Search results for "Crypt"

showing 10 items of 1111 documents

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records

2017

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…

020205 medical informaticsRevocationbusiness.industryComputer scienceInternet privacyCloud computingAccess controlHealth information exchange02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingScalability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAttribute-based encryptionbusinesscomputerProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
researchProduct

District heating networks: enhancement of the efficiency

2019

International audience; During the decades the district heating's (DH) advantages (more cost-efficient heat generation and reduced air pollution) overcompensated the additional costs of transmission and distribution of the centrally produced thermal energy to consumers. Rapid increase in the efficiency of low-power heaters, development of separated low heat density areas in cities reduce the competitiveness of the large centralized DH systems in comparison with the distributed cluster-size networks and even local heating. Reduction of transmission costs, enhancement of the network efficiency by optimization of the design of the DH networks become a critical issue. The methodology for determ…

020209 energynetwork design02 engineering and technology7. Clean energyAutomotive engineeringReduction (complexity)JEL: C - Mathematical and Quantitative Methods/C.C4 - Econometric and Statistical Methods: Special Topics/C.C4.C45 - Neural Networks and Related Topicsbenchmarking methodologies11. Sustainability0202 electrical engineering electronic engineering information engineeringdistrict heatingbusiness.industry020208 electrical & electronic engineeringdata miningBenchmarkingJEL: O - Economic Development Innovation Technological Change and Growth/O.O1 - Economic Development/O.O1.O13 - Agriculture • Natural Resources • Energy • Environment • Other Primary Products[SHS.ECO]Humanities and Social Sciences/Economics and FinanceNetwork planning and designVariable (computer science)Transmission (telecommunications)13. Climate actionHeat generationKey (cryptography)Environmental sciencebusinessJEL: C - Mathematical and Quantitative Methods/C.C2 - Single Equation Models • Single Variables/C.C2.C24 - Truncated and Censored Models • Switching Regression Models • Threshold Regression ModelsThermal energyInsights into Regional Development
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

A unified observer for robust sensorless control of DC–DC converters

2017

Abstract Due to the large variety of converters' configurations, many different sensorless controllers are available in the literature, each one suited for a particular converter. The need for different configurations, especially on the same power supply, make it clear the advantage of having a shared control algorithm. This paper presents a unified nonlinear robust current observer for buck, boost and buck–boost converters in synchronous and asynchronous configurations. The unified observer speeds up the design, tuning and the implementation, and requires a memory cheaper code, easier to certify. Simulation and experimental results are presented to validate the approach in different scenar…

0209 industrial biotechnologyEngineeringObserver (quantum physics)Control (management)Robust control02 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciAsynchronous converters020901 industrial engineering & automationControl theory0202 electrical engineering electronic engineering information engineeringCode (cryptography)Electrical and Electronic Engineeringbusiness.industryApplied Mathematics020208 electrical & electronic engineeringSynchronous convertersControl engineeringConvertersSensorless controlComputer Science ApplicationsPower (physics)Current mode controlNonlinear systemNonlinear observerControl and Systems EngineeringAsynchronous communicationRobust controlbusinessDC–DC converters
researchProduct

On the Heuristic Procedure to Determine Processing Parameters in Additive Manufacturing Based on Materials Extrusion

2020

We present a heuristic procedure for determining key processing parameters (PPs) in materials-extrusion-based additive manufacturing processes. The concept relies on a design-of-experiment approach and consists of eleven &ldquo

0209 industrial biotechnologyFDMPolymers and PlasticsComputer sciencemedia_common.quotation_subjectdesign of experiment3D printingmaterials extrusion02 engineering and technologyRaw materialArticlelcsh:QD241-441020901 industrial engineering & automationlcsh:Organic chemistryCalibration:NATURAL SCIENCES:Physics [Research Subject Categories]Quality (business)Layer (object-oriented design)Process engineeringmedia_commonbusiness.industryDesign of experimentsprocess parametersGeneral Chemistry3D printing021001 nanoscience & nanotechnologyKey (cryptography)Extrusion0210 nano-technologybusinessoptimizationPolymers
researchProduct

Reliable diagnostics using wireless sensor networks

2019

International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…

0209 industrial biotechnologyGeneral Computer ScienceComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Network topology[SPI.AUTO]Engineering Sciences [physics]/Automatic[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingPrognostics and health management[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringAdaBoostElectroniquebusiness.industryNetwork packetGeneral Engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networksRandom forest[SPI.TRON]Engineering Sciences [physics]/Electronics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor node020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Gradient boosting[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputers in Industry
researchProduct

Human Systems Design: Towards an Integrative Conceptual Framework

2020

International audience; Conceiving artefacts and tools is one of the major key characteristics of the human species. Since the beginning of automation and even more since the spreading of computer science, this activity has become more and more challenging especially through the analysis of the different interaction modes between the artifacts and the human. Nowadays, developing an artifact that must interact with a human is requiring an integrative point of view which must include biological, physical and cybernetical concerns. The current norms aimed at characterizing the quality and the relevance of human machine interface are generally limited to standard interfaces and/or to specific d…

0209 industrial biotechnologyHuman systems engineeringInteractionComputer sciencemedia_common.quotation_subjectIntegration02 engineering and technologyArtifact (software development)EpistemologyDomain (software engineering)Human-systems03 medical and health sciences020901 industrial engineering & automation0302 clinical medicineConceptual frameworkQuality (business)Relevance (information retrieval)media_commonbusiness.industryData scienceAutomationConceptual framework030220 oncology & carcinogenesis[SCCO.PSYC]Cognitive science/Psychology[SCCO.PSYC] Cognitive science/PsychologyKey (cryptography)Ergonomic criteriabusiness
researchProduct

Sampled Fictitious Play on Networks

2019

We formulate and solve the problem of optimizing the structure of an information propagation network between multiple agents. In a given space of interests (e.g., information on certain targets), each agent is defined by a vector of their desirable information, called filter, and a vector of available information, called source. The agents seek to build a directed network that maximizes the value of the desirable source-information that reaches each agent having been filtered en route, less the expense that each agent incurs in filtering any information of no interest to them. We frame this optimization problem as a game of common interest, where the Nash equilibria can be attained as limit…

0209 industrial biotechnologyMathematical optimization021103 operations researchOptimization problemComputer scienceNode (networking)Frame (networking)0211 other engineering and technologies02 engineering and technologyFilter (signal processing)Fictitious playsymbols.namesake020901 industrial engineering & automationNash equilibriumLimit pointKey (cryptography)symbols
researchProduct

The Integration of the Supply Chain as a Dynamic Capability for Sustainability: The Case of an Innovative Organic Company

2018

Numerous research projects have demonstrated that a firm’s ability to integrate, build, and reconfigure internal and external competencies to adapt to changes in its environment is a key capability for its competitiveness. However, in the case of developing the capabilities needed to implement innovation, we have found that the ability to integrate knowledge into the supply chain is also crucial since it is an essential requirement for bringing in technological change and product innovation. The purpose of this chapter is to understand the role of supplier integration in the implementation of radical innovation. First, we propose a theoretical model to connect supplier integration as a dyna…

021103 operations researchProcess managementProduct innovationTechnological changeSupply chain05 social sciences0211 other engineering and technologies02 engineering and technologyOrder (exchange)General partnership0502 economics and businessSustainabilityKey (cryptography)BusinessDynamic capabilities050203 business & management
researchProduct