Search results for "Information sensitivity"

showing 10 items of 19 documents

Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals

2018

Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…

020205 medical informaticsbusiness.industryAccess controlInformation needs02 engineering and technologyInformation securitySecurity policyInformation sensitivityNursingHealth care0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSecurity managementBusinessQualitative research2018 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct

Whole-genome sequencing for TB source investigations : principles of ethical precision public health

2021

[Background]: Whole-genome sequencing (WGS) of Mycobacterium tuberculosis allows rapid, accurate inferences about the sources, location and timing of transmission. However, in an era of heightened concern for personal privacy and science distrust, such inferences could result in unintended harm and undermine the public's trust.

0301 basic medicinePulmonary and Respiratory Medicinemedicine.medical_specialtymedia_common.quotation_subjectInternet privacyDisease OutbreaksBlame03 medical and health sciences0302 clinical medicineMedicineHumans030212 general & internal medicinehealth care economics and organizationsmedia_commonCommunity engagementDistrustWhole Genome Sequencingbusiness.industryPublic healthAdministrative PersonnelMycobacterium tuberculosisTransparency (behavior)Information sensitivity030104 developmental biologyInfectious DiseasesHarmRight to knowPublic HealthHuman medicinebusinessInternational journal of tuberculosis and lung disease
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct

Privacy handling for critical information infrastructures

2013

This paper proposes an architecture and a methodology for privacy handling in Critical Information Infrastructures. Privacy is in this respect considered as both the risk of revealing person-sensitive information, for example from critical infrastructures in health institutions, but also to identify and avoid leakage of confidential information from the critical information infrastructures themselves. The architecture integrates privacy enhancing technologies into an enterprise service bus, which allows for policy-controlled authorisation, anonymisation and encryption of information in XML elements or attributes in messages on the service bus. The proposed methodology can be used to identif…

Information privacyPrivacy by DesignComputer sciencebusiness.industryPrivacy softwareComputer securitycomputer.software_genreEncryptionInformation sensitivityEnterprise service busPrivacy-enhancing technologiesbusinessResilience (network)computer2013 11th IEEE International Conference on Industrial Informatics (INDIN)
researchProduct

A Model for Digital Archival of Municipal Documents

2006

While outsourcing IT infrastructure and various IT functions is common, outsourcing the digital archival of municipal documents has not been realized. The reasons for this include the complexity of operations, the lack of models complying with governmental regulation on archival as well as conflicting requirements on the security of sensitive information and public access. This paper presents a case where a municipality aims at outsourcing in a pilot project supported by researchers in project Kunda. Project Kunda applies a model utilizing a combination of contemporary standards, technologies and research results to achieve a replicable way to outsource the digital archival of municipal doc…

InformationSystems_GENERALManagement information systemsInformation sensitivityKnowledge managementbusiness.industryComputer scienceInformation technology managementInformation technologyProfessional communicationInformation securitybusinessKnowledge process outsourcingOutsourcing2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06)
researchProduct

Access Control Model for Cooperative Healthcare Environments: Modeling and Verification

2016

Integrated use of electronic health records (EHRs) seem both promising and necessary in improving the quality and delivery of health services. This allows healthcare providers access to information they require to provide rapid patient care. Of course, when sensitive information is shared among a group of people within or across organizations, enforceable security and privacy control over the information flow is a key aspect. In this study, an access control model for cooperative healthcare environments is presented. A work-based access control (WBAC) model is proposed by introducing the concept of team role and modifying the user-role assignment model from previous work. Verification indic…

Knowledge managementComputer sciencebusiness.industrymedia_common.quotation_subjectControl (management)Access control02 engineering and technologyInformation sensitivityWork (electrical)020204 information systemsHealth care0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingQuality (business)Information flow (information theory)businessmedia_common2016 IEEE International Conference on Healthcare Informatics (ICHI)
researchProduct

Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based Paradigm

2016

Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. Additionally, an ever-increasingly amount of sensitive information will be stored on various networks. A good and effi- cient firewall strategy will attempt to secure this information, and to also manage the large amount of inevitable network traffic that these devices create. The goal of this paper is to propose a framework for designing optimized firewalls for the IoT. This paper deals with two fundamental challenges/problems encountered in such…

Learning automataComputer sciencebusiness.industryDistributed computingSuiteEstimator020206 networking & telecommunicationsLearning Automata02 engineering and technologyFirewall OptimizationNon-Stationary EnvironmentsInformation sensitivityFirewall (construction)Batch UpdateMatching time0202 electrical engineering electronic engineering information engineeringRule matchingThe InternetWeak EstimatorsInternet of Thingsbusiness
researchProduct