Mohamed Layouni

Learn More
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present a privacy-preserving protocol for the Belgian healthcare system. The proposed protocol protects the patients' privacy throughout the prescription handling process, while complying(More)
Advances in communication technology have opened a myr-iad of new possibilities for the remote delivery of healthcare. This new form of service delivery, not only contributes to the democratization of healthcare, by reaching faraway populations, but also makes it possible for elderly and chronically-ill patients to have their health monitored while in the(More)
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Intrusion-tolerance is to preserve an acceptable, though possibly degraded, service of the overall system despite intrusions at some of its sub-parts. In this paper, we present a(More)
Privacy-preserving digital credentials are cryptographic tools that allow a user to prove a predicate about his/her identity or qualifications , without the verifying party learning additional information beyond the status of that predicate. The Identity Mixer (Idemix) [CL01] is a framework providing such credentials. In Idemix, we can distinguish two types(More)
With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this paper, we consider the problem of protecting personal information according to privacy policies defined by the data subjects. More specifically, we propose a new primitive allowing a data(More)
In this paper, we present a correctness proof of the Intrusion-tolerant Enclaves protocol [10]. Enclaves is a group-membership protocol. It assumes a Byzantine failure model, and has a maximum resiliency of one third. To carry out the proof, we adaptively combine a number of techniques, namely model checking, theorem proving and analytical mathematics. We(More)
Pipeline systems are an essential component of the oil and gas supply chain today. Although considered among the safest transportation methods, pipelines are still prone to failure due to corrosion and other types of defects. Such failures can lead to serious accidents resulting in big losses to life and the environment. It is therefore crucial for pipeline(More)
We consider a setting where records containing sensitive personal information are stored on a remote database managed by a storage provider. Each record in the database is co-owned by a fixed number of parties called data-subjects. The paper proposes a protocol that allows data-subjects to grant access to their records, to self-approved parties, without the(More)
  • 1