5 research outputs found

    Levels of Privacy for eHealth Systems in the Cloud Era

    Get PDF
    Enforcing in code privacy laws, internal company rules and principles like Privacy by Design is recognized as a challenge for the IT industry. In this paper we analyze the steps required and propose a guide towards this major goal. Our proposal is to emphasize the need to overcome the limits of service orchestration and create strong privacy and security enabling architectures based on two main ideas. The first idea is to use a semantic firewall that is capable to check privacy properties for the communication between applications and cloud and between cloud\u27s sub-systems. The second idea is to improve current SOA architectures with architectures based on executable choreographies that can be formally verified. In this paper we identify three types of executable choreographies. New types of abstraction which machines can verify and humans can trust are enabled by executable choreographies that act like truly verifiable environments for cloud applications

    Extending Swarm Communication to Unify Choreography and Long-lived Processes

    Get PDF
    The usual way of doing message passing is to have relatively intelligent processes, objects or actors sending and receiving dumb messages. Swarm communication presents the inverted approach of thinking to messages as relatively smart beings, visiting relatively non intelligent places, to produce better code and a new path for integrating complex applications. Swarm communication can be used as software architecture for an Enterprise Service Bus. This paper extends the swarm communication to support long-lived processes, providing an alternative approach to the standard techniques for executable Business Process Management. The ubiquity of connected devices is a fertile ground for new approaches to application development and systems integration based on complex business processes

    Diversification in an image retrieval system based on text and image processing

    Get PDF
    In this paper we present an image retrieval system created within the research project MUCKE (Multimedia and User Credibility Knowledge Extraction), a CHIST-ERA research project where UAIC{\footnote{"Alexandru Ioan Cuza" University of Iasi}} is one of the partners{\footnote{Together with Technical University from Wienna, Austria, CEA-LIST Institute from Paris, France and BILKENT University from Ankara, Turkey}}. Our discussion in this work will focus mainly on components that are part of our image retrieval system proposed in MUCKE, and we present the work done by the UAIC group. MUCKE incorporates modules for processing multimedia content in different modes and languages (like English, French, German and Romanian) and UAIC is responsible with text processing tasks (for Romanian and English). One of the problems addressed by our work is related to search results diversification. In order to solve this problem, we first process the user queries in both languages and secondly, we create clusters of similar images
    corecore