Search results for "Access control"

showing 9 items of 79 documents

Towards Risk-aware Access Control Framework for Healthcare Information Sharing

2018

business.industryComputer scienceInformation sharingInternet privacyHealth care0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processingAccess control02 engineering and technologybusinessProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

Security, Reliability and Usability of mHealth Environments

2015

Mobile technologies confer mobility and autonomy on patients with the advantage of access to home care and health care services on demand. However, these benefits impose challenges to the future health care services. For instance, computation capacity of a conventional smartphone provides applications and services with sufficient power of calculation and automation to assist in daily life activities and medical purposes. Combined with a user-friendly interface, mobile technologies can be an easy and efficient manner to help people who are in a condition of cognitive deterioration or have a chronic disease which demands a close connection to near family members and/or to health care services.

business.industryComputer scienceInternet privacyUsability engineeringHealth careUsabilityMobile technologyAccess controlCustomer relationship managementUser interfacebusinessmHealth
researchProduct

Security in mobile agent systems

2007

business.industryComputer scienceNetwork Access ControlMobile computingbusinessMobile agent systemsComputer network
researchProduct

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

2009

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

business.industryComputer scienceWireless networkNetwork packetDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlCooperative diversitylaw.inventionTransmit diversityRelaylawComputer Science::Networking and Internet ArchitectureNetwork performancebusinessSelection algorithmComputer Science::Information TheoryComputer network2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
researchProduct

Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer

2014

Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…

hsi500Tilgangsstyring ; Tilgangskontroll Delphi ; Elektronisk pasientjournal ; Informasjonssikkerhet ; Spesialisthelsetjeneste ; Pasientsikkerhet ; Access Control ; Delphi ; Electronic Health Records ; Information security ; Patient safetyVDP::Technology: 500::Information and communication technology: 550
researchProduct

Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies

2010

The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of ene…

sensor networks medium access control energy savingSettore ING-INF/04 - AutomaticaSettore ING-INF/03 - Telecomunicazioni
researchProduct

Betydningen av Rollebegrepet i utviklingen av virksomhetsovergripende EPJ standarder

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The current offer of health care services shows that patients receive services from multiple health care providers within diagnostic procedures, treatment and follow-up care. Consequently, this entails that health care personnel across the board require access to updated information on the patient in order to provide health care. Today each health care establishment keep separate electronic health records (EHR) to which only their own employees have access. In addition, most establishments have individually adapted their records in relation to structure, access control and roles. Moving forward the goal is to provide a…

standardizationtilgangsstyringelectronic health recordselektronisk pasientjournalstandardiseringrolleaccess controlroleVDP::Technology: 500::Information and communication technology: 550
researchProduct

Anomaly detection approach to keystroke dynamics based user authentication

2017

Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…

ta113AuthenticationpääsynvalvontaComputer scienceaccess control02 engineering and technologycomputer.software_genreKeystroke dynamicstodentaminen020204 information systems0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Unsupervised learningauthentication020201 artificial intelligence & image processingAnomaly detectionData miningtietoturvadata securitycomputer
researchProduct

Authorized authentication evaluation framework for constrained environments

2016

Internetin kasvu ei perustu tällä hetkellä vain uusien solmujen määrään, vaan Internet on levittäytymässä aivan uusille alueille. Viimeaikoina erilaiset tavat kerätä tietoa ja ohjata laitteita uusin tavoin ovat yleistyneet esimerkiksi teollisuudessa, kaupunkiympäristöjen melun ja saasteiden seurannassa. Lisäksi käsitteet älykoti tai -kaupunki alkavat olla yleisesti tunnettuja. Nykyinen kasvu näiden teknologioiden käytössä perustuu pitkälti laitteiden koon pienenemiseen ja hintojen laskuun. Jotta Esineiden Internet pystyy kasvamaan merkittävällä tavalla, laitteiden fyysisten kokojen ja hintojen tulisi pysyä matalalla tasolla tai laskea edelleen. Pieni koko ja hinta tarkoittaa kuitenkin usein…

todentaminenAuthorized AuthenticationInternet of Thingsrajoitetut ympäristötConstrained EnvironmentsAccess controlesineiden internet
researchProduct