45 research outputs found

    Access control of EHR records in a heterogeneous cloud infrastructure

    Get PDF
    Since the advent of smartphones, IoT and cloud computing, we have seen an industry-wide requirement to integrate different healthcare applications with each other and with the cloud, connecting multiple institutions or even countries. But despite these trends, the domain of access control and security of sensitive healthcare data still raises a serious challenge for multiple developers and lacks the necessary definitions to create a general security framework addressing these issues. Taking into account newer, more special cases, such as the popular heterogeneous infrastructures with a combination of public and private clouds, fog computing, Internet of Things, the area becomes more and more complicated. In this paper we will introduce a categorization of these required policies, describe an infrastructure as a possible solution to these security challenges, and finally evaluate it with a set of policies based on real-world requirements

    Taxonomy for trade-off problem in distributed telemedicine systems

    Get PDF
    Increasing amount of data and demands for features are challenging for Web systems. By serving these requirements, distributed systems gather ground, however they bring problems along. These issues are already present in telemedicine. Since telemedicine is a wide discipline, various phenomena have different effects on data. Availability and consistency have both important roles in telemedicine, but as CAP and PACELC theorems addressed trade-off problem, no one can guarantee both capabilities simultaneously. Our research aims to get a nearer view of the problem considering real world telemedicine use-cases and offer an easily tunable system with a taxonomy that gives a helping hand at designing telemedicine systems. Model checking verifies and data quality measurement proves the correctness of our model. In the course of measurements, we revealed an interesting occurence and consequence that is called hypothetical-zero-latency

    Network topology discovery

    Get PDF

    Small degree BitTorrent

    Get PDF
    It is well-known that the BitTorrent file sharing protocol is responsible for a significant portion of the Internet traffic. A large amount of work has been devoted to reducing the footprint of the protocol in terms of the amount of traffic, however, its flow level footprint has not been studied in depth. We argue in this paper that the large amount of flows that a BitTorrent client maintains will not scale over a certain point. To solve this problem, we first examine the flow structure through realistic simulations. We find that only a few TCP connections are used frequently for data transfer, while most of the connections are used mostly for signaling. This makes it possible to separate the data and signaling paths. We propose that, as the signaling traffic provides little overhead, it should be transferred on a separate dedicated small degree overlay while the data traffic should utilize temporal TCP sockets active only during the data transfer. Through simulation we show that this separation has no significant effect on the performance of the BitTorrent protocol while we can drastically reduce the number of actual flows

    A FHIR-based healthcare system backend with deep cloud side security

    Get PDF
    The need for an easy-to-learn healthcare development framework is becoming evermore urgent, but the challenges created by the very specific nature of this domain, combined with increasingly complex technological requirements is no easy task. In this paper, we introduce our proposition for one such development stack, ready for handling large amounts of medical data and security issues. Then we introduce benchmark-based evaluations on a heavily loaded database instance, and compare them with a similar benchmark from another team, who used a similar approach with the FHIR standard but with different technologies

    Comparison Between Mono and Multi Repository Structures

    Get PDF

    Paxos with multiple leaders

    Get PDF

    SIP COMPRESSION

    Get PDF
    The wired line network has been well studied and widely used for a long time. Most of its protocols are so successful that passed the test of time. There are many similar tasks in mobile and wired line environment, and we would like to achieve compatible, inter-working solutions. So it is a plausible idea to use the protocols of the wired line network in mobile environment too. However, the mobile and wired line environment differ significantly; mainly the bandwidth is different in the two networks. Although the difference is going to be smaller with the help of new generation of mobile networks, it will still remain significant. An acceptable solution is to compress these protocols. We have not found such a solution in the literature so our opinion is that this article is the first dealing with SIP compression. We have created a demonstration system, which connects two SIP user agents to each other and ensures the compression and decompression of the messages between them. In this article we show our development about adapting various compressing algorithms for SIP compression, and we evaluate them

    Full-stack FHIR-based MBaaS with server- and client-side caching capable WebDAO

    Get PDF
    In healthcare systems, it is essential to have applications that are robust responsive and have a good performance. It is also advisable to store data in some standardized way so it can be integrated with other systems. However, in the 21st century an application may be doubtful of use if the userexperience is at a low level. Several studies inform us about how tolerant the users are when they visit a website or wait to retrieve some data. Based on these studies, we will construct a system that is capable of working offline and can also unburden the server-side. This will be achieved by establishing a so-called Web Data Access Object (WebDAO), which has a maintainable offline capability and also performs better in most given circumstances. Our measurements were evaluated in the context of how users tolerate a delay and slow responses
    corecore