6,401 research outputs found

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u

    Security in Pervasive Computing: Current Status and Open Issues

    Get PDF
    Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation

    How Registries Can Help Performance Measurement Improve Care

    Get PDF
    Suggests ways to better utilize databases of clinical information to evaluate care processes and outcomes and improve measurements of healthcare quality and costs, comparative clinical effectiveness research, and medical product safety surveillance

    Assessing Progress Toward a 21st Century Right to Know

    Get PDF
    On Nov. 12, 2008, the right-to-know community published a set of detailed transparency recommendations for President-elect Barack Obama and Congress. Those recommendations, titled Moving Toward a 21st Century Right-to-Know Agenda, were developed over a two-year period with input from more than 100 groups and individuals. The seventy recommendations urged the new president and the incoming Congress to act quickly on a number of key government openness issues while also encouraging a more systematic, longer-term approach to a variety of other transparency problems that plague the federal government. The recommendations were endorsed by more than 300 organizations and individuals from across the political spectrum. A senior White House official privately called the recommendations a "blueprint for the Obama administration."The report organized the majority of the recommendations into three chapters.The National Security and Secrecy chapter provided specific recommendations to address the increase in government secrecy that has occurred due to professed national and homeland security concerns.The Usability of Government Information chapter focused on recommendations for how interactive technologies can make information more easily accessible and usable, including protecting the integrity of information and using the best formats and tools.The Creating a Government Environment for Transparency chapter addressed recommendations for creating incentives for openness and shifting government policies and mechanisms to encourage transparency.An additional chapter laid out recommendations for the first 100 days of the administration; the implementation of those recommendations was assessed in an earlier OMB Watch report.This report seeks to assess progress on each recommendation near the midpoint of the president's term as part of Sunshine Week 2011. The many factors at play in each recommendation – vision, leadership, policy, implementation, etc. – make it difficult, if not impossible, to assign simple grades. Instead, we will explain the activities of the administration and Congress on the issues addressed in the recommendations and offer some insights on those actions.It should be noted that no administration could be expected to complete all of the recommendations contained in the 2008 report in just two years' time. There is a very real limit to resources and staff that can be brought to bear on the issue of government openness while still addressing the many other demands on government. Several of the recommendations were explicitly designed as long-term challenges that will take years of work to complete, and of course, the work of implementation is never done

    Credit Card Fraud: A New Perspective On Tackling An Intransigent Problem

    Get PDF
    This article offers a new perspective on battling credit card fraud. It departs from a focus on post factum liability, which characterizes most legal scholarship and federal legislation on credit card fraud and applies corrective mechanisms only after the damage is done. Instead, this article focuses on preempting credit card fraud by tackling the root causes of the problem: the built-in incentives that keep the credit card industry from fighting fraud on a system-wide basis. This article examines how credit card companies and banks have created a self-interested infrastructure that insulates them from the liabilities and costs of credit card fraud. Contrary to widespread belief, retailers, not card companies or banks, absorb much of the loss caused by thieves who shop with stolen credit cards. Also, credit card companies and banks earn fees from every credit card transaction, including those that are fraudulent. In addressing these problems, this article advocates broad reforms, including legislation that would mandate data security standards for the industry, empower multiple stakeholders to create the new standards, and offer companies incentives to comply by capping bank fees for those that are compliant, while deregulating fees for those that are not compliant

    HIPPA and Patient Privacy: Tribal Policies as Added Means for Addressing Indian Health Disparities

    Get PDF
    • …
    corecore