1,140 research outputs found

    ShareABEL: Secure Sharing of mHealth Data through Cryptographically-Enforced Access Control

    Get PDF
    Owners of mobile-health apps and devices often want to share their mHealth data with others, such as physicians, therapists, coaches, and caregivers. For privacy reasons, however, they typically want to share a limited subset of their information with each recipient according to their preferences. In this paper, we introduce ShareABEL, a scalable, usable, and practical system that allows mHealth-data owners to specify access-control policies and to cryptographically enforce those policies so that only parties with the proper corresponding permissions are able to decrypt data. The design (and prototype implementation) of this system makes three contributions: (1) it applies cryptographically-enforced access-control measures to wearable healthcare data, which pose different challenges than Electronic Medical Records (EMRs), (2) it recognizes the temporal nature of mHealth data streams and supports revocation of access to part or all of a data stream, and (3) it departs from the vendor- and device-specific silos of mHealth data by implementing a secure end-to-end system that can be applied to data collected from a variety of mHealth apps and devices

    SIMDAT

    No full text

    Progress Report on Implementation of Recommendations from the Indiana University Cyberinfrastructure Research Taskforce

    Get PDF
    This document refers to the Final Report of the Indiana University Cyberinfrastructure Research Taskforce at: http://hdl.handle.net/2022/46

    Understanding potential users of energy community information system:a thematic analysis

    Get PDF
    Abstract. The continuing global growth of energy consumers, the war in Europe, and climate change are the driving factors for energy revolution. One solution to this concerning issue has been the transformation of energy consumers to become energy producers. Prosumers can be grouped to establish energy communities. Prosumers, energy communities, and other distributed energy resources (DERs) are possible sustainable energy resources that can be connected to the smart grid. The literature review of existing research about smart grids, distributed energy resources, and energy communities, is conducted to gain a better understanding of the complex system and its stakeholders. The Second part of the literature review follows the behaviour of the potential smart grid users and its recent studies. The research questions focus on understanding energy prosumer’s perspectives on information system usage in order to discover the advantages and disadvantages of potential information system within an energy community context. The data were gathered from semi-structured interviews with people who voluntarily replied to application forms which were distributed prior to this study. Qualitative research methods were chosen to be used. A thematic analysis was conducted and as a result a thematic map in which two main themes, 15 sub-themes, and 25 codes were identified. It was discovered that positive user experience, desired functionalities, monitoring, economic benefits, user interface, beneficial information, and platform availability were the driving factors seen as an advantage of the potential information system. On the other hand, data leaks, undesired functionalities, energy community problems, and negative user experience were seen as disadvantages of the information system. This study contributes to the field of sustainable human-computer interaction and the findings of this thesis can be used as a foundation for future research and to design and develop the smart grids from the prosumer’s perspective. Due to several requests from participants, the text of the thesis has been written with accessibility in mind, so that the text does not require special expertise in the field of sustainable human-computer interaction

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations
    • …
    corecore