21 research outputs found

    A Threat Tree for Health Information Security and Privacy

    Get PDF
    This paper begins a process of organizing knowledge of health information security threats into a comprehensive catalog.We begin by describing our risk management perspective of health information security, and then use this perspective tomotivate the development of a health information threat tree. We describe examples of three threats, breaking each downinto its key risk-related data attributes: threat source and action, the health information asset and its vulnerability, andpotential controls. The construction of such a threat catalog is argued to be useful for risk assessment and to inform publichealth care policy. As no threat catalog is ever complete, guidance for extending the health information security threat tree isgiven

    A Database-driven Model for Risk Assessment

    Get PDF

    Mission Impossible? Putting the Patient Back in Patient Care

    Get PDF
    The primary focus of this teaching case is the patient journey, as facilitated and influenced by an e-system or electronic health record (EHR) system. The goal of this case is to provide the learner with the knowledge and skills needed to effectively incorporate patient-centered e-health (PCEH) principles into existing and planned e-health systems such as EHRs. This case can be used to help students understand a hospital experience from the perspective of a patient and her family. It is loosely based on an experience one of the authors had with an actual patient. This case is intended for use with upper level undergraduate and graduate health informatics, information systems, and nursing students. Students assigned to this case should have a working knowledge of clinical terms and the general workings of a hospital. This teaching case is best suited to an advanced course in a health informatics curriculum. Possible applications of the case include, but are not limited to, describing the patient journey, modeling the process flow, diagramming the data flow, and applying the principles of patient-centered e-health

    Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase

    Get PDF
    Internet voting is a good option for Colombia thanks to the expansion of mobile technology throughout the country and the interest of the government to implement the e-voting. For this reason, we study the e-voting protocols to establish if any of them is suitable for Colombian elections. However some of them imply a great number of cryptographic operations and therefore a great computational cost for the devices, which sometimes exceed their capacity. In this paper, we determine the number of cryptographic operations per phase of four e-voting protocols: one based on blind signatures (Li, Hwang and Lai protocol), one based on mix nets (Meng protocol), one based on homomorphic encryption (EVIV protocol) and one used in real electoral processes (I-Voting for Estonian Elections). Then, we analyze the changes in the number of operations when the number of voters, number of votes, number of authorities and number of candidates increase for small, medium and large elections. Finally, we establish the protocol that imply a less number of cryptographic operations and is suitable for big electoral processes, such as congress elections in Colombia

    A service-oriented architecture for robust e-voting

    Get PDF

    Development Of Antirigging Voting System Using Biometrics Based On Adharcard Numbering

    Get PDF
    Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present  and use implementation is to implement the development of anti rigging voting system using finger print .The purpose of the project and implementation is to provide a secured and reliable environment to the customers is to electing the candidates by using the intelligent electronic voting machine by providing a unique identity to every user using the FINGER PRINT identification technology. Here in this project and implementation we are going provide the at most security since it is taking the FINGER PRINTS as the authentication for EVM. Intelligent EVM is an Embedded based project and implementation. It involves microcontroller and interfaces. Intelligent EVM has been specially designed to collect, record, store, count and display cent percent accurately. It has got two units control unit and ballot unit. It has “DISPLAY” section that will display the number of votes to respective candidate at the end of the poll
    corecore