Skip to main content

Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare

Deliverables

ASCLEPIOS Reference Architecture, Security and eHealth Use Cases, and Acceptance Criteria

Documentation of the overall architecture describing the main components and artefacts of ASCLEPIOS, the interconnection scheme and the specific interfaces for exchange of information among them will be designed and described in detail. Furthermore, a description of the security and eHealth use cases to be implemented and evaluated in WP6 will be described, as well as a suitable set of acceptance criteria for the validation of the mechanisms developed within ASCLEPIOS.

Design of protocols for key, firmware and workload management in ITEEs for medical devices

Document describing software and hardware features necessary to implement ITEEs that support efficient and scalable execution of workloads, isolated from powerful adversaries. This deliverable will further contain a set of protocols for key, firmware and workload management in ITEEs.

Remote attestation of workloads in ITEEs

This deliverable will contain a set of protocols for remote attestation of ITEEs on commodity platforms. Whenever a clear gap is identified, additional protocols will be developed based on security best practices and with a clear emphasis on robustness and scalability – two aspects that have not been sufficiently addressed by existing attestation protocols.

ASCLEPIOS Technical, Security, Healthcare and Data Privacy Requirements

Documentation of the technical and security requirements that will guide the development and will define the capabilities of the IT components of ASCLEPIOS. Furthermore, documentation of the specific requirements of participating healthcare organizations will be provided. This concrete list of requirements will also provide a complete strategy that will give valuable insights to healthcare organizations that wish to be GDPR compliant.

Attribute-Based Encryption, Dynamic Credentials and Ciphertext Delegation and Integration in Medical Devices

Overview of the existing Attribute-Based Encryption and Ciphertext Delegation schemes and analysis on how such schemes can help healthcare organizations to securely share data by also preserving users’ privacy. Finally, an analysis on how these schemes can be implemented in medical devices will be provided (i.e. devices with constraint resources).

Context-aware ABAC Enforcement Mechanism

This deliverable will provide and discuss all the software components designed for enabling the context-aware ABAC enforcement and raising the involved actors’ security awareness by indicating the logic of each authorization decision.

ASCLEPIOS Security and Policies Model

This deliverable will provide a model for formally capturing the background knowledge for enabling the ABAC and ABE paradigms, in terms of the ASCLEPIOS project, and it will also report on the semantics of context-based access control and ABE related policies.

ASCLEPIOS Models Editor and Interpretation Mechanism

This deliverable will report on the ASCLEPIOS’s policies editing and lifecycle management software components for ABAC and ABE in the healthcare application domain.

Technical Integration Points and Testing Plan

In-detail documentation of the technical architecture for the ASCLEPIOS platform and the detailed integration points among the framework's mechanisms. Documentation of an integration plan to guide the integration of the mechanisms of the ASCLEPIOS platform. In-detail documentation of the testing and evaluation plan to verify the proper functioning and performance of the integrated ASCLEPIOS platform.

Symmetric Searchable Encryption and Integration in Medical Devices

Documentation that reveals advantages and limitations of Symmetric Searchable Encryption schemes. Furthermore, a detailed analysis on how and under which conditions such schemes could be used by healthcare services will be provided.

Interim Dissemination, Communication and Stakeholders’ Activity Report

An interim report including all activities performed in Tasks T7.1, T7.2, T7.3 and T7.6 during the first reporting period, and a plan for the second period of the project.

GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers

D2.3 will focus on the provision of a set of GDPR-compliant analytics that can offer analytics services to providers that have access to encrypted data. The deliverable will also report on investigated analytics techniques used by CSPs and Healthcare Providers in order to secure their infrastructures.

Plan for Project’s Dissemination, Communication and Stakeholder’s Plan

This deliverable is related to the provision of a detailed plan for all dissemination, standardisation and communication activities that will be scheduled for the 1st reporting period of the project.

Interoperability of ITEEs in the context of eHealth systems

This deliverable will contain a framework of components and enablers to facilitate the development of applications that are portable across ITEEs from different vendors and effectively address the security needs specific to the context of eHealth systems. The framework will be described through an open specification that will facilitate further development of the framework.

Report on Cloud Computing Testbed

This deliverable will describe the architecture, components and operational policies of the cloud computing testbed that will be set up to host the ASCLEPIOS applications and demonstrators.

Project Website and Web 2.0 Channels

This deliverable is related to the provision of the Website of the project and will set up all needed Web 2.0 and social channels that will be used during the project for communication.

Searching for OpenAIRE data...

Publications

Attestation Waves: Platform Trust via Remote Power Analysis

Author(s): Delgado-Lozano, Ignacio M.; Martínez-Rodríguez, Macarena C.; Bakas, Alexandros; Brumley, Billy Bob; Michalas, Antonis
Published in: International Conference on Cryptology and Network Security, 7, 2021
Publisher: Springer

MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX

Author(s): A. Michalas, A. Bakas, H-V Dang , A. Zalitko
Published in: NordSec 2019: Secure IT Systems, 2019, Page(s) 254-270, ISBN 978-3-030-35055-0
Publisher: Springer
DOI: 10.1007/978-3-030-35055-0_18

Industry Simulation Gateway on a Scalable Cloud

Author(s): Kovacs, J., Kiss, T., Taylor, S.J.E., Farkas, A, Anagnostou, A., Pattison, G, Emodi, M, Kite, S., Petry, J, Snookes, G, Kacsuk, P. and Lovas, R.
Published in: Proceedings of the 12th International Workshop on Science Gateways (IWSG 2020), 2020
Publisher: CEUR Workshop Proceedings

Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments

Author(s): Michalas, A., Kiss, T.
Published in: 2020 IEEE 20th Mediterranean Electrotechnical Conference ( MELECON), 2020, ISSN 2158-8481
Publisher: IEEE
DOI: 10.1109/melecon48756.2020.9140712

Private Data Sharing in a Secure Cloud-based Application for Acute Stroke Care

Author(s): L. H. A. Reis, M. T. de Oliveira, D. M. F. Mattos, S. D. Olabarriaga
Published in: Proceedings of 2021 IEEE 34th International Symposium on Computer-Based Medical Systems (CBMS), 2021, Page(s) 568-573, ISBN 978-1-6654-4121-6
Publisher: IEEE
DOI: 10.1109/cbms52027.2021.00039

Towards a Cloud Native Big Data Platform using MiCADO

Author(s): Mosa, A., Kiss, T., Pierantoni, G., DesLauriers, J., Kagialis, D., Terstyanszky, G.
Published in: Proceedings of 2020 19th International Symposium on Parallel and Distributed Computing (ISPDC), 2020, ISBN 978-1-7281-8946-8
Publisher: IEEE
DOI: 10.1109/ispdc51135.2020.00025

Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives

Author(s): Bakas, A., Michalas, A.
Published in: Proceedings of 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021, Page(s) 1105-1112, ISSN 2324-898X
Publisher: IEEE
DOI: 10.1109/trustcom50675.2020.00146

Attribute-Based Symmetric Searchable Encryption

Author(s): Dang, H., Ullah, A., Bakas, A., & Michalas, A.
Published in: Proceedings of ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, 2020, ISBN 978-3-030-61638-0
Publisher: Springer
DOI: 10.1007/978-3-030-61638-0_18

On-demand Key Distribution for Cloud Networks

Author(s): N. Paladi, M. Tiloca, P. N. Bideh, M. Hell
Published in: 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), 2021, Page(s) 80-82, ISBN 978-1-7281-7705-2
Publisher: IEEE
DOI: 10.1109/icin51074.2021.9385528

Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX

Author(s): A. Michalas, A. Bakas, H-V Dang, A. Zalitko
Published in: Proceedings of the 10th ACM Cloud Computing Security Workshop (CCSW) in Conjunction with ACM Conference on Computer and Communications Security (CCS’19), 2019
Publisher: ACM
DOI: 10.1145/3338466.3358929

Nowhere to Leak: A Multi-Client Forward and Backward Private Symmetric Searchable Encryption Scheme

Author(s): Bakas, A., Michalas, A.
Published in: Barker K., Ghazinour K. (eds) Data and Applications Security and Privacy XXXV. DBSec 2021, 2021, Page(s) 84-95, ISBN 978-3-030-81242-3
Publisher: Springer
DOI: 10.1007/978-3-030-81242-3_5

ASCLEPIOS: Sharing and Analysing Healthcare Data in the Cloud with New Cryptographic Methods

Author(s): Krefting, D., Bowden, J., Michalas, A., Yitbarek Yigzaw, K., Y., Kiss, T., Penzel, T., Olabarriaga, S., D., Tuler de Oliveira, M., Verginadis, Y.
Published in: 65th Annual Meeting of the German Association for Medical Informatics, Biometry and Epidemiology (GMDS), Meeting of the Central European Network (CEN: German Region, Austro-Swiss Region and Polish Region) of the International Biometric Society (IBS), 2021
Publisher: GMS
DOI: 10.3205/20gmds163

Private Lives Matter: A Differential Private Functional Encryption Scheme

Author(s): Alexandtros Bakas, Antonis Michalas, Tassos Dimitriou
Published in: CODASPY '22: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy, 2022, Page(s) 300-311, ISBN 9781450392204
Publisher: ACM
DOI: 10.1145/3508398.3511514

Science gateways with embedded ontology-based e-learning support

Author(s): Kiss, T., Bolotov, A.,Pierantoni, G., Deslauriers, J., Mosa, A.,Kagialis, D., Terstyanszky, G., & Chan, D.
Published in: Proceedings of the 12th International Workshop on Science Gateways (IWSG 2020), 2020
Publisher: CEUR Workshop Proceedings

Healthcare and data privacy requirements for health institution cloud infrastructures: a qualitative analysis of clinician perspectives

Author(s): Chomutare, T., Yigzaw, K. Y., Olabarriaga, S. D., Makhlysheva, A., Tuler de Oliveira, M., Silsand, L., Krefting, D., Penzel, T., Hillen, C., & Bellika, J. G.
Published in: Proceedings of 2020 IEEE International Conference on E-health Networking, Application & Services (HEALTHCOM), 2021, Page(s) 1-8, ISBN 978-1-7281-6267-6
Publisher: IEEE
DOI: 10.1109/healthcom49281.2021.9399006

The lord of the shares - combining attribute-based encryption and searchable encryption for flexible data sharing

Author(s): Antonis Michalas
Published in: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019, Page(s) 146-155, ISBN 9781-450359337
Publisher: ACM
DOI: 10.1145/3297280.3297297

Do Not Tell Me What I Cannot Do! (The Constrained Device Shouted under the Cover of the Fog): Implementing Symmetric Searchable Encryption on Constrained Devices

Author(s): Eugene Frimpong, Alexandros Bakas, Hai-Van Dang, Antonis Michalas
Published in: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, 2020, Page(s) 119-129, ISBN 978-989-758-426-8
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0009413801190129

Protecting OpenFlow Flow Tables with Intel SGX

Author(s): Nicolae Paladi, Jakob Svenningsson, Jorge Medina, Patrik Arlos
Published in: Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos on - SIGCOMM Posters and Demos '19, 2019, Page(s) 146-147, ISBN 9781-450368865
Publisher: ACM Press
DOI: 10.1145/3342280.3342339

ABSTRACT - Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX

Author(s): Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19, 2019, Page(s) 183-183, ISBN 9781-450368261
Publisher: ACM Press
DOI: 10.1145/3338466.3358929

Protecting OpenFlow using Intel SGX

Author(s): Jorge Medina, Nicolae Paladiy, Patrik Arlosz
Published in: 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2019, Page(s) 1-6, ISBN 978-1-7281-4545-7
Publisher: IEEE
DOI: 10.1109/nfv-sdn47374.2019.9039980

Red Alert: Break-Glass Protocol to Access Encrypted Medical Records in the Cloud

Author(s): Marcela Tuler de Oliveira, Antonis Michalas, Adrien E. D. Groot, Henk A. Marquering, Silvia Delgado Olabarriaga
Published in: 2019 IEEE International Conference on E-health Networking, Application & Services (HealthCom), 2019, Page(s) 1-7, ISBN 978-1-7281-0402-7
Publisher: IEEE
DOI: 10.1109/healthcom46333.2019.9009598

A Secure Cloud-based Platform to Host Healthcare Applications

Author(s): Pierantoni, G., Kiss, T., Terstyanszky, G., Dang, H., Delgado Olabarriaga, S., Tuler de Olivera, M., Yigzaw, K. Y., Belika, J. G., Krefting, D. and Penzel, T
Published in: 11th International Workshop on Science Gateways, IWSG 2019, 2019
Publisher: IWSG 2019

A generic cloud-agnostic platform to support the execution of deadline-constrained workloads,

Author(s): Ullah, A., Deslauriers, J., Kiss, T
Published in: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020, 2020
Publisher: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries

Author(s): Baka, A.; Michalas, A.
Published in: Proceedings of the 25th IEEE International Conference on Communications (ISCC), 2019
Publisher: Proceedings of the 25th IEEE International Conference on Communications (ISCC)

A context-aware security model for a combination of attribute-based access control and attribute-based encryption in the healthcare domain

Author(s): Psarra, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Menztas, G.
Published in: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020), 2020
Publisher: Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020)

Deploying and auto-scaling scientific applications in the cloud using Terraform and MiCADO

Author(s): Ariyattu, R. Deslauriers, J., Kiss T
Published in: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020, 2020
Publisher: 2nd Annual Research Software London Workshop RSLondonSouthEast 2020

Securing Access to Healthcare Data with Context-aware Policies

Author(s): Psara, E., Verginadis, Y., Patiniotakis, I., Apostolou, D., Menztas, G
Published in: Proceedings of The 11th International Conference on Information, Intelligence, Systems and Applications (IISA 2020, 2020
Publisher: Proceedings of The 11th International Conference on Information, Intelligence, Systems and Applications (IISA 2020

Cryptography on Untrustworthy Cloud Storage for Healthcare Applications: A Performance Analysis

Author(s): Lúcio H A Reis, Marcela T. de Oliveira, James Bowden, Dagmar Krefting, Silvia D Olabarriga & Diogo M F Mattos
Published in: 2021 XI Brazilian Symposium on Computing Systems Engineering (SBESC), 2021, ISSN 2324-7894
Publisher: IEEE
DOI: 10.1109/sbesc53686.2021.9628260

Innovations in Simulation: Experiences With Cloud-Based Simulation Experimentation

Author(s): Simon J E Taylor, Anastasia Anagnostou, Nura Abubakar, Tamas Kiss, James Deslauriers, Gabor Terstyanszky, Peter Kacsuk, Jozsef Kovacs, Shane Kite, Gary Pattison, James Petry
Published in: Proceedings of 2020 Winter Simulation Conference (WSC), 2020
Publisher: IEEE
DOI: 10.1109/wsc48552.2020.9383971

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Author(s): Bakas, A., Michalas, A., Ullah, A.
Published in: Proceedings of 5th Nordic Conference, NordSec 2020, 2020, Page(s) 111-126, ISBN 978-3-030-70852-8
Publisher: Springer
DOI: 10.1007/978-3-030-70852-8_7

Blind Faith: Privacy-Preserving Machine Learning Using Function Approximation

Author(s): Khan, T., Bakas, A., Michalas, A.
Published in: Proceedings of 2021 IEEE Symposium on Computers and Communications (ISCC), 2021, Page(s) 1-7, ISSN 2642-7389
Publisher: IEEE
DOI: 10.1109/iscc53001.2021.9631509

Accessing electronic health records in criticalincidents using context-aware attribute-basedaccess control

Author(s): Evgenia Psarra, Yiannis Verginadis, Ioannis Patiniotakis, Dimitris Apostolou, Gregoris Mentzas
Published in: Intelligent Decision Technologies, 15, 2022, Page(s) 667-679, ISSN 1872-4981
Publisher: IOS Press
DOI: 10.3233/idt-210214

Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping Review

Author(s): T. Tervoort, M. T. De Oliveira, W. Pieters, P. Van Gelder, S. D. Olabarriaga and H. Marquering
Published in: IEEE Access, 8, 2020, Page(s) 84352-84361, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2020.2984376

Describing and Processing Topology and Quality of Service Parameters of Applications in the Cloud

Author(s): Gabriele Pierantoni, Tamas Kiss, Gabor Terstyanszky, James Deslauriers, Gregoire Gesmier,Hai-Van Dang
Published in: Journal of Grid Computing, 2020, ISSN 1570-7873
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10723-020-09524-0

Privacy-preserving audit and feedback on the antibiotic prescribing of General Practitioners

Author(s): Kassaye Yitbarek Yigzaw, Taridzo Chomutare, Rolf Wynn, Gro Karine Rosvold Berntsen, Johan Gustav Bellika
Published in: JMIR Formative Research, 2022, ISSN 1438-8871
Publisher: Journal of medical Internet Research
DOI: 10.2196/31650

The Cloud we Share: Access Control on Symmetrically Encrypted Data in Untrusted Clouds

Author(s): ALEXANDROS BAKAS, HAI-VAN DANG, ANTONIS MICHALAS, ALEXANDR ZALITKO
Published in: IEEE Access, 2020, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/ACCESS.2020.3038838

Cloud Apps To-Go: Cloud Portability with TOSCA and MiCADO

Author(s): Deslauriers, J., Kiss, T., Ariyattu, R., Dang, H-V., Ullah, A., Bowden, J., Krefting, D., Pierantoni, G., & Terstyanszky, G.
Published in: Concurrency and Computation: Practice and Experience, 2020, ISSN 1532-0634
Publisher: John Wiley & Sons
DOI: 10.1002/cpe.6093

Measuring success for a future vision: Defining impact in science gateways/virtual research environments

Author(s): Calyam, P., et al
Published in: Concurrency and Computation: Practice and Experience, 2021, ISSN 1532-0626
Publisher: John Wiley & Sons Inc.
DOI: 10.1002/cpe.6099

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Author(s): Ullah, A., Dagdeviren, H., Arjun, R., Deslauriers, J., Kiss, T., & Bowden, J.
Published in: Journal of Grid Computing, 2021, ISSN 1570-7873
Publisher: Kluwer Academic Publishers
DOI: 10.1007/s10723-021-09589-5

AC-AC: Dynamic revocable access control for acute care teams to access medical records

Author(s): Marcela T. de Oliveira, Hai-Van Dang, Lúcio H. A. Reis, Henk A. Marquering, Sílvia D. Olabarriaga
Published in: Smart Health, 2021, ISSN 2352-6483
Publisher: Elsevier
DOI: 10.1016/j.smhl.2021.100190

Test, Trace, and Put on the Blockchain?: A Viewpoint Evaluating the Use of Decentralized Systems for Algorithmic Contact Tracing to Combat a Global Pandemic

Author(s): Platt M, Hasselgren A, Román-Belmonte JM, Tuler de Oliveira M, De la Corte-Rodríguez H, Delgado Olabarriaga S, Rodríguez-Merchán EC, Mackey TK
Published in: JMIR Public Health and Surveillance, 2021, ISSN 2369-2960
Publisher: JMIR Publications
DOI: 10.2196/26460

A break-glass protocol based on ciphertext-policy attribute-based encryption to access medical records in the cloud

Author(s): Marcela T. de Oliveira, Alexandros Bakas, Eugene Frimpong, Adrien E. D. Groot, Henk A. Marquering, Antonis Michalas, Silvia D. Olabarriaga
Published in: Annals of Telecommunications, 75/3-4, 2020, Page(s) 103-119, ISSN 0003-4347
Publisher: Springer Verlag
DOI: 10.1007/s12243-020-00759-2

Network physiology in insomnia patients: Assessment of relevant changes in network topology with interpretable machine learning models

Author(s): Christoph Jansen, Thomas Penzel, Stephan Hodel, Stefanie Breuer, Martin Spott, Dagmar Krefting
Published in: Chaos: An Interdisciplinary Journal of Nonlinear Science, 29/12, 2019, Page(s) 123129, ISSN 1054-1500
Publisher: American Institute of Physics
DOI: 10.1063/1.5128003

Blockchain reputation-based consensus: A scalable and resilient mechanism for distributed mistrusting applications

Author(s): """Marcela T. de Oliveira, Lúcio H. A. Reis Dianne S. V. Medeiros, Ricardo C. Carrano, Sílvia D. Olabarriaga, Diogo M.F. Mattos"""
Published in: Computer Networks, 2020, ISSN 1389-1286
Publisher: Elsevier BV
DOI: 10.1016/j.comnet.2020.107367

Health data security and privacy: Challenges and solutions for the future

Author(s): Kassaye Yitbarek Yigzaw, Sílvia Delgado Olabarriaga, Antonis Michalas, Luis Marco-Ruiz, Christiaan Hillen, Yiannis Verginadis, Marcela Tuler de Oliveira, Dagmar Krefting, Thomas Penzel, James Bowden, Johan Gustav Bellika, Taridzo Chomutare
Published in: In Roadmap to Successful Digital Health Ecosystems: A Global Perspective, 2022, Page(s) 335-362, ISBN 978-0-12-823413-6
Publisher: Elsevier
DOI: 10.1016/b978-0-12-823413-6.00014-8

Correction to: MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX

Author(s): Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko
Published in: Secure IT Systems - 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings, 11875, 2019, Page(s) C1-C1, ISBN 978-3-030-35054-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-35055-0_18

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX

Author(s): Alexandros Bakas, Antonis Michalas
Published in: Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part II, 305, 2019, Page(s) 472-486, ISBN 978-3-030-37230-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-37231-6_28

Privacy-preserving architecture for providing feedback to clinicians on their clinical performance

Author(s): Yigzaw K. Y., Budrionis A., Marco-Ruiz L., Henriksen T. D., Halvorsen P. A., Bellika J. G.
Published in: BMC Medical Informatics and Decision Making, 2020
Publisher: Springer Nature