Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

My Health - My Data

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Updated dissemination materials (1) (opens in new window)

This deliverable will report about the dissemination materials produced after 18 months from the project start, also providing information about the output (success in the implementation of the dissemination strategy) and about the outcome (success in the actual public outreach) of the dissemination activities.

Public Hacking Challenge Results Report (opens in new window)

This deliverable will collect hacking challenge results and provide a fundamental document to improve the resilience of the system to security and privacy violation attacks.

MHMD Security Infrastructure (opens in new window)

Based on the work in T5.4 this deliverable describes in detail the security infrastructure of the implemented MHMD system. It will cover both transaction security elements integrated into the system (such as authorization and authentication methods, adopted protocols, etc.) and adopted and ad-hoc developed protection systems (such as network security devices and intrusion detection systems).

Blockchain Analytics (2) (opens in new window)

Based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Initial List of Main Requirements (opens in new window)

A first version of the requirements, split by module (e.g., data platform, exchange system, citizen health applications).

First dissemination event (opens in new window)

This deliverable will specifically report on the preparation and outcomes of the first workshop.

Ethical Review materials and engagement process definition (first submission, to be yearly updated) (opens in new window)

This report will document all materials and strategy implemented to seek approval from Ethics committees in all clinical centres.

Dissemination strategy plan and preliminary material (opens in new window)

This deliverable will contain the plan for the dissemination activities, as well as the preliminary dissemination materials. It will also report on the implementation of the project website and on the activation of the social media accounts

MHMD Ontological Resources (opens in new window)

List of reference terminologies selected in Tasks T4.2. Strategies to normalize data. Strategies to track provenance and versioning (T4.3).

Second Dissemination event (opens in new window)

This deliverable will specifically report on the preparation and outcomes of the second workshop

Project Presentation (opens in new window)

Basic presentation of the project, to be used in event/dissemination activities, directed to the general public.

Privacy-by-design and compliance assessment (opens in new window)
Blockchain Analytics (1) (opens in new window)

based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Updated dissemination materials (2) (opens in new window)

This deliverable will report about the dissemination materials produced after 36 months from the project start, also providing information about the output (success in the implementation of the dissemination strategy) and about the outcome (success in the actual public outreach) of the dissemination activities.

Final List of Main Requirements (opens in new window)

A final version of the requirements taking into account new developments and requirements.

AITION KDD, analytics and similarity analysis platform implementation and release report (opens in new window)
Analysis of Customization Needs (opens in new window)

A second version of the requirements taking into account new developments and requirements arising.

Onboarding user interfaces for design specifications document (opens in new window)

Documenting the of design process of the web and app UI and corresponding back-end process to onboard users and associated data (outcome of T3.3).

Blockchain Analytics (3) (opens in new window)

Based on the work done in T6.2 and T6.3, D6.4 will illustrate the blockchain usage thanks to illustrative and eye-catching analytics. It will serve the purpose of feeding the project Website and marketing materials.

Publications

Life Science Talks Innovation in Healthcare: What is the Point? (opens in new window)

Author(s): Manset, David; Chauvet, Marie-Caroline; Barlow, James; Damien, Benjamin; Kowalik, Lukasz; Williams, Neal; Schuller, Colleen; Stoitzner, Sébastien
Published in: Life Science Talks, Issue 9, 2017, Page(s) 29
Publisher: GenSearch
DOI: 10.5281/zenodo.1065331

Blockchain for better care (opens in new window)

Author(s): Manset, David; Morley-Fletcher, Edwin
Published in: Issue 11, 2017
Publisher: Healthcare Data Institute
DOI: 10.5281/zenodo.1065362

A closer look at the EU-funded My Health My Data project (opens in new window)

Author(s): Panetta, Rocco; Cristofaro, Lorenzo
Published in: Digital Health Legal, Issue 4, 2017, Page(s) 10-11, ISSN 2399-1100
Publisher: Cecile Park Media (CPM)
DOI: 10.5281/zenodo.1048998

Remotely Exploiting AT Command Attacks on ZigBee Networks (opens in new window)

Author(s): Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Published in: Security and Communication Networks, Issue 2017, 2017, Page(s) 1-9, ISSN 1939-0122
Publisher: John Wiley & Sons Ltd.
DOI: 10.1155/2017/1723658

Practical Private Range Search in Depth (opens in new window)

Author(s): Ioannis Demertzis, Stavros Papadopoulos, Odysseas Papapetrou, Antonios Deligiannakis, Minos Garofalakis, Charalampos Papamanthou
Published in: ACM Transactions on Database Systems, Issue 43/1, 2018, Page(s) 1-52, ISSN 0362-5915
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3167971

Introducing the SlowDrop Attack (opens in new window)

Author(s): Enrico Cambiaso, Giovanni Chiola, Maurizio Aiello
Published in: Computer Networks, Issue 150, 2019, Page(s) 234-249, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2019.01.007

Big Data and Privacy Fundamentals: Toward a “Digital Skin” (opens in new window)

Author(s): David Manset
Published in: The Digitization of Healthcare, 2017, Page(s) 241-255, ISBN 978-1-349-95172-7
Publisher: Palgrave Macmillan UK
DOI: 10.1057/978-1-349-95173-4_14

MHMD: My Health, My Data (opens in new window)

Author(s): Morley-Fletcher, Edwin
Published in: Workshop Proc. of the EDBT/ICDT 2017 Joint Conference (March 21, 2017, Venice, Italy), 2017
Publisher: EDBT/ICDT 2017 Joint Conference (March 21, 2017, Venice, Italy)
DOI: 10.5281/zenodo.1303290

Enabling trust in healthcare data exchange with a federated blockchain-based architecture (opens in new window)

Author(s): Mirko Koscina, David Manset, Claudia Negri, Octavio Perez
Published in: IEEE/WIC/ACM International Conference on Web Intelligence on - WI '19 Companion, 2019, Page(s) 231-237, ISBN 9781-450369886
Publisher: ACM Press
DOI: 10.1145/3358695.3360897

Towards Privacy-Preserving Deep Learning based Medical Imaging Applications

Author(s): Vizitiu, Anamaria; Ioan Niţă, Cosmin; Puiu, Andrei; Suciu, Constantin; Mihai Itu, Lucian, UTBV
Published in: 2019
Publisher: 2019 IEEE International Symposium on Medical Measurements and Applications (MeMeA)

An Evaluation on Robustness and Utility of Fingerprinting Schemes

Author(s): Šarčević, Tanja & Mayer, Rudolf, SBA Research
Published in: 2019
Publisher: International Cross-Domain Conference for Machine Learning and Knowledge Extraction

On the Utility of Synthetic Data - An Empirical Evaluation on Machine Learning Tasks (opens in new window)

Author(s): Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer
Published in: Proceedings of the 14th International Conference on Availability, Reliability and Security - ARES '19, 2019, Page(s) 1-6, ISBN 9781-450371643
Publisher: ACM Press
DOI: 10.1145/3339252.3339281

Darknet Security: A Categorization of Attacks to the Tor Network

Author(s): Cambiaso, E., Vaccari, I., Patti, L., Aiello, M., CNR-IEIIT
Published in: Italian Conference on Cyber Security (ITASEC), 2019
Publisher: CNR

When Blockchain Meets the Right to be Forgotten: Technology Versus Law in the Healthcare Industry

Author(s): Bayle, A., Koscina, M., Manset, D., & Perez-Kempner, O., gnùbila
Published in: IEEE/WIC/ACM International Conference on Web Intelligence (, 2018
Publisher: IEEE/WIC/ACM International Conference on Web Intelligence (

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0