4 research outputs found
Recommended from our members
Method and Technology for Ensuring the Software Security by Identifying and Classifying the Failures and Vulnerabilities
The conducted literature review on known methods and technologies for providing the software security and for identifying the failures and vulnerabilities of software showed that, although the analyzed methods and technologies have great potential for the field of software engineering, none of the known solutions are intended for identification and classification of software failures and vulnerabilities. Therefore, it is necessary to develop a method for ensuring the software security by identifying and classifying the failures and vulnerabilities, as well as to design and implement a technology for ensuring the software security by identifying and classifying the failures and vulnerabilities, which is the goal of this study. The developed in this paper method for ensuring the software security by identifying and classifying the failures and vulnerabilities provides a conclusion as to whether a failure occurred, and if a failure occurred, its type is issued to the user. In addition, the developed method for ensuring the software security by identifying and classifying the failures and vulnerabilities provides a conclusion as to whether a feature is a vulnerability, and if the feature is a vulnerability, its type is issued to the user. The paper also develops a technology for ensuring the software security by identifying and classifying the failures and vulnerabilities, which provides a conclusion on the presence or absence of software failure(s); conclusion on the presence or absence of software vulnerability(s); conclusion about the type of failure and the type of vulnerability in case of their presence, thanks to which the proposed technology is useful for software users due to the identification and classification of failures and vulnerabilities
Recommended from our members
The Structure of the Blockchain-Based Multi-Agent System for Secure Management of Medical Information
The state-of-the-art on known blockchain-based systems for secure management of medical information, conducted in this paper, showed that none of the analyzed solutions satisfies all combined necessary criteria. Therefore, it is necessary to design and implement a blockchain-based system for the secure management of medical information that would satisfy all the necessary criteria at the same time, which is the goal of this study. Since the designed blockchain-based system for secure management of medical information must perform four separate functions, when performing them, information and data will be exchanged, that is, there will be interaction, it was decided to develop the blockchain-based system for secure management of medical information as a multi-agent system. So, the paper developed a blockchain-based multi-agent system for secure management of medical information, which evaluates the medical informationās sufficiency before recording it in the blockchain (the agent for evaluating the medical informationās sufficiency), entering information into the blockchain and obtaining information from the blockchain (the agent for entering information into the blockchain and obtaining information from the blockchain), evaluating the reputation of a health care institution as a blockchain miner (the agent for evaluating the reputation of a health care institution). Thus, the developed system satisfies all specified necessary criteria in a complex. The considered examples of the work of proposed blockchain-based multi-agent system for secure management of medical information showed that the proposed system can significantly increase the security of medical information management, medical information storage and medical information exchange, increase the protection of confidentiality of medical information, thereby increasing the trust of the medical community in medical information technologies and in clinical decision support systems
Recommended from our members
Cyber-Physical System for Donor Organs' Rejection Risks Prevention Based on Donor and Recipient Health Monitoring
Today in Ukraine the problem of transplantation of organs and other anatomical materials to humans is very acute. Among the reasons hindering the development of transplantation of anatomical materials to humans in Ukraine is the rejection of donor organs by the recipient's body. The dependences of the process of rejection of donor organs by the recipient's body on the different surface structures of cells in the recipient and donor, on the incompatibility of recipient and donor on HLA antigens, on the level of dangerous antibodies in the recipient's body, on consideration of only the waiting time for the distribution of donor organs, on the origin of the donor organ (cadaveric organ or organ from a living donor), on the general health of the recipient, on the age of the donor, on the gender of the recipient, on the recipient's disease and its phase, which required transplantation, on the chosen type of immunosuppressive therapy, and on the presence of progressive chronic dysfunction of the transplanted organ. The established dependencies are useful in the selection of donor organs - in order to minimize the risk of rejection of organs by the recipient. Rules and method for supporting the decision on the possibility or undesirableness of donation and transplantation, taking into account the risks of rejection of donor organs, have been developed. The architecture of the cyber-physical system for donor organs' rejection risks prevention based on donor and recipient health monitoring is developed, aimed at verifying the existing list of factors of donor organ rejection. Based on this test, the developed cyber-physical system offers a conclusion on the possibility (if all donor organ rejection factors are eliminated or minimized) or undesirableness (if one or a group of donor organ rejection factors cannot be eliminated) of donation and transplantation in a given case
Recommended from our members
Recognizing the Situations and Supporting the Decision-Making in the Residential Luminosity Control Subsystem of Ā«Smart HouseĀ» Cyber-Physical System
Currently, the urgent problem is to ensure the ability of recognizing the situations and supporting the decision-making in the Ā«Smart HouseĀ» cyber-physical system. The purpose of this study is recognizing the situations and supporting the decision-making in the residential luminosity control subsystem of Ā«Smart HouseĀ» cyber-physical system. The developed in this paper method for setting up the residential luminosity control subsystem of Ā«Smart HouseĀ» cyber-physical system for each room allows to enter the necessary parameters for further automatic operation of the residential luminosity control subsystem of Ā«Smart HouseĀ» cyber-physical system. The developed method of recognizing the situations and supporting the decision-making in the residential luminosity control subsystem of Ā«Smart HouseĀ» cyber-physical system provides the user of the subsystem with the ability to quickly and conveniently configure the necessary lighting mode. In addition, the developed method provides for the recognition of various situations in the lighting scenario (sufficient light flow, insufficient light flow, excess light flow - according to the current lighting standards) and support for decision-making regarding the lighting of the home according to the lighting mode set by the user (reflecting/closing shading devices, turning on/off the lamps - depending on the recognized situation)