaleventcompany
Ā 
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service AvailableDipal Arora
Ā 
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptxANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptxSwetaba Besh
Ā 
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...soniyagrag336
Ā 
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...Sheetaleventcompany
Ā 
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableCall Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableJanvi Singh
Ā 
Kolkata Call Girls Shobhabazar šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Gir...
Kolkata Call Girls Shobhabazar  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Gir...Kolkata Call Girls Shobhabazar  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Gir...
Kolkata Call Girls Shobhabazar šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Gir...Namrata Singh
Ā 
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...Sheetaleventcompany
Ā 
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...gragneelam30
Ā 
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...Sheetaleventcompany
Ā 
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room DeliveryCall 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room DeliveryJyoti singh
Ā 
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service AvailableCall Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Availableperfect solution
Ā 
Cardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationCardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationMedicoseAcademics
Ā 
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...Sheetaleventcompany
Ā 
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...Sheetaleventcompany
Ā 
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...Sheetaleventcompany
Ā 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan 087776558899
Ā 
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...dishamehta3332
Ā 

Recently uploaded (20)

Kolkata Call Girls Naktala šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Girl Se...
Kolkata Call Girls Naktala  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Girl Se...Kolkata Call Girls Naktala  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Girl Se...
Kolkata Call Girls Naktala šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Girl Se...
Ā 
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...
Gastric Cancer: Š”linical Implementation of Artificial Intelligence, Synergeti...
Ā 
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...
Call Girl In Indore šŸ“ž9235973566šŸ“ž JustšŸ“² Call Inaaya Indore Call Girls Service ...
Ā 
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kathua Just Call 8250077686 Top Class Call Girl Service Available
Ā 
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptxANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF REPRODUCTIVE SYSTEM.pptx
Ā 
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...
Call Girls in Lucknow Just Call šŸ‘‰šŸ‘‰8630512678 Top Class Call Girl Service Avai...
Ā 
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...
ā¤ļøAmritsar Escorts Serviceā˜Žļø9815674956ā˜Žļø Call Girl service in Amritsarā˜Žļø Amri...
Ā 
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service AvailableCall Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Call Girls Mussoorie Just Call 8854095900 Top Class Call Girl Service Available
Ā 
Kolkata Call Girls Shobhabazar šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Gir...
Kolkata Call Girls Shobhabazar  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Gir...Kolkata Call Girls Shobhabazar  šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ  Top Class Call Gir...
Kolkata Call Girls Shobhabazar šŸ’ÆCall Us šŸ” 8005736733 šŸ” šŸ’ƒ Top Class Call Gir...
Ā 
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...
Call Girl In Chandigarh šŸ“ž9809698092šŸ“ž JustšŸ“² Call Inaaya Chandigarh Call Girls ...
Ā 
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...
Call Girls Bangalore - 450+ Call Girl Cash Payment šŸ’ÆCall Us šŸ” 6378878445 šŸ” šŸ’ƒ ...
Ā 
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...
šŸ’šChandigarh Call Girls Service šŸ’ÆPiya šŸ“²šŸ”8868886958šŸ”Call Girls In Chandigarh No...
Ā 
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room DeliveryCall 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ā‚¹4.5k Cash Payment With Room Delivery
Ā 
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service AvailableCall Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 9667172968 Top Class Call Girl Service Available
Ā 
Cardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationCardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their Regulation
Ā 
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...
ā¤ļøChandigarh Escorts Serviceā˜Žļø9814379184ā˜Žļø Call Girl service in Chandigarhā˜Žļø ...
Ā 
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...
ā¤ļøCall Girl Service In Chandigarhā˜Žļø9814379184ā˜Žļø Call Girl in Chandigarhā˜Žļø Cha...
Ā 
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...
šŸ’šCall Girls In Amritsar šŸ’ÆAnvi šŸ“²šŸ”8725944379šŸ”Amritsar Call Girl NošŸ’°Advance Cash...
Ā 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Ā 
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Race Course Road } Book Call Girls in Bangalore | Whatsapp No 6378878445 VIP ...
Ā 

Guidelines for the technological development in the e-health application domain

  • 1. Ā  Ā  Guidelines for the technological development in the e-health application domain Ivano Malavolta UniversitĆ  degli Studi dellā€™Aquila
  • 2. Introduction Great progress in the health sector applied to etc. However, the health sector currently lags behind other sectors in the use of advanced data management software Ć ļƒ  there is great potential for rapid, sustained growth image acquisition image elaboration robotics
  • 3. Introduction The E-Health Technology project focusses on Remote assistance via mobile devices Modernization of business processes Design of new services in the cloud
  • 4. Introduction The role of University of Lā€™Aquila in the project Research Prototypes development Research actions State of the art Architectural solutions
  • 5. Introduction In this talk we will present the main solutions for architecting an e-health software system in terms of its Security engineering Reliability assurance etc. Data management infrastructure
  • 6. Ā  Ā  Remainder of the talk ā€¢ā€Æ Introduction ā€¢ā€Æ Cloud computing ā€¢ā€Æ User authentication ā€¢ā€Æ User authorization ā€¢ā€Æ Data encryption ā€¢ā€Æ Sensitive data separation ā€¢ā€Æ Conclusions
  • 7. Cloud computing The use of computing power that is located ā€œelsewhereā€Ć ļƒ  in the cloud Advantages: no infrastructure elasticity low risk
  • 8. Cloud computing Challenges in the e-health application domain: Who can enter the system? Who can do what in the system? Who can read my data? Where is my data?
  • 9. User authentication Strong authentication is mandatory ā€¢ā€Æ one possible implementation: two-factor + challenge-response Something you know Something you have ex. username and password ex. card or security token +
  • 10. OATH1 Open standard for the interoperability of authentication methods ā€¢ā€Æ Supports both hardware and software implementations http://www.openauthentication.org/ Advantages: ā€¢ā€Æ always with the user ā€¢ā€Æ low investment risk ā€¢ā€Æ scalable ā€¢ā€Æ customizable ā€¢ā€Æ no waiting time for issuing a new token
  • 11. User authorization Access control is the basis of Information Security prevent disclosure to unauthorized users prevent modiļ¬cation by unauthorized users Conļ¬dentiality Integrity
  • 12. XACML Open standard proposing ā€¢ā€Æ a declarative language for deļ¬ning access control policies ā€¢ā€Æ a run-time architecture for enforcing the policies deļ¬ning enforcing
  • 13. Data encryption Data encryption is the process of encoding messages or information in such a way that only authorized parties can read it In our project we encrypt data at two levels: prevent information disclosure while sending data prevent reading saved data in the database Communication Database
  • 14. Sensitive data separation Multi-tenant architecture with a dedicated database for each agency Advantages: ā€¢ā€Æ data isolation ( required by law) ā€¢ā€Æ customized services ā€¢ā€Æ easy disaster recovery
  • 16. Conclusions (ii) What is not covered in this talk: ā€¢ā€Æ digital documents with legal validity ā€¢ā€Æ Analog copies of digital documents ā€¢ā€Æ Graphometric signatures with legal validity These aspects are covered in our research article* * available also in English Ā 
  • 17. Ā  Ā  Contact Ivano Malavolta UniversitĆ  degli Studi dellā€™Aquila ivano.malavolta@univaq.it http://www.di.univaq.it/malavolta
  • 18. Images credits ā€¢ā€Æ http://www.tutorialspoint.com/shorttutorials/cloud-computing-from-the-home ā€¢ā€Æ https://www.tcnp3.com/home/cloud-technology/what-is-cloud-computing-infographic/ ā€¢ā€Æ http://www.carestreamdental.com/it/it-it/computedradiography ā€¢ā€Æ http://www.kavo.it/Prodotti/Imaging-Radiologia/Tomograļ¬a-volumetrica-3D.aspx ā€¢ā€Æ http://www.siriweb.com/wp/?product_cat=ecograf_multi ā€¢ā€Æ http://cdn.bills.com/images/articles/originals/rate-lock.jpg ā€¢ā€Æ http://www.ftsafe.com/product/otp/hotp ā€¢ā€Æ https://www.hidglobal.com/partner-products/single-button-time-based-oath-otp ā€¢ā€Æ http://www.solidpass.com/authentication-methods/time-synchronized-security-token.html ā€¢ā€Æ http://www.partnerdata.it/prodotti/identiļ¬cazione/one-time-pw/modelli-epass/ ā€¢ā€Æ http://www.telos.com/secure-communications/secure-uniļ¬ed-directory/