11 research outputs found

    National and Transnational Security Implications of Asymmetric Access to and Use of Biological Data

    Get PDF
    Biology and biotechnology have changed dramatically during the past 20 years, in part because of increases in computational capabilities and use of engineering principles to study biology. The advances in supercomputing, data storage capacity, and cloud platforms enable scientists throughout the world to generate, analyze, share, and store vast amounts of data, some of which are biological and much of which may be used to understand the human condition, agricultural systems, evolution, and environmental ecosystems. These advances and applications have enabled: (1) the emergence of data science, which involves the development of new algorithms to analyze and visualize data; and (2) the use of engineering approaches to manipulate or create new biological organisms that have specific functions, such as production of industrial chemical precursors and development of environmental bio-based sensors. Several biological sciences fields harness the capabilities of computer, data, and engineering sciences, including synthetic biology, precision medicine, precision agriculture, and systems biology. These advances and applications are not limited to one country. This capability has economic and physical consequences, but is vulnerable to unauthorized intervention. Healthcare and genomic information of patients, information about pharmaceutical and biotechnology products in development, and results of scientific research have been stolen by state and non-state actors through infiltration of databases and computer systems containing this information. Countries have developed their own policies for governing data generation, access, and sharing with foreign entities, resulting in asymmetry of data sharing. This paper describes security implications of asymmetric access to and use of biological data

    Guidelines for the Development of Comprehensive Care Centers for Congenital Adrenal Hyperplasia: Guidance from the CARES Foundation Initiative

    Get PDF
    Patients with rare and complex diseases such as congenital adrenal hyperplasia (CAH) often receive fragmented and inadequate care unless efforts are coordinated among providers. Translating the concepts of the medical home and comprehensive health care for individuals with CAH offers many benefits for the affected individuals and their families. This manuscript represents the recommendations of a 1.5 day meeting held in September 2009 to discuss the ideal goals for comprehensive care centers for newborns, infants, children, adolescents, and adults with CAH. Participants included pediatric endocrinologists, internal medicine and reproductive endocrinologists, pediatric urologists, pediatric surgeons, psychologists, and pediatric endocrine nurse educators. One unique aspect of this meeting was the active participation of individuals personally affected by CAH as patients or parents of patients. Representatives of Health Research and Services Administration (HRSA), New York-Mid-Atlantic Consortium for Genetics and Newborn Screening Services (NYMAC), and National Newborn Screening and Genetics Resource Center (NNSGRC) also participated. Thus, this document should serve as a “roadmap” for the development phases of comprehensive care centers (CCC) for individuals and families affected by CAH

    Guidelines for the Development of Comprehensive Care Centers for Congenital Adrenal Hyperplasia: Guidance from the CARES Foundation Initiative

    Get PDF
    Patients with rare and complex diseases such as congenital adrenal hyperplasia (CAH) often receive fragmented and inadequate care unless efforts are coordinated among providers. Translating the concepts of the medical home and comprehensive health care for individuals with CAH offers many benefits for the affected individuals and their families. This manuscript represents the recommendations of a 1.5 day meeting held in September 2009 to discuss the ideal goals for comprehensive care centers for newborns, infants, children, adolescents, and adults with CAH. Participants included pediatric endocrinologists, internal medicine and reproductive endocrinologists, pediatric urologists, pediatric surgeons, psychologists, and pediatric endocrine nurse educators. One unique aspect of this meeting was the active participation of individuals personally affected by CAH as patients or parents of patients. Representatives of Health Research and Services Administration (HRSA), New York-Mid-Atlantic Consortium for Genetics and Newborn Screening Services (NYMAC), and National Newborn Screening and Genetics Resource Center (NNSGRC) also participated. Thus, this document should serve as a “roadmap” for the development phases of comprehensive care centers (CCC) for individuals and families affected by CAH

    Guidelines for the Development of Comprehensive Care Centers for Congenital Adrenal Hyperplasia: Guidance from the CARES Foundation Initiative

    Get PDF
    Abstract Patients with rare and complex diseases such as congenital adrenal hyperplasia (CAH) often receive fragmented and inadequate care unless efforts are coordinated among providers. Translating the concepts of the medical home and comprehensive health care for individuals with CAH offers many benefits for the affected individuals and their families. This manuscript represents the recommendations of a 1.5 day meeting held in September 2009 to discuss the ideal goals for comprehensive care centers for newborns, infants, children, adolescents, and adults with CAH. Participants included pediatric endocrinologists, internal medicine and reproductive endocrinologists, pediatric urologists, pediatric surgeons, psychologists, and pediatric endocrine nurse educators. One unique aspect of this meeting was the active participation of individuals personally affected by CAH as patients or parents of patients. Representatives of Health Research and Services Administration (HRSA), New York-Mid-Atlantic Consortium for Genetics and Newborn Screening Services (NYMAC), and National Newborn Screening and Genetics Resource Center (NNSGRC) also participated. Thus, this document should serve as a "roadmap" for the development phases of comprehensive care centers (CCC) for individuals and families affected by CAH

    Dynamic Authentication for High-Performance Networked Applications

    No full text
    Both government and business are increasingly interested in addressing the growing threats imposed by the lack of adequate information security. Consistent with these efforts, our work focuses on the integrity and protection of information exchanged in high-performance networked computing applications such as video teleconferencing and other streamed interactive data exchanges. For these applications, security procedures are often omitted in the interest of performance. Since this may not be acceptable when using public communications media, our research makes explicit and then utilizes the inherent tradeoffs in realizing performance vs. security in communications. In this paper, we expand the notion of QoS to include the level of security that can be offered within performance and CPU resource availability constraints. To address performance and security tradeoffs in asymmetric and dynamic client-server environments, we developed Authenticast, a dynamically configurable, user-level communications protocol, offering variable levels of security throughout execution. The Authenticast protocol comprises a suite of heuristics to realize dynamic security levels, as well as heuristics that decide when and how to apply dynamic security. To demonstrate this protocol, we have implemented a prototype of a high performance privacy system. We have developed and experimented with a novel security control abstraction with which tradeoffs in security vs. performance may be made explicit and then utilized with dynamic client-server asymmetries. This abstraction is called a security thermostat [12], and interacts directly with Authenticast to enable adaptive security processing. Our results demonstrate overall increased scalability and improved performance when adaptive security is applied to the client-server platform with varying numbers of clients and varying resource availabilities at clients

    Authenticast: An Adaptive Protocol for High-Performance, Secure Network Applications

    No full text
    A primary obstacle in the path to successful commercial Internet utilization is the lack of adequate security. Strong security algorithms create tremendous processing overheads and are often omitted in the interest of application performance. If electronic commerce applications are to succeed, then they cannot compromise performance or security. We present Authenticast, an adaptive, user-level authenticated transmission protocol to facilitate a resource utilization balance which enables the existence of high-performance applications with sufficient security to be executed over a public communications medium. Our solution comprises the following contributions: We present the addition of a security allocation parameter, securityLevel, to the Quality of Service (QoS) specification. We introduce the concept of the Security Thermostat to depict Authenticast's dynamic runtime modification of securityLevel based on user requirements or desires. We present the design and implementation of the Authenticast protocol to interface with the "thermostat" concept and facilitate parameter changes during application execution

    DRRM: Dynamic Resource Reservation Manager

    No full text
    Much of the success of the Internet can be attributed to the IP "hour-glass" model: IP provides a consistent, best-effort service interface that has allowed the relatively independent development of applications and underlying networking technology. As network services and applications become more complex, so does the task of mapping an application to the appropriate service. We propose a Dynamic Resource Reservation Manager (drrm ) that maps application streams into network services. This entity will shield applications from the details of network services, in the same spirit as the hour-glass model of IP. We describe the architecture and implementation of a drrm , and investigate a key problem that must be solved: determining locations to renegotiate connection parameters. We consider the complexity of finding the optimal locations, and propose heuristics for both on-line and offline cases. We evaluate the performance of the heuristics using several application models. 1 Introductio..
    corecore