Search results for "Security."
showing 10 items of 1645 documents
Security Management in Electronic Health Records: Attitudes and Experiences Among Health Care Professionals
2018
Electronic health records play an important role for management, exchange and storage of information within health care organizations. Health care organizations are obliged to adopt strategies for information security and privacy associated with access to medical and sensitive information, but at the same time, the information needs to be available for authorized health care professionals carrying out patient treatment. This paper presents a study about attitudes and experiences among health care professionals towards security management in electronic health records. Qualitative research methods were used, with an initial literature review that was followed by observations and interviews wi…
Security Management in Health Care Information Systems — A Literature Review
2017
Health care information systems play an important role for communication across the organizational borders of health care services. The electronic health record represents the main entity in the management, exchange and storage of medical information. Health care organizations must adopt strategies for security and privacy risks associated with access to health care information systems, but on the other hand, the information needs to be accessible and readable for authorized health care professionals carrying out patient treatment. This paper presents a literature review on security management in health care information systems. The aim was to analyze descriptions and definitions of informa…
Soil genetic erosion: New conceptual developments in soil security
2019
In the last decades, in some Mediterranean areas, pedodiversity decreased mainly due to pedotechnique application in large-scale farming that transformed original soils into Anthrosols. Supporting the consideration that soils can be considered as living systems, the original concept of 'soil genetic erosion' is re-proposed. Data, extrapolated and modeled from a Soil Information System in a study case representative of a Mediterranean landscape, predicted that most of the soil types would disappear in few years leading to a decrease of the soil diversity and originating soil genetic erosion. This circumstance is intentionally here told in form of a story where the fairy tale characters are s…
Robust Network Agreement on Logical Information
2011
Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
A methodology for evaluating the flexibility potential of domestic air-conditioning systems
2020
The paper presents a methodology for quantifying the electrical flexibility potential of air-conditioning systems (ACS) installed in residential buildings according to the building envelope characteristics and the ACS performance. In order to provide a thorough analysis of the issue, the ACS baseline consumption referred to the indoor temperature of 24°C has been computed for three typical residential buildings built in the South of Italy over different periods. The baseline consumption was used as a reference to estimate the effect of the set point temperature change on the ACS power profile. The results showed that increasing the set-point temperature of ACS by 2°C and 4°C leads to a redu…
Security Assessment of a Distributed, Modbus-based Building Automation System
2017
Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target organization or even the residents of the building. This work presents an approach to apply a method of data flow recognition and environment analysis to building automation through a case study on a distributed building automation system utilizing the Modbus protocol at the sites and presents s…
Reliable diagnostics using wireless sensor networks
2019
International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…
Do terrorism, organized crime (drug production), and state weakness affect contemporary armed conflicts? An empirical analysis
2015
ABSTRACTIn 2014, the UN Security Council emphasized the dangers of terrorism, criminal activity (especially drug production and trafficking), and state weakness in conflict areas. However, neither policy debates nor scholarly analyses have focussed on the potential impact of these elements on conflict dynamics and characteristics, and the investigated partial relationships have led to inconclusive results. This article explores the presence in armed conflicts of terrorist groups among fighting parties, major drug production (indicating the presence of activities typical of criminal organizations), and state failure in the period 1990–2011. Focussing on intrastate conflicts, this article hig…
Tolerating malicious monitors in detecting misbehaving robots
2008
This paper considers a multi–agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.