3 research outputs found
Petri net methodology for solving healthcare management issues
Various approaches of Petri nets can be achieved as system security and information flow in the healthcare recording system inside any medical or health-related business. Petri net system formal modeling is essential as well as important to track down the records and secure information inside a preformed health organization. In this paper, we mainly focused on the formal model Petri net which security mechanism is controlled by public key encryption where PN based modeling is preferred. This Petri net is a mathematical modeling to solve graphical notation for step by step processes that include choice, repetition, and circumstantial execution. Petri nets offer widely mathematical applications of discrete and continuous event execution semiotics, with an efficient mathematical analysis processing theory. We sure that our formal model will lay a solid foundation to minimize the risks and overcome the security risks in the healthcare industry
Quantitative analysis of distributed systems
PhD ThesisComputing Science addresses the security of real-life systems by using
various security-oriented technologies (e.g., access control solutions
and resource allocation strategies). These security technologies
signficantly increase the operational costs of the organizations in
which systems are deployed, due to the highly dynamic, mobile and
resource-constrained environments. As a result, the problem of designing
user-friendly, secure and high efficiency information systems
in such complex environment has become a major challenge for the
developers.
In this thesis, firstly, new formal models are proposed to analyse the
secure information
flow in cloud computing systems. Then, the opacity of work
flows in cloud computing systems is investigated, a threat
model is built for cloud computing systems, and the information leakage
in such system is analysed. This study can help cloud service
providers and cloud subscribers to analyse the risks they take with
the security of their assets and to make security related decision.
Secondly, a procedure is established to quantitatively evaluate the
costs and benefits of implementing information security technologies.
In this study, a formal system model for data resources in a dynamic
environment is proposed, which focuses on the location of different
classes of data resources as well as the users. Using such a model, the
concurrent and probabilistic behaviour of the system can be analysed.
Furthermore, efficient solutions are provided for the implementation of
information security system based on queueing theory and stochastic
Petri nets. This part of research can help information security officers
to make well judged information security investment decisions