131 research outputs found

    Secure Management of Personal Health Records by Applying Attribute-Based Encryption

    Get PDF
    The confidentiality of personal health records is a major problem when patients use commercial Web-based systems to store their health data. Traditional access control mechanisms, such as Role-Based Access Control, have several limitations with respect to enforcing access control policies and ensuring data confidentiality. In particular, the data has to be stored on a central server locked by the access control mechanism, and the data owner loses control on the data from the moment when the data is sent to the requester. Therefore, these mechanisms do not fulfil the requirements of data outsourcing scenarios where the third party storing the data should not have access to the plain data, and it is not trusted to enforce access control policies. In this paper, we describe a new approach which enables secure storage and controlled sharing of patient’s health records in the aforementioned scenarios. A new variant of a ciphertext-policy attribute-based encryption scheme is proposed to enforce patient/organizational access control policies such that everyone can download the encrypted data but only authorized users from the social domain (e.g. family, friends, or fellow patients) or authorized users from the professional\ud domain (e.g. doctors or nurses) are allowed to decrypt it

    Comparative Dynamic Analysis of Existing Construction and Construction with Superstructure

    Get PDF
    The impossibility to provide building land in central urban areas imposes the need for new housing. The subject of this paper is to make a comparative dynamic analysis of different reinforced concrete structural systems, the existing and newly designed construction with superstructure of real residential building which is located in Skopje. The analysis of the structures is executed with the software package SAP2000 in 3D mathematical models. In the models are applied static loads, wind loads according to applicable technical regulations, seismic loads according to Macedonian regulations with the method of equivalent static loads (simplified modal spectral analysis) and linear time history of earthquake record. Afterwards it is executed dynamic analysis of the existing construction, construction with superstructure with the same structural members as the existing construction and the strengthened construction with superstructure (since the dimensioning is executed). Strengthening of structural members is designed with increasing of cross sections by addition of new layer. By the executed dynamic analysis of the reinforced concrete structural systems is made a comparison of bearing capacity and stress - deformation state of characteristic structural members by comparing: periods, base reactions, maximal horizontal displacements, M-Φ and M-N diagrams for characteristic structural members and maximal normal concrete stress in columns. By the analysis it’s been concluded that the cross sections of strengthened construction had increased their strength, stiffness, deformation and ductility characteristics, and the construction as a whole possesses the required level of security for acceptance of the loads

    Extraordinary Legal Remedies in the Administrative Conflict

    Get PDF
    This paper deals with the importance of administrative conflict as a guarantee in the realization of the rights and interests of citizens in a particular procedure and by a special body not the administrative body but judicial body and judicial procedure.We have also made efforts to provide data on the efficiency of the activities of the administration bodies in the fulfillment and realization of their obligations towards the realization of the citizens rights and interests.Human rights do not stand in the vacuum, their protection mechanisms exist because public administration bodies violate them during their daily administrative / executive activity. This paper analyzes the non-implementation of the constitutionality and legitimacy principle in decision-making by the administration bodies and the use of other mechanisms such as regular and extraordinary legal remedies to fix the illegality and irregularities made by the administration bodies.Through this paper we will use the comparative method of administrative conflict of two legal systems based on the Legislation of the Republic of Macedonia, and based on the legislation of the Kosovo. Other important issues will be addressed such as the use of more extraordinary legal remedies in the judicial administrative procedure under Kosovo legislation and the importance of resolving administrative misdemeanor by the Administrative Court of Macedonia. Key words: Administrative activity, administrative conflict, remedies, Administrative Court DOI: 10.7176/JLPG/87-19 Publication date:July 31st 201

    The Impact of Covid 19 Pandemic on the Review of Lawsuits at the Administrative Court of the Republic of North Macedonia

    Get PDF
    The purpose of this paper is to analyze the impact of Covid 19 Pandemic on the general administrative judicial activity in the Republic of North Macedonia. Considering that Covid 19 as a global pandemic of global proportions is negatively affecting all spheres of life as well as all the most important state functions and activities, we also consider that this situation is affecting the judicial system of the Republic of North Macedonia. Considering that a large number of judges are out of their workplaces and this situation slows down and complicates the procedure for reviewing court disputes, the decision on the violated rights and interests of citizens remains hostage to a global pandemic. In order to analyze the impact of Covid 19 pandemic on the functioning of the judicial system and in particular on the functioning of the Administrative Court in establishing administrative disputes based on lawsuits, we have compared the time periods of the Administrative Court before the pandemic and how many of cases which have been decided on the basis of lawsuits (approved, rejected or dismissed lawsuits) in the last 6 months of 2019, and at the time of the pandemic also how the work of this court has functioned during this pandemic in the total number of lawsuits initiated with the total number of cases on which it has been decided or which have been considered by the judges for the period of time from January to April 2020, the time of pandemic. The data used in this paper is taken from the reports published on the portal of the Administrative Court of the Republic of North Macedonia. Key words: Covid-19 pandemic, lawsuits, Administrative Court, Republic of North Macedonia. DOI: 10.7176/JLPG/101-21 Publication date:September 30th 202

    Secure Communication using Identity Based Encryption

    Get PDF
    Secured communication has been widely deployed to guarantee confidentiality and\ud integrity of connections over untrusted networks, e.g., the Internet. Although\ud secure connections are designed to prevent attacks on the connection, they hide\ud attacks inside the channel from being analyzed by Intrusion Detection Systems\ud (IDS). Furthermore, secure connections require a certain key exchange at the\ud initialization phase, which is prone to Man-In-The-Middle (MITM) attacks. In this paper, we present a new method to secure connection which enables Intrusion Detection and overcomes the problem of MITM attacks. We propose to apply Identity Based Encryption (IBE) to secure a communication channel. The key escrow property of IBE is used to recover the decryption key, decrypt network traffic on the fly, and scan for malicious content. As the public key can be generated based on the identity of the connected server and its exchange is not necessary, MITM attacks are not easy to be carried out any more. A prototype of a modified TLS scheme is implemented and proved with a simple client-server application. Based on this prototype, a new IDS sensor is developed to be capable of identifying IBE encrypted secure traffic on the fly. A deployment architecture of the IBE sensor in a company network is proposed. Finally, we show the applicability by a practical experiment and some preliminary performance measurements

    THE USE OF REGRESSION ANALYSIS TO DETERMINE THE ORDER OF DELAYS IN THE MANUFACTURING PROCESSES

    Get PDF
    The effect of Supply Chain Management is very important on the performance of companies their life cycle.  The paper tries to investigate the role of Supply Chain Management on company performance. Companies in order to be successful in the manufacturing sector of industries, they need to manage the data order and the performance of the company. Therefore, this paper tries to emphasize that the order parameters help in estimation of the order implementation during deadlines. Thus, the obtained results will provide insights to companies on manufacturing industries and to decision makers. The results will also help decision makers to be more accurate on their decisions about orders and reaching the results by the model

    An Identity-Based Group Signature with Membership Revocation in the Standard Model

    Get PDF
    Group signatures allow group members to sign an arbitrary number\ud of messages on behalf of the group without revealing their\ud identity. Under certain circumstances the group manager holding a\ud tracing key can reveal the identity of the signer from the\ud signature. Practical group signature schemes should support\ud membership revocation where the revoked member loses the\ud capability to sign a message on behalf of the group without\ud influencing the other non-revoked members. A model known as\ud \emph{verifier-local revocation} supports membership revocation.\ud In this model the trusted revocation authority sends revocation\ud messages to the verifiers and there is no need for the trusted\ud revocation authority to contact non-revoked members to update\ud their secret keys. Previous constructions of verifier-local\ud revocation group signature schemes either have a security proof in the\ud random oracle model or are non-identity based. A security proof\ud in the random oracle model is only a heuristic proof and\ud non-identity-based group signature suffer from standard Public Key\ud Infrastructure (PKI) problems, i.e. the group public key is not\ud derived from the group identity and therefore has to be certified.\ud \ud \ud In this work we construct the first verifier-local revocation group\ud signature scheme which is identity-based and which has a security proof in the standard model. In\ud particular, we give a formal security model for the proposed\ud scheme and prove that the scheme has the\ud property of selfless-anonymity under the decision Linear (DLIN)\ud assumption and it is fully-traceable under the\ud Computation Diffie-Hellman (CDH) assumption. The proposed scheme is based on prime order bilinear\ud groups

    THE ROLE OF L1 IN CLASSROOM (LEXICAL APPROACH IN ELT)

    Get PDF
    ELT Classes have tried and continue to try new methods and techniques so as to achieve the best possible results in ELT classrooms. Various language teaching methods have treated translation (L1) in ELT classrooms differently. With the introduction of Communicative Approach, translation and interference fell out of favour. But according to Lexical Approach, an approach which is being widely used in ELT classrooms in the world, the importance of translation or L1 in ELT classes is far from being trivial. Seen from a lexical view of language, translation and interference became fruitful again. In the past, language was considered as composed of words, but Lexical Approach has argued that, besides words, language consists of chunks (lexis). With language chunking in mind, we will consider the idea of L1 (translation) role in ELT. In this research paper will elaborate translation inevitability in classroom, L1-L2 comparison, the role the lexis play in acquiring the language, interference and L1 awareness.Keywords: translation, interference, approach, lexical, chunks, acquiring, lexis

    A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    Get PDF
    Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Boneh-Franklin Identity Based Encryption (IBE) scheme. In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. Our scheme enables the delegator to provide the proxy fine-grained re-encryption capability. As an application, we propose a fine-grained Personal Health Record (PHR) disclosure scheme for healthcare service by applying the proposed scheme

    Public-Key Encryption with Delegated Search

    Get PDF
    In public-key setting, Alice encrypts email with public key of Bob, so that only Bob will be able to learn contents of email. Consider scenario when computer of Alice is infected and unbeknown to Alice it also embeds malware into message. Bob's company, Carol, cannot scan his email for malicious content as it is encrypted so burden is on Bob to do scan. This is not efficient. We construct mechanism that enables Bob to provide trapdoors to Carol such that Carol, given encrypted data and malware signature, is able to check whether encrypted data contains malware signature, without decrypting it. We refer to this mechanism as Public-Key Encryption with Delegated Search SPKE.\ud \ud We formalize SPKE and give construction based on ElGamal public-key encryption (PKE). proposed scheme has ciphertexts which are both searchable and decryptable. This property of scheme is crucial since entity can search entire content of message, in contrast to existing searchable public-key encryption schemes where search is done only in metadata part. We prove in standard model that scheme is ciphertext indistinguishable and trapdoor indistinguishable under Symmetric External Diffie-Hellman (sxdh) assumption. We prove also ciphertext one-wayness of scheme under modified Computational Diffie-Hellman (mcdh) assumption. We show that our PKEDS scheme can be used in different applications such as detecting encrypted malwares and forwarding encrypted emails
    corecore