Search results for "Crypt"
showing 10 items of 1111 documents
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…
District heating networks: enhancement of the efficiency
2019
International audience; During the decades the district heating's (DH) advantages (more cost-efficient heat generation and reduced air pollution) overcompensated the additional costs of transmission and distribution of the centrally produced thermal energy to consumers. Rapid increase in the efficiency of low-power heaters, development of separated low heat density areas in cities reduce the competitiveness of the large centralized DH systems in comparison with the distributed cluster-size networks and even local heating. Reduction of transmission costs, enhancement of the network efficiency by optimization of the design of the DH networks become a critical issue. The methodology for determ…
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
A unified observer for robust sensorless control of DC–DC converters
2017
Abstract Due to the large variety of converters' configurations, many different sensorless controllers are available in the literature, each one suited for a particular converter. The need for different configurations, especially on the same power supply, make it clear the advantage of having a shared control algorithm. This paper presents a unified nonlinear robust current observer for buck, boost and buck–boost converters in synchronous and asynchronous configurations. The unified observer speeds up the design, tuning and the implementation, and requires a memory cheaper code, easier to certify. Simulation and experimental results are presented to validate the approach in different scenar…
On the Heuristic Procedure to Determine Processing Parameters in Additive Manufacturing Based on Materials Extrusion
2020
We present a heuristic procedure for determining key processing parameters (PPs) in materials-extrusion-based additive manufacturing processes. The concept relies on a design-of-experiment approach and consists of eleven &ldquo
Reliable diagnostics using wireless sensor networks
2019
International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…
Human Systems Design: Towards an Integrative Conceptual Framework
2020
International audience; Conceiving artefacts and tools is one of the major key characteristics of the human species. Since the beginning of automation and even more since the spreading of computer science, this activity has become more and more challenging especially through the analysis of the different interaction modes between the artifacts and the human. Nowadays, developing an artifact that must interact with a human is requiring an integrative point of view which must include biological, physical and cybernetical concerns. The current norms aimed at characterizing the quality and the relevance of human machine interface are generally limited to standard interfaces and/or to specific d…
Sampled Fictitious Play on Networks
2019
We formulate and solve the problem of optimizing the structure of an information propagation network between multiple agents. In a given space of interests (e.g., information on certain targets), each agent is defined by a vector of their desirable information, called filter, and a vector of available information, called source. The agents seek to build a directed network that maximizes the value of the desirable source-information that reaches each agent having been filtered en route, less the expense that each agent incurs in filtering any information of no interest to them. We frame this optimization problem as a game of common interest, where the Nash equilibria can be attained as limit…
The Integration of the Supply Chain as a Dynamic Capability for Sustainability: The Case of an Innovative Organic Company
2018
Numerous research projects have demonstrated that a firm’s ability to integrate, build, and reconfigure internal and external competencies to adapt to changes in its environment is a key capability for its competitiveness. However, in the case of developing the capabilities needed to implement innovation, we have found that the ability to integrate knowledge into the supply chain is also crucial since it is an essential requirement for bringing in technological change and product innovation. The purpose of this chapter is to understand the role of supplier integration in the implementation of radical innovation. First, we propose a theoretical model to connect supplier integration as a dyna…