144 research outputs found

    Secure and Trustable Electronic Medical Records Sharing using Blockchain

    Full text link
    Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall costComment: AMIA 2017 Annual Symposium Proceeding

    Sind Vorstandsmitglieder einer AG wirklich Treuhänder?

    Get PDF

    Privacy - Preserving Data Exchange and Aggregation in Healthcare

    Get PDF
    Medical data are often scattered among multiple clinics, hospitals, insurance companies, pharmacies, and research institutions that store and process personal healthcare information. The use of information and communication technologies for health (eHealth) provides us with the means to share healthcare data between authorized parties in an efficient manner. In this thesis, we address some of the challenges of implementing eHealth in practice: to achieve interoperability between data sources, and to ensure privacy for patients. Achieving both of these guarantees is our goal but they seem conflictual, hence the challenge. Once interoperability is achieved and a patientâs data are shared, it becomes evenmore difficult to ensure the patientâs privacy i.e., to provide to a patient control over his data and to guarantee the data anonymity in medical research. We address the aforementioned challenges by studying requirements from medical and legal perspectives, and by developing algorithms and frameworks to support privacy-preserving dynamic data-sharing, exchange, and aggregation from multiple data sources. In the first part of the thesis, we address certain privacy challenges. We present a framework based on the blockchain technology for ensuring traceability and accountability when sharing, exchanging, and aggregating medical data. Our framework ensures privacy, security, availability, and fine-grained access control over highly sensitive patient-data. We also analyze the potential of applying blockchain technology in different eHealth settings: primary care, medical-data research, and connected health. Our second contribution is a framework for privacy-preserving data aggregation: an algorithm for constructing the anonymized database and a protocol that improves the utility of the anonymized database as the database grows. In the second part of the thesis, we focus on achieving interoperability. We design an interface specification that defines communication protocols andmessages supporting integration of a new software tool in clinical practice. Then, we develop a multi-agent system (MAS) for the dynamic aggregation of the data collected and generated by this software tool for the purpose of clinical research. This MAS takes into account the objectives of the research study, the availability of data, and could employ our proposed algorithm for privacy-preserving data aggregation. The negotiation protocol in the framework of theMAS achieves a precise definition of database characteristics, such as schema, content, and privacy parameters, therefore increasing the efficiency of data collection for medical research and ensuring the privacy of patients

    American graphic Novel: Multimodality and Identity

    Get PDF
    The graphic novel is considered as a multimodal text — a complex of verbal and visual components. The differences between comics and graphic novels are explained. The definition of the concept of “multimodality” is given, and the main approaches to the study of a multimodal text are described. Attention is paid to the issue of identity in a multicultural aspect. On the example of a specific autobiographical graphic novel, the discursive construction of identity by visual and linguistic means is analyzed. The expediency of using critical discourse analysis to understand verbal and non-verbal connections, visual images and communications, as well as text and context is substantiated. To study the linguistic modality of the graphic novel, the methods of linguo-stylistic, lexico-semantic and contextual analysis of the literary text were used, while the iconic components were considered using the methods of observation, interpretation and comparison with the text. The sociocultural dominants of food and appearance were revealed in the novel, which contributed to the convergence of stylistic and iconic means of expressing meaning. Examples of combining linguistic, metalinguistic and visual aspects of expressing aspects of identity in the space of the American graphic novel as a multimodal text are given. The novelty of the study is seen in the demonstration of identity markers in a multimodal text

    Doped Barium Titanate at Intermediate Stages of Synthesis of ВТО

    Get PDF
    This paper presents the results of synthesis and characterization of calcium 0doped nanocrystalline barium titanate powder with different concentration of doped elements ((Ba1-xCax) TiO3, were x 0; 0.02; 0.06; 0.1; 0.16; 0.2), produced by oxalate route. Calcium additives were added on the surface the samples of semidecomposed barium titanil oxalate. For synthesis were used simultaneously decomposition of unstable barium, titanium compositions and calcium salts. The semidecomposed barium titanil oxalate and doped barium titanate characterization carried out by specific surface area measurements, TEM, X-Ray. It is experimentally shown that Са2+ introduction reduces lattice parameter for samples that related with replacement of barium by calcium. Solubility of calcium in barium titanate nanopowders increase from 10 at % up to 16 at %. The second phase appears at 20 at %. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/3547

    On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware

    Get PDF
    Oblivious transfer (OT, for short) [RAB81] is a fundamental primitive in the foundations of Cryptography. While in the standard model OT constructions rely on public-key cryptography, only very recently Kolesnikov in [KOL10] showed a truly efficient string OT protocol by using tamper-proof hardware tokens. His construction only needs few evaluations of a block cipher and requires stateless (therefore resettable) tokens that is very efficient for practical applications. However, the protocol needs to be interactive, that can be an hassle for many client-server setting and the security against malicious sender is achieved in a covert sense, meaning that a malicious sender can actually obtain the private input of the receiver while the receiver can detect this malicious behavior with probability 1/2. Furthermore the protocol does not enjoy forward security (by breaking a token one violates the security of all previously played OTs). In this work, we propose new techniques to achieve efficient non-interactive string OT using tamper-proof hardware tokens. While from one side our tokens need to be stateful, our protocol enjoys several appealing features: 1) it is secure against malicious receivers and the input privacy of honest receivers is guaranteed unconditionally against malicious senders, 2) it is forward secure, 3) it enjoys adaptive input security, therefore tokens can be sent before parties know their private inputs. This gracefully fits a large number of client-server settings (digital TV, e-banking) and thus many practical applications. On the bad side, the output privacy of honest receivers is not satisfied when tokens are reused for more than one execution
    corecore