Deliverables


Year 3 Deliverables

Deliverable Title Type Download
1.3.3 Project Management Report REPORT
1.5.3 Data management report REPORT
2.4.3 SHiELD SecDevOps OTHER
3.4 Policy and regulatory recommendations REPORT
4.4 Privacy by design models and tools: final release plus documentation OTHER
5.1.3 Mobile devices tamper detection: requirements and design OTHER
5.2.3 Data sensitivity analysis tools OTHER
5.3.3 Consent Management OTHER
5.4.3 Data hiding tools OTHER
5.5.3 Security monitoring and compliance assurance OTHER
6.3.2 Intermediate validation experiments REPORT
6.4.1 Final validation experiments REPORT
6.4.2 Final validation experiments REPORT
6.5 Best Practices REPORT
7.4.2 Updated Exploitation Plan and Report REPORT
7.6.3 Periodic Dissemination and Standardization Report REPORT

Year 2 Deliverables

Deliverable Title Type Download
1.3.2 Project Management Report REPORT
1.5.2 Data management report REPORT
2.4.1 SHiELD SecDevOps OTHER
2.4.2 SHiELD SecDevOps OTHER
3.2 Report on privacy by design approach REPORT
3.3 Report on authorisation methods to augment traditional approaches REPORT
4.2 Privacy by design models and tools: first full prototype plus documentation OTHER
4.3 Privacy by design models and tools: refined prototype plus documentation OTHER
5.1.2 Mobile devices tamper detection: requirements and design OTHER
5.2.2 Data sensitivity analysis tools OTHER
5.3.2 Consent Management OTHER
5.4.2 Data hiding tools OTHER
5.5.2 Security monitoring and compliance assurance OTHER
6.2.1 Initial validation experiments REPORT
6.2.2 Initial validation experiments REPORT
6.3.1 Intermediate validation experiments REPORT
7.4.1 Updated Exploitation Plan and Report REPORT
7.6.2 Periodic Dissemination and Standardization Report REPORT

Year 1 Deliverables

Deliverable Title Type Download
1.1 Project Manual and Quality Plan REPORT
1.2 Risk assessment and contingency plan REPORT
1.3.1 Project Management Report REPORT
1.4 Data management plan REPORT
1.5.1 Data management report REPORT
1.6 Ethical protocols and approval REPORT
2.1 eHealth security challenges REPORT
2.2 SHiELD Requirements Analysis REPORT
2.3 SHiELD Architecture REPORT
3.1 Report on legal requirements REPORT
4.1 Privacy by design models and tools: proof of concept OTHER
5.1.1 Mobile devices tamper detection: requirements and design OTHER
5.2.1 Data sensitivity analysis tools OTHER
5.3.1 Consent Management OTHER
5.4.1 Data hiding tools OTHER
5.5.1 Security monitoring and compliance assurance OTHER
6.1 Use case specification and validation methodology REPORT
7.1 Market Analysis Report REPORT
7.2 Exploitation plan REPORT
7.3 Business Scenario Analysis Report REPORT
7.5 Dissemination and Standardization Plan REPORT
7.6.1 Periodic Dissemination and Standardization Report REPORT