Communications of the ACM
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
Semantic Access Control in Grid Computing
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Building an Encrypted File System on the EGEE grid: Application to Protein Sequence Analysis
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Scientific Programming
A Secure Storage Service for the gLite Middleware
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Long-term storage and management of encrypted biomedical data in real scenarios
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
A virtual laboratory for medical image analysis
IEEE Transactions on Information Technology in Biomedicine
Future Generation Computer Systems
A System for Building Clinical Research Applications using Semantic Web-Based Approach
Journal of Medical Systems
Clustering of distinct PACS archives using a cooperative peer-to-peer network
Computer Methods and Programs in Biomedicine
Journal of Biomedical Informatics
Assessing the Usability of a Science Gateway for Medical Knowledge Bases with TRENCADIS
Journal of Grid Computing
An efficient media ports resource discovery for service networks
International Journal of Business Information Systems
Hi-index | 0.01 |
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many use cases. The paper describes the architecture and processes, and also shows results obtained in a medical imaging platform.