Search results for "Security."

showing 10 items of 1645 documents

Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals

2018

Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…

020205 medical informaticsbusiness.industryAccess controlInformation needs02 engineering and technologyInformation securitySecurity policyInformation sensitivityNursingHealth care0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSecurity managementBusinessQualitative research2018 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Security Management in Health Care Information Systems — A Literature Review

2017

Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…

020205 medical informaticsbusiness.industryInternet privacyInformation needsAccess controlUsability02 engineering and technologyInformation securityPeer review03 medical and health sciences0302 clinical medicineHealth careHealth care information systems0202 electrical engineering electronic engineering information engineeringSecurity management030212 general & internal medicinebusiness2017 International Conference on Computational Science and Computational Intelligence (CSCI)
researchProduct

Soil genetic erosion: New conceptual developments in soil security

2019

In the last decades, in some Mediterranean areas, pedodiversity decreased mainly due to pedotechnique application in large-scale farming that transformed original soils into Anthrosols. Supporting the consideration that soils can be considered as living systems, the original concept of 'soil genetic erosion' is re-proposed. Data, extrapolated and modeled from a Soil Information System in a study case representative of a Mediterranean landscape, predicted that most of the soil types would disappear in few years leading to a decrease of the soil diversity and originating soil genetic erosion. This circumstance is intentionally here told in form of a story where the fairy tale characters are s…

0208 environmental biotechnologyBiodiversitySoil Science02 engineering and technologySoil ecosystem serviceEcosystem servicesPedodiversitySoil securityEnvironmental protectionGenetic erosionNature and Landscape ConservationWater Science and TechnologyAnthropogenic soilbusiness.industrySoil classification04 agricultural and veterinary sciences020801 environmental engineeringSoil genetic erosionGeographyAgriculturelcsh:TA1-2040Settore AGR/14 - PedologiaSoil waterSustainability040103 agronomy & agriculture0401 agriculture forestry and fisheriesbusinessPedodiversitylcsh:Engineering (General). Civil engineering (General)Agronomy and Crop Science
researchProduct

Robust Network Agreement on Logical Information

2011

Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…

0209 industrial biotechnology020901 industrial engineering & automationTheoretical computer scienceSettore ING-INF/04 - AutomaticaComputer scienceDistributed computingIntrusion detection security robust logical consensus networked and distributed systems.0202 electrical engineering electronic engineering information engineering020207 software engineeringTopology (electrical circuits)02 engineering and technologyIntrusion detection systemProtocol (object-oriented programming)
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

A methodology for evaluating the flexibility potential of domestic air-conditioning systems

2020

The paper presents a methodology for quantifying the electrical flexibility potential of air-conditioning systems (ACS) installed in residential buildings according to the building envelope characteristics and the ACS performance. In order to provide a thorough analysis of the issue, the ACS baseline consumption referred to the indoor temperature of 24°C has been computed for three typical residential buildings built in the South of Italy over different periods. The baseline consumption was used as a reference to estimate the effect of the set point temperature change on the ACS power profile. The results showed that increasing the set-point temperature of ACS by 2°C and 4°C leads to a redu…

0209 industrial biotechnologyComputer scienceIndoor temperature020209 energyElectrical flexibility02 engineering and technologyDemand responseSet (abstract data type)Thermostat020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringBaseline (configuration management)Grid securityConsumption (economics)Flexibility (engineering)business.industryElectrical consumptionResidential buildingElectric load managementReliability engineeringPower (physics)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSettore ING-IND/31 - ElettrotecnicaAir conditioningBuilding envelopeAir conditioningHousingSet-point temperaturesbusinessDemand response programBuilding envelope
researchProduct

Security Assessment of a Distributed, Modbus-based Building Automation System

2017

Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target organization or even the residents of the building. This work presents an approach to apply a method of data flow recognition and environment analysis to building automation through a case study on a distributed building automation system utilizing the Modbus protocol at the sites and presents s…

0209 industrial biotechnologyComputer scienceTotally integrated automationprotocols02 engineering and technologysecurityComputer securitycomputer.software_genre020901 industrial engineering & automationHome automationrakennusautomaatio0202 electrical engineering electronic engineering information engineeringtietoturvaProtocol (object-oriented programming)ModbusBuilding automationBuilding management systemta113ta213business.industry020208 electrical & electronic engineeringprotokollatbuilding automation systemsISA100.11aThe Internetbusinesscomputer
researchProduct

Reliable diagnostics using wireless sensor networks

2019

International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…

0209 industrial biotechnologyGeneral Computer ScienceComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Network topology[SPI.AUTO]Engineering Sciences [physics]/Automatic[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingPrognostics and health management[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringAdaBoostElectroniquebusiness.industryNetwork packetGeneral Engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networksRandom forest[SPI.TRON]Engineering Sciences [physics]/Electronics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor node020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Gradient boosting[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputers in Industry
researchProduct

Do terrorism, organized crime (drug production), and state weakness affect contemporary armed conflicts? An empirical analysis

2015

ABSTRACTIn 2014, the UN Security Council emphasized the dangers of terrorism, criminal activity (especially drug production and trafficking), and state weakness in conflict areas. However, neither policy debates nor scholarly analyses have focussed on the potential impact of these elements on conflict dynamics and characteristics, and the investigated partial relationships have led to inconclusive results. This article explores the presence in armed conflicts of terrorist groups among fighting parties, major drug production (indicating the presence of activities typical of criminal organizations), and state failure in the period 1990–2011. Focussing on intrastate conflicts, this article hig…

0209 industrial biotechnologyWeaknessSociology and Political ScienceArmed conflictmedia_common.quotation_subjectconflict duration02 engineering and technologyCriminologyAffect (psychology)Organized crime020901 industrial engineering & automationState (polity)Threshold effect0202 electrical engineering electronic engineering information engineeringmedicineSociologyOrganised crimemedia_commonstate weakneLawPolitical Science and International RelationsTerrorismDrug productionTerrorism020201 artificial intelligence & image processingSecurity councilmedicine.symptomSettore SPS/04 - Scienza PoliticaGlobal Change, Peace & Security
researchProduct

Tolerating malicious monitors in detecting misbehaving robots

2008

This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.

0209 industrial biotechnologybusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsContext (language use)security02 engineering and technologyMotion (physics)consensus algorithm020901 industrial engineering & automationSettore ING-INF/04 - AutomaticaWork (electrical)Embedded system0202 electrical engineering electronic engineering information engineeringRobotDistributed software architectureIntrusion detectionmulti-agent systemsSoftware architecturebusiness
researchProduct