SlideShare a Scribd company logo
1 of 11
Download to read offline
CAPP
Context Aware Privacy Platform
We are:
Marie-José Bonthuis
Eds Keizer
Martijn Veening
Lykle de Vries
2016
What is CAPP?
With CAPP, we intend to research ways of providing information
belonging to an individual to someone else, without the need for
large centralized databases, without leaving (traces of) data behind
that might make that individual vulnerable.
Assumptions
• Privacy first;
• Intervention driven;
• Very small scope for proof of concepts;
• Data minimalistic approach;
Assumptions (2)
• Communication of relevant attributes instead of persistent
registration of unnecessary data;
• Usage of AI to ascertain reliability of data;
• Scalable.
Platform
• Open source (license CC);
• Distributed architecture;
• Use cases are based on information supply chain;
• Identifaction;
• Trust of data sources (input / output).
Smart
Artificial Intelligence
• Inference engine;
• Fuzzy logic to present result (weighed aggregation).
Challenges
Practical:
• Identifying the subject with (very) high certainty.
Technical:
• Distributed data storage;
• Protocol specifications.
Use case
ICE-d: In Case of Emergency data
What
CAPP can be used to identify conflicts when an intervention (like an
MRI) is proposed to a patient.
How
Medical professionals use the platform to request attributes of the
patient, identified by their (temporary) ID or token.
Example
• the doctor is authenticated and authorized to request the data
(within a defined scope);
• the patient can be identified using a (temporary) id;
• the request can be 'Is MRI possible (for this patient)?';
• the result can be simple answers with metadata (age / quality of
the source): yes / unclear / no.

More Related Content

What's hot

Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationGokul Alex
 
Alex Hanway, Director, Business Development, The Thales Group
Alex Hanway, Director, Business Development, The Thales GroupAlex Hanway, Director, Business Development, The Thales Group
Alex Hanway, Director, Business Development, The Thales GroupNeo4j
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...ieeepondy
 
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...I3E Technologies
 
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLTOmid Mogharian
 
Leveraging a big data model in the IT domain
Leveraging a big data model in the IT domainLeveraging a big data model in the IT domain
Leveraging a big data model in the IT domainVSS Monitoring
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedShakas Technologies
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp nyprekubatortto
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...LeMeniz Infotech
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesGilles Fedak
 
Urika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageUrika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageAdnan Khaleel
 
Comprehensive solutions for data integration and advanced analytics
Comprehensive solutions for data integration and advanced analyticsComprehensive solutions for data integration and advanced analytics
Comprehensive solutions for data integration and advanced analyticsGauss Algorithmic
 
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATADYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATANexgen Technology
 

What's hot (20)

Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Alex Hanway, Director, Business Development, The Thales Group
Alex Hanway, Director, Business Development, The Thales GroupAlex Hanway, Director, Business Development, The Thales Group
Alex Hanway, Director, Business Development, The Thales Group
 
K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...K nearest neighbor classification over semantically secure encrypted relation...
K nearest neighbor classification over semantically secure encrypted relation...
 
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
K-NEAREST NEIGHBOR CLASSIFICATION OVER SEMANTICALLY SECURE ENCRYPTED RELATION...
 
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI,  where Privacy-Preserving ML meets DLTThe journey to Private AI,  where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
 
Leveraging a big data model in the IT domain
Leveraging a big data model in the IT domainLeveraging a big data model in the IT domain
Leveraging a big data model in the IT domain
 
Vendor-Checklist
Vendor-ChecklistVendor-Checklist
Vendor-Checklist
 
K nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encryptedK nearest neighbor classification over semantically secure encrypted
K nearest neighbor classification over semantically secure encrypted
 
Cloud computing tp ny
Cloud computing tp nyCloud computing tp ny
Cloud computing tp ny
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
Personal & Trusted cloud
Personal & Trusted cloudPersonal & Trusted cloud
Personal & Trusted cloud
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and PerspectivesThe iEx.ec Distributed Cloud: Latest Developments and Perspectives
The iEx.ec Distributed Cloud: Latest Developments and Perspectives
 
Urika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageUrika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-page
 
Comprehensive solutions for data integration and advanced analytics
Comprehensive solutions for data integration and advanced analyticsComprehensive solutions for data integration and advanced analytics
Comprehensive solutions for data integration and advanced analytics
 
8
88
8
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATADYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
DYNAMIC AND PUBLIC AUDITING WITH FAIR ARBITRATION FOR CLOUD DATA
 
vion_a2000_5 facts_d2
vion_a2000_5 facts_d2vion_a2000_5 facts_d2
vion_a2000_5 facts_d2
 

Similar to Context Aware Privacy Platform

The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data ScienceDaniel McEnnis
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013HPCC Systems
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and EthicsHPCC Systems
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...Mihai Criveti
 
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceInternet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceDr.-Ing Abdur Rahim Biswas
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...waylay
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationDenodo
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security BrokersRobin Vermeirsch
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Machine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldMachine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldUlf Mattsson
 
identity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageidentity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageswathi78
 

Similar to Context Aware Privacy Platform (20)

The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Elastic at KPN
Elastic at KPNElastic at KPN
Elastic at KPN
 
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...
DevOps for Data Engineers - Automate Your Data Science Pipeline with Ansible,...
 
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a PalaceInternet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
Internet of Things (IoT) is a King, Big data is a Queen and Cloud is a Palace
 
Dealing with Dark Data
Dealing with Dark DataDealing with Dark Data
Dealing with Dark Data
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data VirtualizationMasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
MasterClass Series: Unlocking Data Sharing Velocity with Data Virtualization
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Machine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud worldMachine learning and ai in a brave new cloud world
Machine learning and ai in a brave new cloud world
 
identity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storageidentity-based distributed provable data possession in multi-cloud storage
identity-based distributed provable data possession in multi-cloud storage
 

More from Lykle de Vries

The future of work? hanzehogeschool 2019 04-04
The future of work? hanzehogeschool 2019 04-04The future of work? hanzehogeschool 2019 04-04
The future of work? hanzehogeschool 2019 04-04Lykle de Vries
 
2018-10-16 de vijf regels van blockchain
2018-10-16 de vijf regels van blockchain2018-10-16 de vijf regels van blockchain
2018-10-16 de vijf regels van blockchainLykle de Vries
 
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAIN
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAINVUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAIN
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAINLykle de Vries
 
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HRLykle de Vries
 
2018 06-25 de vijf regels van blockchain
2018 06-25 de vijf regels van blockchain2018 06-25 de vijf regels van blockchain
2018 06-25 de vijf regels van blockchainLykle de Vries
 
2018 04-18 de maatschappij - arnhem
2018 04-18 de maatschappij - arnhem2018 04-18 de maatschappij - arnhem
2018 04-18 de maatschappij - arnhemLykle de Vries
 
2018 03-22 i sense blockchain summit
2018 03-22 i sense blockchain summit2018 03-22 i sense blockchain summit
2018 03-22 i sense blockchain summitLykle de Vries
 
2018 03-15 qando food 4 thougth Blockchain voor Inkoop
2018 03-15 qando food 4 thougth Blockchain voor Inkoop2018 03-15 qando food 4 thougth Blockchain voor Inkoop
2018 03-15 qando food 4 thougth Blockchain voor InkoopLykle de Vries
 
Vooruitblik naar een toekomstbestendige arbeidsmarkt? 2018-02-06
Vooruitblik naar een toekomstbestendige arbeidsmarkt?   2018-02-06Vooruitblik naar een toekomstbestendige arbeidsmarkt?   2018-02-06
Vooruitblik naar een toekomstbestendige arbeidsmarkt? 2018-02-06Lykle de Vries
 
2018 02-07 blockchain and digital nation’s infrastructure
2018 02-07 blockchain and digital nation’s infrastructure2018 02-07 blockchain and digital nation’s infrastructure
2018 02-07 blockchain and digital nation’s infrastructureLykle de Vries
 
2018 01-19 nieuwjaarsbijeenkomst rba
2018 01-19 nieuwjaarsbijeenkomst rba2018 01-19 nieuwjaarsbijeenkomst rba
2018 01-19 nieuwjaarsbijeenkomst rbaLykle de Vries
 
2018 01-18 blockchain for music #ESNS18
2018 01-18 blockchain for music #ESNS182018 01-18 blockchain for music #ESNS18
2018 01-18 blockchain for music #ESNS18Lykle de Vries
 
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth BrothersLykle de Vries
 
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12Lykle de Vries
 
2017 10-18 staffing force blockchain
2017 10-18 staffing force blockchain2017 10-18 staffing force blockchain
2017 10-18 staffing force blockchainLykle de Vries
 
2017 10-04 zonder jullie is blockchain ten dode opgeschreven
2017 10-04 zonder jullie is blockchain ten dode opgeschreven2017 10-04 zonder jullie is blockchain ten dode opgeschreven
2017 10-04 zonder jullie is blockchain ten dode opgeschrevenLykle de Vries
 
Na de troonrede blockchain - 20170919
Na de troonrede   blockchain - 20170919Na de troonrede   blockchain - 20170919
Na de troonrede blockchain - 20170919Lykle de Vries
 
Future of work u4 - 2017-09-20
Future of work   u4 - 2017-09-20Future of work   u4 - 2017-09-20
Future of work u4 - 2017-09-20Lykle de Vries
 
2017 09-09 - Blockchain @ Zaandam Valley (ah)
2017 09-09 - Blockchain @ Zaandam Valley (ah) 2017 09-09 - Blockchain @ Zaandam Valley (ah)
2017 09-09 - Blockchain @ Zaandam Valley (ah) Lykle de Vries
 

More from Lykle de Vries (20)

The future of work? hanzehogeschool 2019 04-04
The future of work? hanzehogeschool 2019 04-04The future of work? hanzehogeschool 2019 04-04
The future of work? hanzehogeschool 2019 04-04
 
2018-10-16 de vijf regels van blockchain
2018-10-16 de vijf regels van blockchain2018-10-16 de vijf regels van blockchain
2018-10-16 de vijf regels van blockchain
 
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAIN
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAINVUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAIN
VUSO Steenwijk: KENNISMAKEN MET BITCOIN EN BLOKCHAIN
 
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR
2018-09-20 Noorderlinkdagen - happy future - Blockchain en HR
 
2018 06-25 de vijf regels van blockchain
2018 06-25 de vijf regels van blockchain2018 06-25 de vijf regels van blockchain
2018 06-25 de vijf regels van blockchain
 
2018 04-18 de maatschappij - arnhem
2018 04-18 de maatschappij - arnhem2018 04-18 de maatschappij - arnhem
2018 04-18 de maatschappij - arnhem
 
2018 03-22 i sense blockchain summit
2018 03-22 i sense blockchain summit2018 03-22 i sense blockchain summit
2018 03-22 i sense blockchain summit
 
2018 03-15 qando food 4 thougth Blockchain voor Inkoop
2018 03-15 qando food 4 thougth Blockchain voor Inkoop2018 03-15 qando food 4 thougth Blockchain voor Inkoop
2018 03-15 qando food 4 thougth Blockchain voor Inkoop
 
Vooruitblik naar een toekomstbestendige arbeidsmarkt? 2018-02-06
Vooruitblik naar een toekomstbestendige arbeidsmarkt?   2018-02-06Vooruitblik naar een toekomstbestendige arbeidsmarkt?   2018-02-06
Vooruitblik naar een toekomstbestendige arbeidsmarkt? 2018-02-06
 
2018 02-07 blockchain and digital nation’s infrastructure
2018 02-07 blockchain and digital nation’s infrastructure2018 02-07 blockchain and digital nation’s infrastructure
2018 02-07 blockchain and digital nation’s infrastructure
 
2018 01-19 nieuwjaarsbijeenkomst rba
2018 01-19 nieuwjaarsbijeenkomst rba2018 01-19 nieuwjaarsbijeenkomst rba
2018 01-19 nieuwjaarsbijeenkomst rba
 
2018 01-18 blockchain for music #ESNS18
2018 01-18 blockchain for music #ESNS182018 01-18 blockchain for music #ESNS18
2018 01-18 blockchain for music #ESNS18
 
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers
2018 01-12 Blockchain bij Schoenen-Zaken en The Smooth Brothers
 
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12
Blockchain en Bitcoin - rabobank arnhem en omstreken - 2017-12-12
 
2017 10-18 staffing force blockchain
2017 10-18 staffing force blockchain2017 10-18 staffing force blockchain
2017 10-18 staffing force blockchain
 
2017 10-04 becis
2017 10-04 becis2017 10-04 becis
2017 10-04 becis
 
2017 10-04 zonder jullie is blockchain ten dode opgeschreven
2017 10-04 zonder jullie is blockchain ten dode opgeschreven2017 10-04 zonder jullie is blockchain ten dode opgeschreven
2017 10-04 zonder jullie is blockchain ten dode opgeschreven
 
Na de troonrede blockchain - 20170919
Na de troonrede   blockchain - 20170919Na de troonrede   blockchain - 20170919
Na de troonrede blockchain - 20170919
 
Future of work u4 - 2017-09-20
Future of work   u4 - 2017-09-20Future of work   u4 - 2017-09-20
Future of work u4 - 2017-09-20
 
2017 09-09 - Blockchain @ Zaandam Valley (ah)
2017 09-09 - Blockchain @ Zaandam Valley (ah) 2017 09-09 - Blockchain @ Zaandam Valley (ah)
2017 09-09 - Blockchain @ Zaandam Valley (ah)
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Context Aware Privacy Platform

  • 1. CAPP Context Aware Privacy Platform We are: Marie-José Bonthuis Eds Keizer Martijn Veening Lykle de Vries 2016
  • 2. What is CAPP? With CAPP, we intend to research ways of providing information belonging to an individual to someone else, without the need for large centralized databases, without leaving (traces of) data behind that might make that individual vulnerable.
  • 3. Assumptions • Privacy first; • Intervention driven; • Very small scope for proof of concepts; • Data minimalistic approach;
  • 4. Assumptions (2) • Communication of relevant attributes instead of persistent registration of unnecessary data; • Usage of AI to ascertain reliability of data; • Scalable.
  • 5. Platform • Open source (license CC); • Distributed architecture; • Use cases are based on information supply chain; • Identifaction; • Trust of data sources (input / output).
  • 6. Smart Artificial Intelligence • Inference engine; • Fuzzy logic to present result (weighed aggregation).
  • 7. Challenges Practical: • Identifying the subject with (very) high certainty. Technical: • Distributed data storage; • Protocol specifications.
  • 8. Use case ICE-d: In Case of Emergency data
  • 9. What CAPP can be used to identify conflicts when an intervention (like an MRI) is proposed to a patient.
  • 10. How Medical professionals use the platform to request attributes of the patient, identified by their (temporary) ID or token.
  • 11. Example • the doctor is authenticated and authorized to request the data (within a defined scope); • the patient can be identified using a (temporary) id; • the request can be 'Is MRI possible (for this patient)?'; • the result can be simple answers with metadata (age / quality of the source): yes / unclear / no.