51 research outputs found

    An Access Control Model to Facilitate Healthcare Information Access in Context of Team Collaboration

    Get PDF
    The delivery of healthcare relies on the sharing of patients information among a group of healthcare professionals (so-called multidisciplinary teams (MDTs)). At present, electronic health records (EHRs) are widely utilized system to create, manage and share patient healthcare information among MDTs. While it is necessary to provide healthcare professionals with privileges to access patient health information, providing too many privileges may backfire when healthcare professionals accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. This thesis highlights the access control matters in collaborative healthcare domain. Focus is mainly on the collaborative activities that are best accomplished by organized MDTs within or among healthcare organizations with an objective of accomplishing a specific task (patient treatment). Initially, we investigate the importance and challenges of effective MDTs treatment, the sharing of patient healthcare records in healthcare delivery, patient data confidentiality and the need for flexible access of the MDTs corresponding to the requirements to fulfill their duties. Also, we discuss access control requirements in the collaborative environment with respect to EHRs and usage scenario of MDTs collaboration. Additionally, we provide summary of existing access control models along with their pros and cons pertaining to collaborative health systems. Second, we present a detailed description of the proposed access control model. In this model, the MDTs is classified based on Belbinโ€™s team role theory to ensure that privileges are provided to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information. Finally, evaluation indicates that our access control model has a number of advantages including flexibility in terms of permission management, since roles and team roles can be updated without updating privilege for every user. Moreover, the level of fine-grained control of access to patient EHRs that can be authorized to healthcare providers is managed and controlled based on the job required to meet the minimum necessary standard and need-to-know principle. Additionally, the model does not add significant administrative and performance overhead.publishedVersio

    Selective video encryption algorithm based on H.264/AVC and AES

    Get PDF
    H.264/AVC is an industry standard that has been designed to address different technical solutions such as broadcast applications, interactive or serial storage. conversational services, Video on Demand or multimedia streaming services [1]. The main objective behind the H.264 [2][3] development was to build a high peIformance video coding standard by adopting a back to basics approach with a simple and straightforward design using well known blocks. H.264/AVC is based on the conventional block motion compensated video coding the same way as the existing standard

    Development of scalable video compression algorithm

    Get PDF
    The technology based on scalable video coding appears as a new phenomenon. The use of internet needs a huge bandwidth and possesses extreme requirements in terms of jitter, latency and loss experiences by viewers. It is very crucial to have the idea of monochrome digital video data sequence which is a set of individual pictures called frames. This frame needs to be considered as a light intensity of two dimensions, x and y, where x and y denote spatial coordinates. It is proportional to the brightness of the frame or the gray level at the point for monochrome. The normal standard speed at which these frames are displayed is 30 frames per second. This representation is called canonical representative. However. canonical representation has negative impact because it needs very huge amounts of memory. Therefore, video needs to be compressed considerably for efficient storage and sharing over the web [1]

    Video encryption using computation between H.264/AVC and AES encryption algorithm

    Get PDF
    With the advanced development of the Internet and multimedia, it is easier for digital data owners to transfer multimedia documents across the Internet. Therefore, multimedia security has become one of the most aspects of communications with the continuous increase in the use online transmission. Some applications, such as TV broadcast and military applications require a special and reliable secure storage or transmission to be completely secured against theft, alteration or misuse. Furthermore, videoconferencing has become a daily characteristic of financial businesses. As it saves time, effort, and travel expenses for large companies. In such applications, digital video is compressed to a low bit rate while it is stored or transmitted [1]. There are several important standards such as MPEG-l, MPEG-2/h.262 and MPEG-4 have been developed for video compression, but with the target to double the coding efficiency and high reliability in video transmission. The Moving Picture Expert Group (MPEG) and the Video Coding Expert Group (VCEG) have developed a new standard that promises to outperform the earlier MPEG-4 and H.263 standard. H.244/AVC provides the most current balance between the coding efficiency, implementation complexity and cos

    IoT Device Identification Using Deep Learning

    Full text link
    The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers due to the less secure nature of the devices. The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks. In order to address this threat, organizations often implement security policies in which only the connection of white-listed IoT devices is permitted. To monitor adherence to such policies and protect their networks, organizations must be able to identify the IoT devices connected to their networks and, more specifically, to identify connected IoT devices that are not on the white-list (unknown devices). In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network. In contrast to previous work, our approach does not require that complex feature engineering be applied on the network traffic, since we represent the communication behavior of IoT devices using small images built from the IoT devices network traffic payloads. In our experiments, we trained a multiclass classifier on a publicly available dataset, successfully identifying 10 different IoT devices and the traffic of smartphones and computers, with over 99% accuracy. We also trained multiclass classifiers to detect unauthorized IoT devices connected to the network, achieving over 99% overall average detection accuracy

    Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records

    Get PDF
    Published: Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies Vol 5 2018Ensuring patient privacy and improving patient care quality are two of the most significant challenges faced by healthcare systems around the world. This paper describes the importance and challenges of effective multidisciplinary team treatment and the sharing of patient healthcare records in healthcare delivery. At present, electronic health records are used to create, manage and share patient healthcare information efficiently and effectively. The security and privacy concerns with sharing and the proper use of protected health information need to be highlighted. Additionally, an access control solution is presented, which is suitable for collaborative healthcare systems to address concerns with information sharing and information access. In this access control model, the multidisciplinary team is classified based on Belbinโ€™s team role theory to ensure that access rights are adapted dynamically to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information.publishedVersionnivรฅ

    HEALER2: a framework for secure data lake towards healthcare digital transformation efforts in low and middle-income countries.

    Get PDF
    Low and middle-income countries are vigorously digitizing their operations in the healthcare sector as steps in the digital transformation journey. However, some of the basic principles in information security are being skipped. This has a tendency to introduce fundamental vulnerabilities in the core foundation of their healthcare IT infrastructure. This paper, therefore, assessed e-health strategies in Africa and proposed a data lake framework for healthcare IT infrastructure which is deemed secure, privacy-preserving and economically efficient

    Location-Based Protocol for the Pairwise Authentication in the Networks without Infrastructure

    Get PDF
    In this paper, we consider security issues arising in the development of the wireless networks without infrastructure, with the rapidly changing composition of the elements of such a network The LEAP Initial Protection (LEAP-IP) protocol proposed, which closes the vulnerability of the LEAP at the network initialization stage. Advanced LEAP-IP protocol allows to resist attacks on the radio channel, physical attacks on the device, and is energy efficient, that is especially important for devices with a limited power resource. Also, a classification of self-organizing networks and some variants of using the proposed pairwise authentication protocol is presented

    Analysis of the cuticle of two species of grain storage pest and interaction with germination of entomopathogenic fungi

    Get PDF
    This thesis compares the early stages in germination and infection of two entomopathogenic fungi, Metarhizium anisopliae and Beauveria bassiana on the cuticle of two important pest of grain, the beetles Tribolium castaneum and Rhyzopertha dominica using scanning electronic microscopy. It is the first study to report the chemical composition of wing and elytra from these two grain beetles using gas chromatography mass spectrometry. The thesis discusses the potential impact of the components of the cuticle on the observed patterns of germination and growth of the entomopathogenic fungi

    An Access Control Model to Facilitate Healthcare Information Access in Context of Team Collaboration

    Get PDF
    The delivery of healthcare relies on the sharing of patients information among a group of healthcare professionals (so-called multidisciplinary teams (MDTs)). At present, electronic health records (EHRs) are widely utilized system to create, manage and share patient healthcare information among MDTs. While it is necessary to provide healthcare professionals with privileges to access patient health information, providing too many privileges may backfire when healthcare professionals accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. This thesis highlights the access control matters in collaborative healthcare domain. Focus is mainly on the collaborative activities that are best accomplished by organized MDTs within or among healthcare organizations with an objective of accomplishing a specific task (patient treatment). Initially, we investigate the importance and challenges of effective MDTs treatment, the sharing of patient healthcare records in healthcare delivery, patient data confidentiality and the need for flexible access of the MDTs corresponding to the requirements to fulfill their duties. Also, we discuss access control requirements in the collaborative environment with respect to EHRs and usage scenario of MDTs collaboration. Additionally, we provide summary of existing access control models along with their pros and cons pertaining to collaborative health systems. Second, we present a detailed description of the proposed access control model. In this model, the MDTs is classified based on Belbinโ€™s team role theory to ensure that privileges are provided to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information. Finally, evaluation indicates that our access control model has a number of advantages including flexibility in terms of permission management, since roles and team roles can be updated without updating privilege for every user. Moreover, the level of fine-grained control of access to patient EHRs that can be authorized to healthcare providers is managed and controlled based on the job required to meet the minimum necessary standard and need-to-know principle. Additionally, the model does not add significant administrative and performance overhead
    • โ€ฆ
    corecore