103,048 research outputs found

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    Integrating personal learning and working environments

    Get PDF
    This review paper part of a series of papers commissioned by the Institute for Employment Research at the University of Warwick under the title of 'Beyond Current Horizons – Working and Employment Challenge'. In turn, in forms part of a larger programme of work under the banner of Beyond Current Horizons that is being managed by FutureLab on behalf of the UK Department for Schools, Children and Families. The brief was to cover: - The main trends and issues in the area concerned; - Any possible discontinuities looking forward to 2025 and beyond; - Uncertainties and any big tensions; - Conclusions on what the key issues will be in the future and initial reflections on any general implications for education. Given the wide ranging nature of the brief, this paper largely confines itself to trends and issues in the UK, although where appropriate examples from other countries in Europe are introduced. We realise that in an age of growing globalisation the future of work and learning in the UK cannot be separated from developments elsewhere and that developments in other parts of the world may present a different momentum and trajectory from that in the UK. Thus, when reading this report, please bear in mind the limitations in our approach

    Implementing Privacy Negotiations in E-Commerce

    Get PDF
    This paper examines how service providers may resolve the trade-off between their personalization efforts and users' individual privacy concerns. Finding that neither an optimized one-size-fits-all strategy, nor a market-driven specialization of providers or choices between different usage scenarios can solve the problem, we analyze how negotiation techniques can lead to efficient contracts and how they can be integrated into current technologies. The analysis includes the identification of relevant and negotiable privacy dimensions for different usage domains. Negotiations in multi-channel retailing are examined as a detailed example. Based on a formalization of the user's privacy revelation problem, we model the negotiation process as a Bayesian game where the service provider faces different types of users. Finally an extension to P3P is proposed that allows a simple expression and implementation of negotiation processes. Support for this extension has been integrated in the Mozilla browser.

    Integrating New Zealand census mortality study and New Zealand longitudinal census: privacy impact assessment

    Get PDF
    This paper outlines the processes for managing the privacy risks raised by integrating two particular census datasets. Overview Integrating New Zealand Census Mortality Study and New Zealand Longitudinal Census: Privacy impact assessment provides a systematic evaluation of the privacy risks associated with integrating datasets from the New Zealand Census Mortality Study (NZCMS) and the New Zealand Longitudinal Census (NZLC). It outlines the processes for managing these risks. The NZCMS comprise datasets of mortality records linked to the 1981–2006 Censuses and the NZLC datasets comprise linked census pairs covering the same period

    Accessing Patient Records in Virtual Healthcare Organisations

    No full text
    The ARTEMIS project is developing a semantic web service based P2P interoperability infrastructure for healthcare information systems that will allow healthcare providers to securely share patient records within virtual healthcare organisations. Authorisation decisions to access patient records across organisation boundaries can be very dynamic and must occur within a strict legislative framework. In ARTEMIS we are developing a dynamic authorisation mechanism called PBAC that provides a means of contextual and process oriented access control to enforce healthcare business processes. PBAC demonstrates how healthcare providers can dynamically share patient records for care pathways across organisation boundaries

    Rethinking De-Perimeterisation: Problem Analysis And Solutions

    Get PDF
    For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group – coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems

    A survey on cyber security for smart grid communications

    Get PDF
    A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE
    • 

    corecore