3 resultados para epoc® blood analysis system
em RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal
Resumo:
ABSTRACT - The Patient Protection and Affordable Care Act shook the foundations of the US health system, offering all Americans access to health care by changing the way the health insurance industry works. As President Obama signed the Act on 23 March 2010, he said that it stood for “the core principle that everybody should have some basic security when it comes to their health care”. Unlike the U.S., the Article 64 of the Portuguese Constitution provides, since 1976, the right to universal access to health care. However, facing a severe economic crisis, Portugal has, under the supervision of the Troika, a tight schedule to implement measures to improve the efficiency of the National Health Service. Both countries are therefore despite their different situation, in a conjuncture of reform and the use of new health management measures. The present work, using a qualitative research methodology examines the Affordable Care Act in order to describe its principles and enforcement mechanisms. In order to describe the reality in Portugal, the Portuguese health system and the measures imposed by Troika are also analyzed. The intention of this entire analysis is not only to disclose the innovative U.S. law, but to find some innovative measures that could serve health management in Portugal. Essentially we identified the Exchanges and Wellness Programs, described throughout this work, leaving also the idea of the possibility of using them in the Portuguese national health system.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.