17 research outputs found

    A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    Full text link
    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC

    A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems

    Get PDF
    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment

    An Intelligent Access Control Model

    Get PDF
    Cybersecurity is a critical issue as the world is moving towered IR4 era (Industrial Revaluation 4.0) where technology is involved, and access to the internet is an imperative need. The traditional computing systems are not able to meet the huge computing demand and growing data (Big-Data). Therefore; new technologies have been evolved such as cloud computing. This chapter is exploring the need for a dynamic access control approach to enhance the Cybersecurity. The scope in this chapter is focusing on IaaS (Infrastructure as a Service) layer of cloud computing. The research approach aims to enhance the basic ABAC (Attribute-Based Access Control) model by adding a context-aware feature and SoD principle. The enhanced model called ABACsh. This proposed enhancement is implemented through a framework based on AI (Artificial Intelligent) to meet the requirements of dynamic systems. The framework is tested in the OpenStack testbed. The results show better performance in the term of computation speed

    Research and innovation in network and traffic management systems in Europe

    Get PDF
    Adequate research and innovation (R&I) is paramount for the seamless testing, adoption and integration of network and traffic management systems. This report provides a comprehensive analysis of R&I initiatives in Europe in this field. The assessment follows the methodology developed by the European Commission’s Transport Research and Innovation Monitoring and Information System (TRIMIS). The report critically addresses research by thematic area and technologies, highlighting recent developments and future needs.JRC.C.4-Sustainable Transpor

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Proceedings of the Air Transportation Management Workshop

    Get PDF
    The Air Transportation Management (ATM) Workshop was held 31 Jan. - 1 Feb. 1995 at NASA Ames Research Center. The purpose of the workshop was to develop an initial understanding of user concerns and requirements for future ATM capabilities and to initiate discussions of alternative means and technologies for achieving more effective ATM capabilities. The topics for the sessions were as follows: viewpoints of future ATM capabilities, user requirements, lessons learned, and technologies for ATM. In addition, two panel sessions discussed priorities for ATM, and potential contributions of NASA to ATM. The proceedings contain transcriptions of all sessions

    Current Issues of Water Management

    Get PDF
    There is an estimated 1.4 billion km3 of water in the world but only approximately three percent (39 million km3) of it is available as fresh water. Moreover, most of this fresh water is found as ice in the arctic regions, deep groundwater or atmospheric water. Since water is the source of life and essential for all life on the planet, the use of this resource is a highly important issue. "Water management" is the general term used to describe all the activities that manage the optimum use of the world's water resources. However, only a few percent of the fresh water available can be subjected to water management. It is still an enormous amount, but what's unique about water is that unlike other resources, it is irreplaceable. This book provides a general overview of various topics within water management from all over the world. The topics range from politics, current models for water resource management of rivers and reservoirs to issues related to agriculture. Water quality problems, the development of water demand and water pricing are also addressed. The collection of contributions from outstanding scientists and experts provides detailed information about different topics and gives a general overview of the current issues in water management. The book covers a wide range of current issues, reflecting on current problems and demonstrating the complexity of water management

    Law | Environment | Africa

    Get PDF
    Law | Environment | Africa compiles the proceedings of the 5th Symposium and the 4th Scientific Conference of the Association of Environmental Law Lecturers from African Universities (ASSELLAU) in cooperation with the Climate Policy and Energy Security Programme for Sub-Saharan Africa run by the Konrad-Adenauer-Stiftung (KAS) and the United Nations Environment Programme (UNEP). The boo

    Digital Health to Improve Australians Experience of Care: The case of melanoma post-treatment care

    Get PDF
    Improving access to care is not enough if it is not effectively delivered. Poor quality healthcare services have proven to slow progress to achieve better health outcomes and substantially increase the societal and economic burden of diseases. It is essential to provide healthcare services that constantly meet client-specific needs, which vary widely per individual, and to consider factors such as sociodemographic, psychological, health conditions. The emergence of digital technologies has played a critical role in the advancement of the healthcare sector. However, there remains critical knowledge-gaps demonstrating best practices to support digital health adoption and integration. The current research aimed to address this gap by making a case for providing a user-informed digital health model to improve Australians’ experience of melanoma post-treatment care. It captured information about the experience of care from a melanoma patient’s perspective and attitude toward digital health interventions. The data were collected through an online questionnaire developed based on clinical recommendations from melanoma guidelines and the literature. 95 patients were investigated, as well as their attitude toward digital health. Overall, 30% expressed difficulties accessing care due to geographical barriers, cost and time pressure. A majority presented signs of distress and desire for more educational and psychosocial support. The data also identified significant associations between access and psychological distress. Overall, participants reported positive attitudes toward the use of digital health, particularly if it can improve their quality of life. The findings showed that adapted uses of digital health could increase self-management and healthy behaviour; reduce psychological distress and social isolation; enable timely access to healthcare providers and communication, and support collaboration between clinicians. However, the study also reported a substantial lack of knowledge and awareness about technologies made available to melanoma patients. Recommendations on where to start and how we could encourage digital health uptake to provide high-quality, effective and adequate care are proposed. The thesis concludes on a call to action for healthcare stakeholders to ‘upgrade’ the existing melanoma healthcare system
    corecore