Player is loading...


Embed code


Note: this content has been automatically generated.
no i'm that way that i'm working on privacy preserving data sharing
data sharing is already and will become even more in the future a key enabler in multiple domains
such as personalise health targeted marketing or even research general
if we take the example of personalise have data sharing is particularly in boston
for two main reasons first patients go to different places different hospitals to be treated
which means that then maybe can date that have to be shared among these different bases in order to ensure a correct treatments
the second reason is that in order to enable medical studies which requires
large amounts of data data i have to be shared among multiple speed that's
however these data are very sensitive this is the case for medical
data but this is also the case for data in other domains
usually people do not want to share these they uh they want to keep them private
this is why the data of to be protected before they can be sure
and this is why we are working on privacy preserving that i share we think that a solution
for this should fulfil if a four main requirements first it shouldn't have a single point of failure
which means that the trust should be distributed among multiple entities
the confidentiality of the data in the privacy of the evidence as to be sure
and finally an individual should be able to check how is that i'll share
if we take the example of a patient the patients should be able to check
that is medical data i only use for specific studies to the use to which you agreed to participate
and so we are already working on this we uh
presented a frosty standard fulfil these requirements and enable data exploration
for example we can uh count how many patients
satisfy specific criteria from moment to but it does
and we are now working on an assistant to directly computers on the distributed data bases
uh at the same time we are trying to deploy this solutions a moment to but it does it's it's thank you

Share this talk: 

Conference Program

Welcome address
Martin Vetterli, President of EPFL
6 June 2019 · 9:48 a.m.
James Larus, Dean of IC School, EPFL
6 June 2019 · 9:58 a.m.
Jean-Pierre Hubaux, IC Research Day co-chair
6 June 2019 · 10:07 a.m.
Adventures in electronic voting research
Dan Wallach, Professor at Rice University, Houston, USA
6 June 2019 · 10:14 a.m.
When foes are friends: adversarial examples as protective technologies
Carmela Troncoso, Assistant Professor at EPFL
6 June 2019 · 11:09 a.m.
Low-Latency Metadata Protection for Organizational Networks
Ludovic Barman, LCA1|DeDiS, EPFL
6 June 2019 · noon
Interactive comparison-based search, and
Daniyar Chumbalov, INDY 1, EPFL
6 June 2019 · 12:06 p.m.
Decentralized, Secure and Verifiable Data Sharing
David Froelicher, LCA1|DeDiS, EPFL
6 June 2019 · 12:09 p.m.
Communication Efficient Decentralised Machine Learning
Anastasia Koloskova, MLO, EPFL
6 June 2019 · 12:11 p.m.
Detecting the Unexpected via Image Resynthesis
Krzysztof Lis, CVLab, EPFL
6 June 2019 · 12:14 p.m.
Sublinear Algorithms for Graph Processing
Aida Mousavifar, THL4, EPFL
6 June 2019 · 12:16 p.m.
Protecting the Metadata of Your Secret Messages
Kirill Nikitin, DEDIS, EPFL
6 June 2019 · 12:18 p.m.
Teaching a machine learning algorithm faster
Farnood Salehi, INDY 2, EPFL
6 June 2019 · 12:21 p.m.
Secure Microarchitectural Design
Atri Bhattacharyya, PARSA/HexHive, EPFL
6 June 2019 · 12:23 p.m.
Security testing hard to reach code
Mathias Payer, Assistant Professor at EPFL
6 June 2019 · 1:50 p.m.
Best Research Presentation Award Ceremony
Bryan Ford, Jean-Pierre Hubaux, Deirdre Rochat, EPFL
6 June 2019 · 3:54 p.m.