20 research outputs found

    An Access Control Model to Facilitate Healthcare Information Access in Context of Team Collaboration

    Get PDF
    The delivery of healthcare relies on the sharing of patients information among a group of healthcare professionals (so-called multidisciplinary teams (MDTs)). At present, electronic health records (EHRs) are widely utilized system to create, manage and share patient healthcare information among MDTs. While it is necessary to provide healthcare professionals with privileges to access patient health information, providing too many privileges may backfire when healthcare professionals accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. This thesis highlights the access control matters in collaborative healthcare domain. Focus is mainly on the collaborative activities that are best accomplished by organized MDTs within or among healthcare organizations with an objective of accomplishing a specific task (patient treatment). Initially, we investigate the importance and challenges of effective MDTs treatment, the sharing of patient healthcare records in healthcare delivery, patient data confidentiality and the need for flexible access of the MDTs corresponding to the requirements to fulfill their duties. Also, we discuss access control requirements in the collaborative environment with respect to EHRs and usage scenario of MDTs collaboration. Additionally, we provide summary of existing access control models along with their pros and cons pertaining to collaborative health systems. Second, we present a detailed description of the proposed access control model. In this model, the MDTs is classified based on Belbin’s team role theory to ensure that privileges are provided to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information. Finally, evaluation indicates that our access control model has a number of advantages including flexibility in terms of permission management, since roles and team roles can be updated without updating privilege for every user. Moreover, the level of fine-grained control of access to patient EHRs that can be authorized to healthcare providers is managed and controlled based on the job required to meet the minimum necessary standard and need-to-know principle. Additionally, the model does not add significant administrative and performance overhead.publishedVersio

    Selective video encryption algorithm based on H.264/AVC and AES

    Get PDF
    H.264/AVC is an industry standard that has been designed to address different technical solutions such as broadcast applications, interactive or serial storage. conversational services, Video on Demand or multimedia streaming services [1]. The main objective behind the H.264 [2][3] development was to build a high peIformance video coding standard by adopting a back to basics approach with a simple and straightforward design using well known blocks. H.264/AVC is based on the conventional block motion compensated video coding the same way as the existing standard

    Development of scalable video compression algorithm

    Get PDF
    The technology based on scalable video coding appears as a new phenomenon. The use of internet needs a huge bandwidth and possesses extreme requirements in terms of jitter, latency and loss experiences by viewers. It is very crucial to have the idea of monochrome digital video data sequence which is a set of individual pictures called frames. This frame needs to be considered as a light intensity of two dimensions, x and y, where x and y denote spatial coordinates. It is proportional to the brightness of the frame or the gray level at the point for monochrome. The normal standard speed at which these frames are displayed is 30 frames per second. This representation is called canonical representative. However. canonical representation has negative impact because it needs very huge amounts of memory. Therefore, video needs to be compressed considerably for efficient storage and sharing over the web [1]

    Video encryption using computation between H.264/AVC and AES encryption algorithm

    Get PDF
    With the advanced development of the Internet and multimedia, it is easier for digital data owners to transfer multimedia documents across the Internet. Therefore, multimedia security has become one of the most aspects of communications with the continuous increase in the use online transmission. Some applications, such as TV broadcast and military applications require a special and reliable secure storage or transmission to be completely secured against theft, alteration or misuse. Furthermore, videoconferencing has become a daily characteristic of financial businesses. As it saves time, effort, and travel expenses for large companies. In such applications, digital video is compressed to a low bit rate while it is stored or transmitted [1]. There are several important standards such as MPEG-l, MPEG-2/h.262 and MPEG-4 have been developed for video compression, but with the target to double the coding efficiency and high reliability in video transmission. The Moving Picture Expert Group (MPEG) and the Video Coding Expert Group (VCEG) have developed a new standard that promises to outperform the earlier MPEG-4 and H.263 standard. H.244/AVC provides the most current balance between the coding efficiency, implementation complexity and cos

    Sharing With Care- Multidisciplinary Teams and Secure Access to Electronic Health Records

    Get PDF
    Published: Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies Vol 5 2018Ensuring patient privacy and improving patient care quality are two of the most significant challenges faced by healthcare systems around the world. This paper describes the importance and challenges of effective multidisciplinary team treatment and the sharing of patient healthcare records in healthcare delivery. At present, electronic health records are used to create, manage and share patient healthcare information efficiently and effectively. The security and privacy concerns with sharing and the proper use of protected health information need to be highlighted. Additionally, an access control solution is presented, which is suitable for collaborative healthcare systems to address concerns with information sharing and information access. In this access control model, the multidisciplinary team is classified based on Belbin’s team role theory to ensure that access rights are adapted dynamically to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information.publishedVersionnivå

    An Access Control Model to Facilitate Healthcare Information Access in Context of Team Collaboration

    Get PDF
    The delivery of healthcare relies on the sharing of patients information among a group of healthcare professionals (so-called multidisciplinary teams (MDTs)). At present, electronic health records (EHRs) are widely utilized system to create, manage and share patient healthcare information among MDTs. While it is necessary to provide healthcare professionals with privileges to access patient health information, providing too many privileges may backfire when healthcare professionals accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. This thesis highlights the access control matters in collaborative healthcare domain. Focus is mainly on the collaborative activities that are best accomplished by organized MDTs within or among healthcare organizations with an objective of accomplishing a specific task (patient treatment). Initially, we investigate the importance and challenges of effective MDTs treatment, the sharing of patient healthcare records in healthcare delivery, patient data confidentiality and the need for flexible access of the MDTs corresponding to the requirements to fulfill their duties. Also, we discuss access control requirements in the collaborative environment with respect to EHRs and usage scenario of MDTs collaboration. Additionally, we provide summary of existing access control models along with their pros and cons pertaining to collaborative health systems. Second, we present a detailed description of the proposed access control model. In this model, the MDTs is classified based on Belbin’s team role theory to ensure that privileges are provided to the actual needs of healthcare professionals and to guarantee confidentiality as well as protect the privacy of sensitive patient information. Finally, evaluation indicates that our access control model has a number of advantages including flexibility in terms of permission management, since roles and team roles can be updated without updating privilege for every user. Moreover, the level of fine-grained control of access to patient EHRs that can be authorized to healthcare providers is managed and controlled based on the job required to meet the minimum necessary standard and need-to-know principle. Additionally, the model does not add significant administrative and performance overhead

    An overview of video encryption techniques

    No full text
    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Over the last few years several encryption algorithms have applied to secure video transmission. While a large number of multimedia encryption schemes have been proposed in the literature and some have been used in real products, cryptanalytic work has shown the existence of security problems and other weaknesses in most of the proposed multimedia encryption schemes. In this paper, a description and comparison between encryption methods and representative video algorithms were presented. With respect not only to their encryption speed but also their security level and stream size. A trade-off between quality of video streaming and choice of encryption algorithm were shown. Achieving an efficiency, flexibility and security is a challenge of researchers

    “A Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE

    No full text
    Biometric recognition is a highly adopted technology to support different kinds of applications, ranging from security and access control applications to low enforcement applications. However, such systems raise serious privacy and data protection concerns. Misuse of data, compromising the privacy of individuals and/or authorized processing of data may be irreversible and could have severe consequences on the individual’s rights to privacy and data protection. This is partly due to the lack of methods and guidance for the integration of data protection and privacy by design in the system development process. In this paper, we present an example of privacy and data protection best practices to provide more guidance for data controllers and developers on how to comply with the legal obligation for data protection. These privacy and data protection best practices and considerations are based on the lessons learned from the SMart mobILity at the European land borders (SMILE) project

    Towards Understanding of User Perceptions for Smart Border Control Technologies using a Fine-Tuned Transformer Approach

    No full text
    Smart Border Control (SBC) technologies became a hot topic in recent years when the European Union (EU) Commission announced the Smart Borders Package to improve the efficiency and security of the border crossing points (BCPs). Although, BCPs technologies have potential benefits in terms of enabling traveller' data processing, they still lead to acceptability and usability challenges when used by travelers. Success of technologies depends on user acceptance. Sentiment analysis is one of the primary techniques to measure user acceptance. Although, there exists variety of studies in literature where sentiment analysis has been used to understand user acceptance in different domains. To the best of our knowledge, there is no study where sentiment analysis has been used for measuring the user acceptance of SBC technologies. Thus, in this study, we propose a fine-tuned transformer model along with an automatic sentiment labels generation technique to perform sentiment analysis as a step towards getting insights into user acceptance of BCPs technologies. The results obtained in this study are promising; given the condition that there is no training data available from BCPs. The proposed approach was validated against IMDB reviews dataset and achieved weighted F1-score of 79% for sentiment analysis task

    How to do it right a framework for biometrics supported border control

    No full text
    Complying with the European Union (EU) perspective on human rights goes or should go together with handling ethical, social and legal challenges arising due to the use of biometrics technology as border control technology. While there is no doubt that the biometrics technology at European borders is a valuable element of border control systems, these technologies lead to issues of fundamental rights and personal privacy, among others. This paper discusses various ethical, social and legal challenges arising due to the use of biometrics technology in border control. First, a set of specific challenges and values affected were identified and then, generic considerations related to mitigation of these issues within a framework is provided. The framework is expected to meet the emergent need for supplying interoperability among multiple information systems used for border control. This is a post-peer-review, pre-copyedit version of an article. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-37545-4_7 Document type: Part of book or chapter of boo
    corecore