Search results for "Access control"
showing 9 items of 79 documents
Towards Risk-aware Access Control Framework for Healthcare Information Sharing
2018
Security, Reliability and Usability of mHealth Environments
2015
Mobile technologies confer mobility and autonomy on patients with the advantage of access to home care and health care services on demand. However, these benefits impose challenges to the future health care services. For instance, computation capacity of a conventional smartphone provides applications and services with sufficient power of calculation and automation to assist in daily life activities and medical purposes. Combined with a user-friendly interface, mobile technologies can be an easy and efficient manner to help people who are in a condition of cognitive deterioration or have a chronic disease which demands a close connection to near family members and/or to health care services.
Security in mobile agent systems
2007
Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case
2009
Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…
Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…
Opportunistic Synchronization for Improving IEEE 802.15.4 MAC Performance in Chain Topologies
2010
The most effective solution for energy saving in low-rate wireless sensor networks is maintaining each node in a doze state as long as possible. In order to guarantee network connectivity, the intervals at which the network sensors are turned on and off have to be coordinated. Therefore, synchronization is a very critical function for sensor networks. In this paper, we analyze the IEEE 802.15.4 MAC performance in sensor networks deployed in a chain topology. For this topology, critical inefficiencies can arise in case of multi-hop packet deliveries. We evaluate the impact of different synchronization schemes on the network performance, both in terms of network throughput and in terms of ene…
Betydningen av Rollebegrepet i utviklingen av virksomhetsovergripende EPJ standarder
2016
Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The current offer of health care services shows that patients receive services from multiple health care providers within diagnostic procedures, treatment and follow-up care. Consequently, this entails that health care personnel across the board require access to updated information on the patient in order to provide health care. Today each health care establishment keep separate electronic health records (EHR) to which only their own employees have access. In addition, most establishments have individually adapted their records in relation to structure, access control and roles. Moving forward the goal is to provide a…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Authorized authentication evaluation framework for constrained environments
2016
Internetin kasvu ei perustu tällä hetkellä vain uusien solmujen määrään, vaan Internet on levittäytymässä aivan uusille alueille. Viimeaikoina erilaiset tavat kerätä tietoa ja ohjata laitteita uusin tavoin ovat yleistyneet esimerkiksi teollisuudessa, kaupunkiympäristöjen melun ja saasteiden seurannassa. Lisäksi käsitteet älykoti tai -kaupunki alkavat olla yleisesti tunnettuja. Nykyinen kasvu näiden teknologioiden käytössä perustuu pitkälti laitteiden koon pienenemiseen ja hintojen laskuun. Jotta Esineiden Internet pystyy kasvamaan merkittävällä tavalla, laitteiden fyysisten kokojen ja hintojen tulisi pysyä matalalla tasolla tai laskea edelleen. Pieni koko ja hinta tarkoittaa kuitenkin usein…