72 research outputs found

    I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

    Full text link
    The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography. Lightweight cryptography is of capital importance since IoT devices are qualified to be resource-constrained. To address these challenges, several Attribute-Based Credentials (ABC) schemes have been designed including I2PA, U-prove, and Idemix. Even though these schemes have very strong cryptographic bases, their performance in resource-constrained devices is a question that deserves special attention. This paper aims to conduct a performance evaluation of these schemes on issuance and verification protocols regarding memory usage and computing time. Recorded results show that both I2PA and U-prove present very interesting results regarding memory usage and computing time while Idemix presents very low performance with regard to computing time

    Energy autonomous systems : future trends in devices, technology, and systems

    Get PDF
    The rapid evolution of electronic devices since the beginning of the nanoelectronics era has brought about exceptional computational power in an ever shrinking system footprint. This has enabled among others the wealth of nomadic battery powered wireless systems (smart phones, mp3 players, GPS, …) that society currently enjoys. Emerging integration technologies enabling even smaller volumes and the associated increased functional density may bring about a new revolution in systems targeting wearable healthcare, wellness, lifestyle and industrial monitoring applications

    Effects of nonorthogonality in the time-dependent current through tunnel junctions

    Full text link
    A theoretical technique which allows to include contributions from non-orthogonality of the electron states in the leads connected to a tunneling junction is derived. The theory is applied to a single barrier tunneling structure and a simple expression for the time-dependent tunneling current is derived showing explicit dependence of the overlap. The overlap proves to be necessary for a better quantitative description of the tunneling current, and our theory reproduces experimental results substantially better compared to standard approaches.Comment: 4 pages, 1 table, 1 figur

    BPR best practices for the healthcare domain

    Get PDF
    Healthcare providers are under pressure to work more efficiently and in a more patient-focused way. One possible way to achieve this is to launch Business Process Redesign (BPR) initiatives, which focus on changing the structure of the involved processes and using IT as an enabler for such changes. In this paper, we argue that a list of historically successful improvement tactics, the BPR best practices, are a highly suitable ingredient for such efforts in the healthcare domain. Our assessment is based on the analysis of 14 case studies. The insights obtained by the analysis also led to an extension of the original set of best practices

    Dementia and guardianship: challenges in social work practice in a health care setting

    Get PDF
    This thesis critically examines social work practice in complex and disputed situations where an alternative legal decision-maker is perceived as necessary for a person with dementia. Australia has unique adult guardianship legislation and social workers are actively engaged in the process in a variety of ways, such as weighing the benefits against the possible harm and lodging applications. Yet within the profession this is an area where there is very little research. The purpose of this study is therefore to enable social workers to better understand the dynamics involved in adult guardianship proceedings for a person with dementia and provide knowledge that can be used for more effective practice. The theoretical approach is to use perspectives from social constructionism, with the links which can be made to modernism and postmodernism being taken into account. Five research case studies were investigated drawing from the caseload of social workers in an aged care service at a large metropolitan hospital in Australia. A thematic network analysis of the findings showed that the research case studies are constantly evolving, where different players participate by bringing their own perspectives, and in this process alliances are formed which reflect underlying dynamics of power. There are many diverse and contested issues, such as varied understandings of dementia and capacity and differing constructions of the notions of risk, protection and responsibility. The implications for social work practice are that in a contemporary health and welfare context social work is well placed to make an important contribution through its traditional roles of negotiation, interpretation and mediation between those who have discursive rights and those who do not

    VISUAL PPINOT: A Graphical Notation for Process Performance Indicators

    Get PDF
    Process performance indicators (PPIs) allow the quantitative evaluation of business processes, providing essential information for decision making. It is common practice today that business processes and PPIs are usually modelled separately using graphical notations for the former and natural language for the latter. This approach makes PPI definitions simple to read and write, but it hinders maintenance consistency between business processes and PPIs. It also requires their manual translation into lower-level implementation languages for their operationalisation, which is a time-consuming, error-prone task because of the ambiguities inherent to natural language definitions. In this article, Visual ppinot, a graphical notation for defining PPIs together with business process models, is presented. Its underlying formal metamodel allows the automated processing of PPIs. Furthermore, it improves current state-of-the-art proposals in terms of expressiveness and in terms of providing an explicit visualisation of the link between PPIs and business processes, which avoids inconsistencies and promotes their co-evolution. The reference implementation, developed as a complete tool suite, has allowed its validation in a multiple-case study, in which five dimensions of Visual ppinot were studied: expressiveness, precision, automation, understandability, and traceability

    Privacy and Security Issues in e-Ticketing: Optimisation of Smart Card-based Attribute-proving

    Get PDF
    Contains fulltext : 84144.pdf (preprint version ) (Open Access)Workshop on Foundations of Security and Privacy, FCS-PrivMod 2010, Edinburgh, UK, July 14-15, 2010, 14 juli 201
    • …
    corecore