38,494 research outputs found
Zero and low carbon buildings: A driver for change in working practices and the use of computer modelling and visualization
Buildings account for significant carbon dioxide emissions, both in construction and operation. Governments around the world are setting targets and legislating to reduce the carbon emissions related to the built environment. Challenges presented by increasingly rigorous standards for construction projects will mean a paradigm shift in how new buildings are designed and managed. This will lead to the need for computational modelling and visualization of buildings and their energy performance throughout the life-cycle of the building.
This paper briefly outline how the UK government is planning to reduce carbon emissions for new buildings. It discusses the challenges faced by the architectural, construction and building management professions in adjusting to the proposed requirements for low or zero carbon buildings. It then outlines how software tools, including the use of visualization tools, could develop to support the designer, contractor and user
Audit-based Compliance Control (AC2) for EHR Systems
Traditionally, medical data is stored and processed using paper-based files. Recently, medical facilities have started to store, access and exchange medical data in digital form. The drivers for this change are mainly demands for cost reduction, and higher quality of health care. The main concerns when dealing with medical data are availability and confidentiality. Unavailability (even temporary) of medical data is expensive. Physicians may not be able to diagnose patients correctly, or they may have to repeat exams, adding to the overall costs of health care. In extreme cases availability of medical data can even be a matter of life or death. On the other hand, confidentiality of medical data is also important. Legislation requires medical facilities to observe the privacy of the patients, and states that patients have a final say on whether or not their medical data can be processed or not. Moreover, if physicians, or their EHR systems, are not trusted by the patients, for instance because of frequent privacy breaches, then patients may refuse to submit (correct) information, complicating the work of the physicians greatly. \ud
\ud
In traditional data protection systems, confidentiality and availability are conflicting requirements. The more data protection methods are applied to shield data from outsiders the more likely it becomes that authorized persons will not get access to the data in time. Consider for example, a password verification service that is temporarily not available, an access pass that someone forgot to bring, and so on. In this report we discuss a novel approach to data protection, Audit-based Compliance Control (AC2), and we argue that it is particularly suited for application in EHR systems. In AC2, a-priori access control is minimized to the mere authentication of users and objects, and their basic authorizations. More complex security procedures, such as checking user compliance to policies, are performed a-posteriori by using a formal and automated auditing mechanism. To support our claim we discuss legislation concerning the processing of health records, and we formalize a scenario involving medical personnel and a basic EHR system to show how AC2 can be used in practice. \ud
\ud
This report is based on previous work (Dekker & Etalle 2006) where we assessed the applicability of a-posteriori access control in a health care scenario. A more technically detailed article about AC2 recently appeared in the IJIS journal, where we focussed however on collaborative work environments (Cederquist, Corin, Dekker, Etalle, & Hartog, 2007). In this report we first provide background and related work before explaining the principal components of the AC2 framework. Moreover we model a detailed EHR case study to show its operation in practice. We conclude by discussing how this framework meets current trends in healthcare and by highlighting the main advantages and drawbacks of using an a-posteriori access control mechanism as opposed to more traditional access control mechanisms
Recommended from our members
Software engineering challenges: Achieving zero carbon buildings by 2019
The planet Earth is warming up. There is an urgent need to reduce greenhouse gas emissions. Buildings account for almost 50% of UK carbon dioxide emissions. [1] The UK Government have set out a programme to make all new buildings zero carbon by 2019. This will require a paradigm shift in how buildings are designed, with an increased reliance on computational modelling of building performance early in the design process.
This paper outlines how architects have traditionally worked, the available software and how it is used. It discusses the challenges faced by building designers in achieving zero carbon buildings and then outlines how software tools might develop to meet not only the zero carbon challenge but also take the concept further to help design sustainable buildings
Static Enforcement of Role-Based Access Control
We propose a new static approach to Role-Based Access Control (RBAC) policy
enforcement. The static approach we advocate includes a new design methodology,
for applications involving RBAC, which integrates the security requirements
into the system's architecture. We apply this new approach to policies
restricting calls to methods in Java applications. We present a language to
express RBAC policies on calls to methods in Java, a set of design patterns
which Java programs must adhere to for the policy to be enforced statically,
and a description of the checks made by our static verifier for static
enforcement.Comment: In Proceedings WWV 2014, arXiv:1409.229
On Regulatory and Organizational Constraints in Visualization Design and Evaluation
Problem-based visualization research provides explicit guidance toward
identifying and designing for the needs of users, but absent is more concrete
guidance toward factors external to a user's needs that also have implications
for visualization design and evaluation. This lack of more explicit guidance
can leave visualization researchers and practitioners vulnerable to unforeseen
constraints beyond the user's needs that can affect the validity of
evaluations, or even lead to the premature termination of a project. Here we
explore two types of external constraints in depth, regulatory and
organizational constraints, and describe how these constraints impact
visualization design and evaluation. By borrowing from techniques in software
development, project management, and visualization research we recommend
strategies for identifying, mitigating, and evaluating these external
constraints through a design study methodology. Finally, we present an
application of those recommendations in a healthcare case study. We argue that
by explicitly incorporating external constraints into visualization design and
evaluation, researchers and practitioners can improve the utility and validity
of their visualization solution and improve the likelihood of successful
collaborations with industries where external constraints are more present.Comment: 9 pages, 2 figures, presented at BELIV workshop associated with IEEE
VIS 201
Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities)
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities. Many vulnerabilities are caused by software errors that are created by software developers. Insecure software development practices are common due to a variety of factors, which include inefficiencies within existing knowledge transfer mechanisms based on vulnerability databases (VDBs), software developers perceiving security as an afterthought, and lack of consideration of security as part of the software development lifecycle (SDLC). The resulting communication gap also prevents developers and security experts from successfully sharing essential security knowledge. The cybersecurity community makes their expert knowledge available in forms including vulnerability databases such as CAPEC and CWE, and pattern catalogues such as Security Patterns, Attack Patterns, and Software Fault Patterns. However, these sources are not effective at providing software developers with an understanding of how malicious hackers can exploit vulnerabilities in the software systems they create. As developers are familiar with pattern-based approaches, this paper proposes the use of Vulnerability Anti-Patterns (VAP) to transfer usable vulnerability knowledge to developers, bridging the communication gap between security experts and software developers. The primary contribution of this paper is twofold: (1) it proposes a new pattern template – Vulnerability Anti-Pattern – that uses anti-patterns rather than patterns to capture and communicate knowledge of existing vulnerabilities, and (2) it proposes a catalogue of Vulnerability Anti-Patterns (VAP) based on the most commonly occurring vulnerabilities that software developers can use to learn how malicious hackers can exploit errors in software
- …