106,096 research outputs found

    "Regulating Healthcare Technologies and Medical Supplies: A Comparative Overview"

    Get PDF
    A complex relationship exists among EU regulations, current national practices and rules, institutional capacities to implement regulatory adjustments and the legacy of past health and regulatory policy and traditions. However, there is little empirical information on medical devices policy, the medical devices industry, and the assurance of medical device safety and usage. Drawing on a review of the secondary literature and on-going field work, the evidence suggests that the current mix of statecentric and self-regulatory traditions will be as important in determining the implementation and final outcomes of EU-rules as the new rules themselves. EU directives redesign rules, but they do not necessarily lead to institutional change, create institutional capacities, or alter old practices in the short term. Neither EU directives nor national regulatory adjustments determine the "man-machine/skill-experience" interface which is shaped and influenced by local medical traditions and the acceptance of these traditions by local publics

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques

    Technical Report on Deploying a highly secured OpenStack Cloud Infrastructure using BradStack as a Case Study

    Full text link
    Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud deployments are paramount for institution and organizations of all scales. The availability of a flexible, free open source cloud platform designed with no propriety software and the ability of its integration with legacy systems and third-party applications are fundamental. Open stack is a free and opensource software released under the terms of Apache license with a fragmented and distributed architecture making it highly flexible. This project was initiated and aimed at designing a secured cloud infrastructure called BradStack, which is built on OpenStack in the Computing Laboratory at the University of Bradford. In this report, we present and discuss the steps required in deploying a secured BradStack Multi-node cloud infrastructure and conducting Penetration testing on OpenStack Services to validate the effectiveness of the security controls on the BradStack platform. This report serves as a practical guideline, focusing on security and practical infrastructure related issues. It also serves as a reference for institutions looking at the possibilities of implementing a secured cloud solution.Comment: 38 pages, 19 figures
    corecore