17 research outputs found

    Management of Student Records: Data Access Right Matrix and Data Sharing

    Get PDF
    AbstractThis work proposes a procedure to implement a Data Access Policy to ensure the protection of privacy rights of students’ records within higher educational systems. First it reviews the general legal constraints applicable to higher Institutional Data management. Second it reviews the principles of a Coordinated Model. The procedure is based on an Access Right Matrix that assigns data access privileges to Data Users. The first purpose is to handle the common and regular access by rightful users to data needed in their daily routine job through operational interface. The main purpose of the procedure is to handle ad-hoc requests that come from outside the university or from some services which do not have formal access to the data. Data access right matrix is used to grant or reject ad hoc requests based on the following criteria: the degree of sensitivity of the data requested, the number of records requested the purpose of the usage, and finally the privileges and trustworthiness of the requester

    DESIGN AND IMPLEMENTATION OF SECURE DATABASE WITH APPLICATION TO THE MEDICAL ENVIRONMENT

    No full text
    THIS THESIS IS CONCERNED WITH DATABASE SECURITY POLICIES, SECURE DATABASE DESIGN METHODOLOGIES, AND THEIR IMPLEMENTATION IN COMPLEX ENVIRONMENTS LIKE THE HEALTH CARE ONE. A NEW DATABASE SECURITY POLICY MODEL AND SECURE DATABASE DESIGN METHODOLOGY BASED ON THE PROPOSED SECURITY POLICY ARE PROPOSED WHICH AIM TO SOLVE MOST OF THE PROBLEMS ENCOUNTERED DURING THE DESIGN OF AN APPLICATION. BASED ON THE COMBINATION OF THE DISCRETIONAL AND THE MANDATORY SECURITY POLICIES, THIS METHODOLOGY TAKES ADVANTAGE OF BOTH THE POLICIES IN ORDER TO ENHANCE THE SECURITY OF THE APPLICATION. MOREOVER, AS DEMONSTRATED IN THE LAST CHAPTER, A PILOT IMPLEMENTATION PROVIDES SOME ORIGINAL CONTRIBUTIONS ON THE LIKELY BENEFITS AND DIFFICULTIES ASSOCIATED WITH THE DEVELOPMENT OF AN INTEGRATED SECURE HOSPITAL DATABASE SYSTEM. THE APPLICABILITY OF THE PROPOSED METHODOLOGY ON A REAL WORLD HOSPITAL ENVIRONMENT IS INVESTIGATED, AS ARE THE PERFORMANCE CHARACTERISTICS, AND THE USER ACCEPTANCE IN A REAL LIFE APPLICATION. FINALLY, THEAPPLICABILITY OF THIS METHODOLOGY ON THE NEW GENERATIONS OF DATABASE LIKE OBJECT - ORIENTED ONES, AND THE ABILITY TO INTRODUCE NEW TECHNOLOGIES AS MULTIMEDIA DATA, PROMISE IN A FURTHER FACILITY AND MORE SECURITY OF THE PROPOSED METHODOLOGY IS THE FUTURE.Η ΔΙΑΤΡΙΒΗ ΑΥΤΗ ΑΣΧΟΛΕΙΤΑΙ ΜΕ ΤΙΣ ΠΟΛΙΤΙΚΕΣ ΑΣΦΑΛΕΙΑΣ ΒΑΣΕΩΝ ΔΕΔΟΜΕΝΩΝ, ΤΙΣ ΜΕΘΟΔΟΛΟΓΙΕΣ ΑΣΦΑΛΟΥΣ ΣΧΕΔΙΑΣΗΣ ΣΥΣΤΗΜΑΤΩΝ ΒΑΣΕΩΝ ΔΕΔΟΜΕΝΩΝ ΚΑΙ ΤΗΝ ΕΦΑΡΜΟΓΗ ΤΟΥΣΣΕ ΠΟΛΥΠΛΟΚΑ ΚΑΙ ΕΥΠΑΘΗ ΠΕΡΙΒΑΛΛΟΝΤΑ, ΟΠΩΣ ΤΑ ΙΑΤΡΟΚΕΝΤΡΙΚΑ. ΣΤΑ ΠΛΑΙΣΙΑ ΤΗΣ ΔΙΑΤΡΙΒΗΣ ΑΥΤΗΣ ΠΡΟΤΕΙΝΕΤΑΙ ΜΙΑ ΝΕΑ ΜΕΘΟΔΟΛΟΓΙΑ ΑΣΦΑΛΟΥΣ ΣΧΕΔΙΑΣΗΣ ΠΟΥ ΣΤΟΧΕΥΕΙ ΣΤΗΝ ΕΠΙΛΥΣΗ ΤΩΝ ΠΕΡΙΣΣΟΤΕΡΩΝ ΑΠΟ ΤΑ ΠΡΟΒΛΗΜΑΤΑ ΠΟΥ ΑΝΤΙΜΕΤΩΠΙΖΟΝΤΑΙ ΚΑΤΑ ΤΗΔΙΑΡΚΕΙΑ ΤΗΣ ΣΧΕΔΙΑΣΗΣ ΜΙΑΣ ΕΦΑΡΜΟΓΗΣ. ΕΠΙΠΛΕΟΝ, ΜΕΣΩ ΜΙΑΣ ΠΕΙΡΑΜΑΤΙΚΗΣ ΕΦΑΡΜΟΓΗΣ Η ΟΠΟΙΑ ΚΑΛΥΠΤΕΙ ΤΟ ΤΕΛΕΥΤΑΙΟ ΚΕΦΑΛΑΙΟ ΕΠΙΔΕΙΚΝΥΕΙ ΤΑ ΠΙΘΑΝΑ ΚΕΡΔΗ ΚΑΙ ΤΙΣ ΔΥΣΚΟΛΙΕΣ ΠΟΥ ΣΥΝΔΕΟΝΤΑΙ ΜΕ ΤΗΝ ΑΝΑΠΤΥΞΗ ΕΝΟΣ ΟΛΟΚΛΗΡΩΜΕΝΟΥ ΕΝΟΣ ΑΣΦΑΛΟΥΣΝΟΣΟΚΟΜΕΙΑΚΟΥ ΣΥΣΤΗΜΑΤΟΣ ΒΑΣΕΩΝ ΔΕΔΟΜΕΝΩΝ. ΕΡΕΥΝΑΤΑΙ ΕΠΙΣΗΣ Η ΙΚΑΝΟΤΗΤΑ ΕΦΑΡΜΟΓΗΣ ΤΗΣ ΠΡΟΤΕΙΝΟΜΕΝΗΣ ΜΕΘΟΔΟΛΟΓΙΑΣ ΣΕ ΕΝΑ ΠΡΑΓΜΑΤΙΚΟ ΝΟΣΟΚΟΜΕΙΑΚΟ ΠΕΡΙΒΑΛΛΟΝΚΑΙ ΜΕΛΕΤΩΝΤΑΙ ΤΑ ΧΑΡΑΚΤΗΡΙΣΤΙΚΑ ΤΗΣ ΑΠΟΔΟΣΗΣ ΤΗΣ ΣΕ ΜΙΑ ΠΕΙΡΑΜΑΤΙΚΗ ΕΦΑΡΜΟΓΗ. ΤΕΛΟΣ ΕΞΕΤΑΖΕΤΑΙ Η ΙΚΑΝΟΤΗΤΑ ΕΦΑΡΜΟΓΗΣ ΤΗΣ ΜΕΘΟΔΟΛΟΓΙΑΣ ΑΥΤΗΣ ΣΕ ΝΕΕΣ ΓΕΝΙΕΣ ΒΑΣΕΩΝ ΔΕΔΟΜΕΝΩΝ, ΟΠΩΣ ΟΙ ΑΝΤΙΚΕΙΜΕΝΟΣΤΡΕΦΕΙΣ ΚΑΙ ΣΕ ΝΕΕΣ ΤΕΧΝΟΛΟΓΙΕΣ ΟΠΩΣΤΑ ΔΕΔΟΜΕΝΑ ΠΟΛΥΜΕΣΩΝ ΣΚΙΑΓΡΑΦΩΝΤΑΣ ΤΙΣ ΜΕΛΛΟΝΤΙΚΕΣ ΔΥΝΑΤΟΤΗΤΕΣ ΠΕΡΑΙΤΕΡΩ ΑΝΑΠΤΥΞΗΣ ΤΗΣ ΛΕΙΤΟΥΡΓΙΚΟΤΗΤΑΣ ΚΑΙ ΤΗΣ ΑΣΦΑΛΕΙΑΣ ΠΟΥ ΠΑΡΕΧΕΙ Η ΠΡΟΤΕΙΝΟΜΕΝΗ ΜΕΘΟΔΟΛΟΓΙΑ

    Guerre et survie : le contrecoup différentiel sur l'équilibre psychologique des hommes et des femmes

    No full text
    Khair Badawi Marie-Thérèse. Guerre et survie : le contrecoup différentiel sur l'équilibre psychologique des hommes et des femmes. In: Bulletin de psychologie, tome 49 n°424, 1996. Hommes-femmes. Psychologie et psychopathologie différentielles. pp. 412-418

    Blockchain-Based Access Control in a Globalized Healthcare Provisioning Ecosystem

    No full text
    The COVID-19 pandemic further outlined the importance of global healthcare services provisioning for diagnosing and treating patients who tend to travel and live for large periods away from home and can be anywhere at any given time. Advances in technology enable healthcare practitioners to access critical data regarding a person’s health status to provide better services. Medical data are sensitive in nature, and therefore, a reliable mechanism should ensure that only authorized entities can access data when needed. This paper, through a layered consideration of a Globalized Healthcare Provisioning Ecosystem (GHPE), reveals the interdependencies among its major components and suggests a necessary abstraction to identify requirements for the design of an access control suitable for the ecosystem. These requirements are imposed by the nature of the medical data as well as by the newly introduced potentials of Internet of Medical Things (IoMT) devices. As a result, an attribute-based access control framework is proposed aiming to provide prompt and secure access to medical data globally by utilizing state-of-the-art technologies and standards, including Next-Generation Access Control (NGAC), blockchain and smart contracts. Three types of smart contracts are proposed that enable access control to implement attribute and policy stores where policy classes and attributes are decentralized and immutable. In addition, the usage of blockchain-based distributed identities allows patients to be in control of access to their medical data and also enables healthcare service providers to access medical data promptly and reliably through the proposed access control framework. The qualitative characteristics of the proposed approach toward a decentralized and patient-centric access control in GHPE are demonstrated and discussed based on an application paradigm

    Blockchain-Based Access Control in a Globalized Healthcare Provisioning Ecosystem

    No full text
    The COVID-19 pandemic further outlined the importance of global healthcare services provisioning for diagnosing and treating patients who tend to travel and live for large periods away from home and can be anywhere at any given time. Advances in technology enable healthcare practitioners to access critical data regarding a person’s health status to provide better services. Medical data are sensitive in nature, and therefore, a reliable mechanism should ensure that only authorized entities can access data when needed. This paper, through a layered consideration of a Globalized Healthcare Provisioning Ecosystem (GHPE), reveals the interdependencies among its major components and suggests a necessary abstraction to identify requirements for the design of an access control suitable for the ecosystem. These requirements are imposed by the nature of the medical data as well as by the newly introduced potentials of Internet of Medical Things (IoMT) devices. As a result, an attribute-based access control framework is proposed aiming to provide prompt and secure access to medical data globally by utilizing state-of-the-art technologies and standards, including Next-Generation Access Control (NGAC), blockchain and smart contracts. Three types of smart contracts are proposed that enable access control to implement attribute and policy stores where policy classes and attributes are decentralized and immutable. In addition, the usage of blockchain-based distributed identities allows patients to be in control of access to their medical data and also enables healthcare service providers to access medical data promptly and reliably through the proposed access control framework. The qualitative characteristics of the proposed approach toward a decentralized and patient-centric access control in GHPE are demonstrated and discussed based on an application paradigm

    Increased burden on caregivers of having a child with haemophilia complicated by inhibitors.

    No full text
    Having a child with a chronic disease often increases the burden in the family with more hospital visits, treatment administration, and increased worries for the ill child. A cross-sectional, international, multi-centre study in caregivers of children <18 years with haemophilia and inhibitor was performed at Haemophilia Treatment Centres in Sweden, UK, and Canada to evaluate caregivers' burden and their health-related quality of life (HRQoL) compared to that of caregivers of children on prophylaxis without inhibitors and caregivers of healthy children

    Canadian Dataverse Admin Survey (2023)

    No full text
    Public outputs of the Canadian Dataverse Administrator Survey Working Group

    Access Control based on Attribute Certificates for Medical Intranet Applications

    No full text
    BACKGROUND: Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. OBJECTIVES: To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. METHODS: We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. RESULTS: Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. CONCLUSIONS: Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy

    Rencontre de Paris, octobre 1987

    No full text
    Kallab-Bissat Ilham, Nehmé Raja, Bizri Bawab Dalal, Khair Badawi Marie-Thérèse, Adnan Etel, Subh Alaouia, Accad Évelyne, Collin Françoise. Rencontre de Paris, octobre 1987. In: Les Cahiers du GRIF, n°43-44, 1990. Liban. pp. 19-36
    corecore