Loading [MathJax]/extensions/MathZoom.js
A. S. Z. Adam Belloum - IEEE Xplore Author Profile

Showing 1-25 of 57 results

Results

Healthcare data exchange standard, FHIR is becoming the widely adopted standard for data exchange and storage of health data. However, there is still some learning curve involved when it comes to using the data for analytical purpose. In our research we have devised a generic approach to ingest FHIR data into tabular format that is suited for analytical purpose. Our approach reduces the learning b...Show More
This research introduces a customizable proxy to enhance the security and governance of Apache Kafka. The proxy uses TransformNode, DecisionNode, and ObserverNode controls to manage data flows without modifying existing client applications. Initial tests show negligible latency impact, validating its effectiveness in improving Kafka’s security and governance capabilities while maintaining system e...Show More
Preserving privacy in blockchain-based systems is crucial for ensuring anonymity and confidentiality during transactions. While cryptographic solutions can address on-chain privacy concerns, their implementation on blockchains may introduce performance overhead, which remains unclear to researchers and practitioners. This paper investigates the performance impact of integrating zero-knowledge proo...Show More
We report on the ideas and experiences of adapting Brane, a workflow execution framework, for use cases involving medical data exchange and processing. These use cases impose new requirements on the system to enforce policies encoding safety properties, ranging from access control to legal regulations pertaining to data privacy. Our approach emphasizes users' control over the extent to which they ...Show More
On the road towards personalised medicine, one of the main challenges is to enforce security and network low-level policies to secure data-sharing. The proposed dynamic framework defines the topology of the service chains to enforce network and security policies by instantiating Virtual Network Functions (VNF's) on the fly via light-weight and easily-deployable containers. In this paper, we profil...Show More
Federated Learning enables distributed data holders to train a shared machine learning model on their collective data. It provides some measure of privacy by not requiring the data be pooled and centralized but still has been shown to be vulnerable to adversarial attacks. Differential Privacy provides rigorous guarantees and sufficient protection against adversarial attacks and has been widely emp...Show More
Regardless of the context and rationale, running distributed applications on geographically dispersed IT resources often comes with various technical and organizational challenges. If not addressed appropriately, these challenges may impede development, and in turn, scientific and business innovation. We have developed the Brane framework to support implementers in addressing these challenges. Bra...Show More
Utilising programmable infrastructures is a promising approach to support secure data-sharing across healthcare domains of different capabilities in terms of network and security. The EPI1 (Enabling Personalised Interventions) framework automates the setup of the underlying infrastructure while considering different requirements communicated by the EPI components, such as logic area generator and ...Show More
The push for data sharing and data processing across organisational boundaries creates challenges at many levels of the software stack. Data sharing and processing rely on the participating parties agreeing on the permitted operations and expressing them into actionable contracts and policies. Converting these contracts and policies into an operational infrastructure is still a matter of research ...Show More
While political commitments for building exascale systems have been made, turning these systems into platforms for a wide range of exascale applications faces several technical, organisational and skills-related challenges. The key technical challenges are related to the availability of data. While the first exascale machines are likely to be built within a single site, the input data is in many c...Show More
In this paper we discuss our efforts in "unlocking" the Long Term Archive (LTA) of the LOFAR radio telescope. This is a large (> 43 PB) archive that expands with about 7 PB per year by the ingestion of new observations. It consists of coarsely calibrated "visibilities", i.e. correlations between signals from LOFAR stations. Currently, only a small fraction of the LOFAR LTA consists of sky maps, wh...Show More
Machine learning models recently have seen a large increase in usage across different disciplines. Their ability to learn complex concepts from the data and perform sophisticated tasks combined with their ability to leverage vast computational infrastructures available today have made them a very attractive choice for many challenges in academia and industry. In this context, deep Learning as a su...Show More
Applications and infrastructures are increasingly becoming more complex. Infrastructures have several layers of virtualisation, programmability and management while scientific applications are diverse in their computing model archetypes. Mapping these two opposing ends of the stack is a non-trivial task. Here we propose a new programming paradigm and architecture that takes into account the differ...Show More
Privacy considerations obligate careful and secure processing of personal data. This is especially true when personal data is linked against databases from other organizations. During such endeavours, privacy-preserving record linkage (PPRL) can be utilized to prevent needless exposure of sensitive information to other organizations. With the increase of personal data that is being gathered and an...Show More
Despite the recent dramatic advances in the computational and data processing capacities of the commodity solutions, a numerous scientific, socioeconomic and industrial “grand challenges” exists that could be solved only through capabilities that exceed the current solutions by orders of magnitude. To demonstrate the feasibility of addressing these problems necessitating processing of exascale dat...Show More
Data manipulation is often named as a serious threat to data integrity. Data can be tampered with, and malicious actors could use this to their advantage. Data users in various application domains want to be ensured that the data they are consuming are accurate and have not been tampered with. To validate the integrity of these data, we describe a blockchain-based hash validation method. The metho...Show More
With the increasing amount of data the importance of data analysis has grown. A large amount of this data has shifted to cloud-based storage. The cloud offers storage and computation power. The Cookery framework is a tool developed to build application in the cloud for scientists without a complete understanding of programming. In this paper with present the cookery systems and how it can be used ...Show More
This paper presents the Data Science Model Curriculum (MC-DS) that is based on the Data Science Competence Framework and Data Science Body of Knowledge defined in EDISON Data Science Framework (EDSF). MC-DS follows a competence-based curriculum design approach grounded in the Data Science competences (CD-DS) defined in EDSF and correspondingly defined Learning Outcomes (LO). The DSBoK provides a b...Show More
Data Science is an emerging field of science, which requires a multi-disciplinary approach and is based on the Big Data and data intensive technologies that both provide a basis for effective use of the data driven research and economy models. Modern data driven research and industry require new types of specialists that are capable to support all stages of the data lifecycle from data production ...Show More
Data Science is becoming a field connecting multi-year development in areas such as Big Data and Data Analytics, and also applied domains like Bioengineering. Data Science education programs are rapidly being created on all levels. Usually it happens through reuse or renaming and can result in curricula that lack proper balance of competences, which balance is necessary for future data scientists....Show More
Data Science is an emerging field of science, which requires a multi-disciplinary approach and should be built with a strong link to emerging Big Data and data driven technologies, and consequently needs re-thinking and re-design of both traditional educational models and existing courses. The education and training of Data Scientists currently lacks a commonly accepted, harmonized instructional m...Show More
For many medical applications, it's challenging to access large datasets, which are often hosted across different domains on heterogeneous infrastructures. Homogenizing the infrastructure to simplify data access is unrealistic; therefore, it's important to develop distributed storage that doesn't introduce added complexity. Here, a solution is investigated that flexibly federates data on clouds or...Show More
Cloud service providers support many different standards in authentication and resource management. Libraries and APIs provided to operate in a cloud environment are not consistent and require deep understanding of internal technical aspects. Thus, we propose a framework that provides high-level language to develop applications and, thanks to its layered structure, API to modify low-level operatio...Show More
Applying suitable application models is essential to achieve efficient execution of the applications, effective development process and assure application portability and reusability. We observe that execution environments and the cloud environment in particular, lack of tools that would make it more available from a programmer perspective. Complexity and variety of libraries and authentication me...Show More
This paper presents results and experience by the authors based on the few delivered courses on Cloud Computing for different target groups of students, specialists and trainees. The developed courses implement the proposed by the authors instructional methodology integrating the two major concepts of effective learning: the Bloom's Taxonomy of cognitive learning processes and Andragogy as the adu...Show More