Skip to main content

My Health - My Data

Deliverables

Updated dissemination materials (1)

This deliverable will report about the dissemination materials produced after 18 months from the project start, also providing information about the output (success in the implementation of the dissemination strategy) and about the outcome (success in the actual public outreach) of the dissemination activities.

Public Hacking Challenge Results Report

This deliverable will collect hacking challenge results and provide a fundamental document to improve the resilience of the system to security and privacy violation attacks.

MHMD Security Infrastructure

Based on the work in T5.4 this deliverable describes in detail the security infrastructure of the implemented MHMD system. It will cover both transaction security elements integrated into the system (such as authorization and authentication methods, adopted protocols, etc.) and adopted and ad-hoc developed protection systems (such as network security devices and intrusion detection systems).

Blockchain Analytics (2)

Based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Initial List of Main Requirements

A first version of the requirements, split by module (e.g., data platform, exchange system, citizen health applications).

First dissemination event

This deliverable will specifically report on the preparation and outcomes of the first workshop.

Ethical Review materials and engagement process definition (first submission, to be yearly updated)

This report will document all materials and strategy implemented to seek approval from Ethics committees in all clinical centres.

Dissemination strategy plan and preliminary material

This deliverable will contain the plan for the dissemination activities, as well as the preliminary dissemination materials. It will also report on the implementation of the project website and on the activation of the social media accounts

MHMD Ontological Resources

List of reference terminologies selected in Tasks T4.2. Strategies to normalize data. Strategies to track provenance and versioning (T4.3).

Second Dissemination event

This deliverable will specifically report on the preparation and outcomes of the second workshop

Project Presentation

Basic presentation of the project, to be used in event/dissemination activities, directed to the general public.

Privacy-by-design and compliance assessment

Privacy-by-design and compliance assessment

Blockchain Analytics (1)

based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Updated dissemination materials (2)

This deliverable will report about the dissemination materials produced after 36 months from the project start, also providing information about the output (success in the implementation of the dissemination strategy) and about the outcome (success in the actual public outreach) of the dissemination activities.

Final List of Main Requirements

A final version of the requirements taking into account new developments and requirements.

AITION KDD, analytics and similarity analysis platform implementation and release report

AITION KDD, analytics and similarity analysis platform implementation and release report

Analysis of Customization Needs

A second version of the requirements taking into account new developments and requirements arising.

Onboarding user interfaces for design specifications document

Documenting the of design process of the web and app UI and corresponding back-end process to onboard users and associated data (outcome of T3.3).

Blockchain Analytics (3)

Based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Searching for OpenAIRE data...

Publications

Life Science Talks Innovation in Healthcare: What is the Point?

Author(s): Manset, David; Chauvet, Marie-Caroline; Barlow, James; Damien, Benjamin; Kowalik, Lukasz; Williams, Neal; Schuller, Colleen; Stoitzner, Sébastien
Published in: Life Science Talks, Issue 9, 2017, Page(s) 29
DOI: 10.5281/zenodo.1065331

Blockchain for better care

Author(s): Manset, David; Morley-Fletcher, Edwin
Published in: Issue 11, 2017
DOI: 10.5281/zenodo.1065362

A closer look at the EU-funded My Health My Data project

Author(s): Panetta, Rocco; Cristofaro, Lorenzo
Published in: Digital Health Legal, Issue 4, 2017, Page(s) 10-11, ISSN 2399-1100
DOI: 10.5281/zenodo.1048998

Remotely Exploiting AT Command Attacks on ZigBee Networks


Published in: ISSN 1939-0122
DOI: 10.1155/2017/1723658

Practical Private Range Search in Depth

Author(s): Ioannis Demertzis, Stavros Papadopoulos, Odysseas Papapetrou, Antonios Deligiannakis, Minos Garofalakis, Charalampos Papamanthou
Published in: ACM Transactions on Database Systems, Issue 43/1, 2018, Page(s) 1-52, ISSN 0362-5915
DOI: 10.1145/3167971

Introducing the SlowDrop Attack

Author(s): Enrico Cambiaso, Giovanni Chiola, Maurizio Aiello
Published in: Computer Networks, Issue 150, 2019, Page(s) 234-249, ISSN 1389-1286
DOI: 10.1016/j.comnet.2019.01.007

Big Data and Privacy Fundamentals: Toward a “Digital Skin”

Author(s): David Manset
Published in: The Digitization of Healthcare, 2017, Page(s) 241-255
DOI: 10.1057/978-1-349-95173-4_14

MHMD: My Health, My Data

Author(s): Morley-Fletcher, Edwin
Published in: Workshop Proc. of the EDBT/ICDT 2017 Joint Conference (March 21, 2017, Venice, Italy), 2017
DOI: 10.5281/zenodo.1303290

Enabling trust in healthcare data exchange with a federated blockchain-based architecture

Author(s): Mirko Koscina, David Manset, Claudia Negri, Octavio Perez
Published in: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Page(s) 231-237
DOI: 10.1145/3358695.3360897

Towards Privacy-Preserving Deep Learning based Medical Imaging Applications

Author(s): Vizitiu, Anamaria; Ioan Niţă, Cosmin; Puiu, Andrei; Suciu, Constantin; Mihai Itu, Lucian, UTBV
Published in: 2019

An Evaluation on Robustness and Utility of Fingerprinting Schemes




On the Utility of Synthetic Data - An Empirical Evaluation on Machine Learning Tasks

Author(s): Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-6
DOI: 10.1145/3339252.3339281

Darknet Security: A Categorization of Attacks to the Tor Network

Author(s): Cambiaso, E., Vaccari, I., Patti, L., Aiello, M., CNR-IEIIT
Published in: Italian Conference on Cyber Security (ITASEC), 2019

When Blockchain Meets the Right to be Forgotten: Technology Versus Law in the Healthcare Industry