Search results for "Information exchange"
showing 10 items of 39 documents
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…
Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders
2017
Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…
Use of Information from Clinical Trials for an Integrated Cancer Registry
1990
AbstractThe registry of childhood malignancies in the F.R.G. is a combination of a population-based and hospital-based cancer registry. A large amount of the collected data originates from multicenter clinical trials which are integrated into the documentation system of the cancer registry. The paper describes the information flow and the system of data storage which consists of a central database on a departmental system at the registry and of several coordinated peripheral databases on microcomputers at the trial centers. Practical experience shows an increased availability and validity of the data in the registry since the implementation of the system. Aspects of data integrity and secur…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Perceived Support in E-Collaborative Learning: An Exploratory Study Which Make Use of Synchronous and Asynchronous Online-Teaching Approaches
2012
This study compares four different learning environments for e-collaborative learning in two European countries related to the dimension of student's mutual support. The theoretical baseline is Vygotsky's zone of proximal development (ZOPD) and the socio-genetic approach of Piaget. The analyzed data are based on questionnaires collected over the time period of an entire semester including four different courses at the master's level. These courses applied different e-collaborative approaches including a variety of tools for supporting communication. It is assumed that these courses including communication tools e.g. virtual face-to-face meetings enhance the chances for better communication,…
Palliative Care in Advanced Cancer Patients: How and When? And Where?
2012
Eduardo Bruera et al. [1] recently published an exhaustive paper in which they underscore the importance of the integration between oncology and palliative care, suggesting how and when to provide palliative care in advanced cancer patients. We agree that this integrative model allows prompt evaluation and treatment of symptoms, a reduction in costs resulting from inappropriate hospitalization, and better survival outcomes. In their conclusion, Bruera et al. [1] affirm that the two most important resources for palliative care delivery are outpatient palliative care centers and inpatient palliative care units. Although we are on the same wavelength as Bruera et al. [1], we would like to poin…
Learning Research Methods and Processes via Sharing Experience in a BLOG
2006
The goal is to increase knowledge about different research methods that have been employed in the information technology field by supporting the information exchange, collaboration, and cooperation between researchers. Well-designed, well-told stories can help others learn from past situations to respond more effectively in future situation. A blog is presented where PhD students and researchers are invited to collaborate by providing their stories, reading and commenting existing stories. This infrastructure allows researchers and PhD students to write the contents posing questions and finding answers on the relationship between research process and research results.
Blogging as a research and educational tool: a three years experience
2008
Abstract Blogging can be also used to share knowledge in research and education. We have been using many blogs with the following purposes. One goal has been to raise awareness about research methods in the information technology field by supporting information exchange, collaboration, and cooperation between researchers. We have been using a common blog for 3 years to share inter- and intra disciplinary knowledge among us. We have also collected stories and interviewed colleagues and friends. An other goal is the use of blogs during our teaching experience as an instrument to support the exchange of knowledge with students. A comparison of the use of blogging is presented with positive and…
Review of information and communication technologies for smart micro-grid automation
2017
The growing challenges of Smart Micro-Grid can only be met if secure and fast information and communication technology (ICT) solutions are developed. In this paper, some of the ICT techniques are reviewed for smart micro-grid automation. Firstly, an overview of the role of ICT in grid distribution is explained with respect to electricity value chain in power distribution. Further, each domain in the value chain is analyzed with respect to ICT applications in power generation, transmission, distribution and consumption. ICT stands as a prominent driving force to enhance trustworthiness, security, and productivity of the power distribution through information exchange, regulated generation, d…