22,016 research outputs found

    Information Accountability Framework for a Trusted Health Care System

    Get PDF
    Trusted health care outcomes are patient centric. Requirements to ensure both the quality and sharing of patients’ health records are a key for better clinical decision making. In the context of maintaining quality health, the sharing of data and information between professionals and patients is paramount. This information sharing is a challenge and costly if patients’ trust and institutional accountability are not established. Establishment of an Information Accountability Framework (IAF) is one of the approaches in this paper. The concept behind the IAF requirements are: transparent responsibilities, relevance of the information being used, and the establishment and evidence of accountability that all lead to the desired outcome of a Trusted Health Care System. Upon completion of this IAF framework the trust component between the public and professionals will be constructed. Preservation of the confidentiality and integrity of patients’ information will lead to trusted health care outcomes

    Semantic-based policy engineering for autonomic systems

    No full text
    This paper presents some important directions in the use of ontology-based semantics in achieving the vision of Autonomic Communications. We examine the requirements of Autonomic Communication with a focus on the demanding needs of ubiquitous computing environments, with an emphasis on the requirements shared with Autonomic Computing. We observe that ontologies provide a strong mechanism for addressing the heterogeneity in user task requirements, managed resources, services and context. We then present two complimentary approaches that exploit ontology-based knowledge in support of autonomic communications: service-oriented models for policy engineering and dynamic semantic queries using content-based networks. The paper concludes with a discussion of the major research challenges such approaches raise

    Competition policy review

    Get PDF
    This is the first comprehensive review of Australia’s competition laws and policy in over 20 years. The National Competition Policy Review (The Hilmer Review) of 1993 underpinned the development of the National Competition Policy – a co-operative initiative of the Commonwealth and State and Territory governments that the Productivity Commission found contributed to a surge in productivity, directly reduced some prices and stimulated business innovation. The subsequent Review of the Competition Provisions of the Trade Practices Act (The Dawson Review) of 2003 examined the operation of the competition laws and resulted in some strengthening of the provisions. There has been considerable change in the Australian economy since the Hilmer Report of the early 1990s and the boost in productivity that underpinned the growth in living standards over the past two decades is waning. The Competition Policy Review will examine the broader competition framework to ensure that it continues to play a role as a significant driver of productivity improvements and to ensure that the current laws are operating as intended and are effective for all businesses, big and small.   MESSAGE FROM THE PANEL This is our Final Report reviewing Australia’s competition policy, laws and institutions. The Panel undertook a stocktake of the competition policy framework across the Australian economy. Although reforms introduced following the Hilmer Review led to significant improvements in economic growth and wellbeing, the Panel believes that renewed policy effort is required to support growth and wellbeing now and into the future. To this end, we have reviewed Australia’s competition policy, laws and institutions to assess their fitness for purpose. Taken together, our recommendations comprise an agenda of reinvigorated microeconomic reform that will require sustained effort from all jurisdictions. We believe this commitment is necessary if Australia is to boost productivity, secure fiscal sustainability and position our economy to meet the challenges and opportunities of a rapidly changing world. Given the forces for change already bearing on the Australian economy, delaying policy action will make reform more difficult and more sharply felt. An early response will make the reform effort more manageable over time, allowing Australians to enjoy higher living standards sooner rather than later. The recommendations and views expressed in this Final Report draw upon the expertise and experience of each member of the Panel. Importantly, we have also had the benefit of hearing from a wide cross-section of the Australian community and from participants in all sectors of the economy

    Architecture for Provenance Systems

    No full text
    This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies

    Integrating security solutions to support nanoCMOS electronics research

    Get PDF
    The UK Engineering and Physical Sciences Research Council (EPSRC) funded Meeting the Design Challenges of nanoCMOS Electronics (nanoCMOS) is developing a research infrastructure for collaborative electronics research across multiple institutions in the UK with especially strong industrial and commercial involvement. Unlike other domains, the electronics industry is driven by the necessity of protecting the intellectual property of the data, designs and software associated with next generation electronics devices and therefore requires fine-grained security. Similarly, the project also demands seamless access to large scale high performance compute resources for atomic scale device simulations and the capability to manage the hundreds of thousands of files and the metadata associated with these simulations. Within this context, the project has explored a wide range of authentication and authorization infrastructures facilitating compute resource access and providing fine-grained security over numerous distributed file stores and files. We conclude that no single security solution meets the needs of the project. This paper describes the experiences of applying X.509-based certificates and public key infrastructures, VOMS, PERMIS, Kerberos and the Internet2 Shibboleth technologies for nanoCMOS security. We outline how we are integrating these solutions to provide a complete end-end security framework meeting the demands of the nanoCMOS electronics domain

    An Architecture for Provenance Systems

    No full text
    This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to different technologies
    • 

    corecore