62,899 research outputs found
Recommended from our members
Patient privacy protection using anonymous access control techniques
Objective: The objective of this study is to develop a solution to preserve security and privacy in a healthcare environment where health-sensitive information will be accessed by many parties and stored in various distributed databases. The solution should maintain anonymous medical records and it should be able to link anonymous medical information in distributed databases into a single patient medical record with the patient identity. Methods: In this paper we present a protocol that can be used to authenticate and authorize patients to healthcare services without providing the patient identification. Healthcare service can identify the patient using separate temporary identities in each identification session and medical records are linked to these temporary identities. Temporary identities can be used to enable record linkage and reverse track real patient identity in critical medical situations. Results: The proposed protocol provides main security and privacy services such as user anonymity, message privacy, message confidentiality, user authentication, user authorization and message replay attacks. The medical environment validates the patient at the healthcare service as a real and registered patient for the medical services. Using the proposed protocol, the patient anonymous medical records at different healthcare services can be linked into one single report and it is possible to securely reverse track anonymous patient into the real identity. Conclusion: The protocol protects the patient privacy with a secure anonymous authentication to healthcare services and medical record registries according to the European and the UK legislations, where the patient real identity is not disclosed with the distributed patient medical records
The Price of Progress: Funding and Financing Alzheimer\u27s Disease Drug Development
Introduction Advancing research and treatment for Alzheimer\u27s disease (AD) and the search for effective treatments depend on a complex financial ecosystem involving federal, state, industry, advocacy, venture capital, and philanthropy funding approaches. Methods We conducted an expert review of the literature pertaining to funding and financing of translational research and drug development for AD. Results The federal government is the largest public funder of research in AD. The National Institute on Aging, National Institute of Mental Health, National Institute of General Medical Sciences, and National Center for Advancing Translational Science all fund aspects of research in AD drug development. Non-National Institutes of Health federal funding comes from the National Science Foundation, Veterans Administration, Food and Drug Administration, and the Center for Medicare and Medicaid Services. Academic Medical Centers host much of the federally funded basic science research and are increasingly involved in drug development. Funding of the “Valley of Death” involves philanthropy and federal funding through small business programs and private equity from seed capital, angel investors, and venture capital companies. Advocacy groups fund both basic science and clinical trials. The Alzheimer Association is the advocacy organization with the largest research support portfolio relevant to AD drug development. Pharmaceutical companies are the largest supporters of biomedical research worldwide; companies are most interested in late stage de-risked drugs. Drugs progressing into phase II and III are candidates for pharmaceutical industry support through licensing, mergers and acquisitions, and co-development collaborations. Discussion Together, the funding and financing entities involved in supporting AD drug development comprise a complex, interactive, dynamic financial ecosystem. Funding source interaction is largely unstructured and available funding is insufficient to meet all demands for new therapies. Novel approaches to funding such as mega-funds have been proposed and more integration of component parts would assist in accelerating drug development
CHORUS Deliverable 3.4: Vision Document
The goal of the CHORUS Vision Document is to create a high level vision on audio-visual search engines in order to give guidance to the future R&D work in this area and to highlight trends and challenges in this domain. The vision of CHORUS is strongly connected to the CHORUS Roadmap Document (D2.3). A concise document integrating the outcomes of the two deliverables will be prepared for the end of the project (NEM Summit)
Security functions for a file repository
When personal machines are incorporated into distributed\ud
systems a new mixture of threats is exposed.\ud
The security effort in the MobyDick project\ud
is aimed at understanding how privacy can be protected\ud
in this new environment. Our claim is that\ud
a two-step process for authentication and authorisation\ud
is required, but also sufficient. The research\ud
vehicle is a distributed file repository
Integrating Research Data Management into Geographical Information Systems
Ocean modelling requires the production of high-fidelity computational meshes
upon which to solve the equations of motion. The production of such meshes by
hand is often infeasible, considering the complexity of the bathymetry and
coastlines. The use of Geographical Information Systems (GIS) is therefore a
key component to discretising the region of interest and producing a mesh
appropriate to resolve the dynamics. However, all data associated with the
production of a mesh must be provided in order to contribute to the overall
recomputability of the subsequent simulation. This work presents the
integration of research data management in QMesh, a tool for generating meshes
using GIS. The tool uses the PyRDM library to provide a quick and easy way for
scientists to publish meshes, and all data required to regenerate them, to
persistent online repositories. These repositories are assigned unique
identifiers to enable proper citation of the meshes in journal articles.Comment: Accepted, camera-ready version. To appear in the Proceedings of the
5th International Workshop on Semantic Digital Archives
(http://sda2015.dke-research.de/), held in Pozna\'n, Poland on 18 September
2015 as part of the 19th International Conference on Theory and Practice of
Digital Libraries (http://tpdl2015.info/
Visions and Challenges in Managing and Preserving Data to Measure Quality of Life
Health-related data analysis plays an important role in self-knowledge,
disease prevention, diagnosis, and quality of life assessment. With the advent
of data-driven solutions, a myriad of apps and Internet of Things (IoT) devices
(wearables, home-medical sensors, etc) facilitates data collection and provide
cloud storage with a central administration. More recently, blockchain and
other distributed ledgers became available as alternative storage options based
on decentralised organisation systems. We bring attention to the human data
bleeding problem and argue that neither centralised nor decentralised system
organisations are a magic bullet for data-driven innovation if individual,
community and societal values are ignored. The motivation for this position
paper is to elaborate on strategies to protect privacy as well as to encourage
data sharing and support open data without requiring a complex access protocol
for researchers. Our main contribution is to outline the design of a
self-regulated Open Health Archive (OHA) system with focus on quality of life
(QoL) data.Comment: DSS 2018: Data-Driven Self-Regulating System
Anonymous network access using the digital marketplace
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access
- …