13,519 research outputs found

    Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography

    Get PDF
    Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is key management. Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. The results of the system evaluation showed significant improvements in terms of time efficiency of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information. This result also justifies the feasibility of implementing fuzzy key binding scheme in real applications, especially fuzzy vault which demonstrated a better performance during key reconstruction

    National standards for essential digital skills, April 2019

    Get PDF

    The Adoption of Blockchain Technologies in Data Sharing: A State of the Art Survey

    Get PDF
    In the big data era, it is a significant need for data sharing in various industries. However, there are many weaknesses in the traditional centralized way of data sharing. It is easy to attack the centralized data storage center. As the process of data asset transactions is not transparent, there is a lack of trust in the percipients of data sharing. Blockchain technology offers a possibility to solve these problems in data sharing, as the blockchain can provide a decentralized, programmable, tamperproof, and anonymous data sharing environment. In this paper, we compare the blockchain-based data sharing with the traditional ways of data sharing, and analyze the scenarios in major industry applications. We survey the state of the art of the adoption of blockchain technologies in data sharing, and provide a summary about their technical frameworks and schemes

    Illegal, Unreported and Unregulated (IUU) Fishing: A Whitepaper

    Get PDF
    Illegal, unregulated and unreported (IUU) fishing refers to fishing activities that do not comply with regional, national, or international fisheries conservation or management measures. This whitepaper characterizes the status of Illegal, unregulated, and unreported fishing, the philanthropic community's current efforts to help reduce it, and potential opportunities for the Packard Foundation to become more actively engaged. The paper was drafted between March and June 2015, following a combination of desk research and a handful of select interviews

    JPEG privacy and security framework for social networking and GLAM services

    Get PDF
    Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8). Notwithstanding this shortcoming, the JPEG committee is currently defining a new JPEG Systems standard, which envisages privacy and security support across JPEG family of standards. In this manuscript, the main philosophy of this emerging specification is outlined along with typical use cases, main requirements as well as examples of potential technological solutions. The upcoming specification guarantees backward and forward compatibility with earlier standards and legacy implementations. Finally, we illustrate the introduced framework by two applications targeting secure photo sharing on social networks and IPR management in the GLAM sector.Peer ReviewedPostprint (published version
    • …
    corecore