11 resultados para RSA encryption
em BORIS: Bern Open Repository and Information System - Berna - Suiça
Resumo:
In patients with a rotator cuff-deficient shoulder, a combined loss of active elevation and external rotation (CLEER) can occur when both the infraspinatus and teres minor muscles are absent. A reverse shoulder arthroplasty (RSA) can restore active elevation in these patients but cannot restore active external rotation because there are no other external rotator cuff muscles. We hypothesized that a modified L'Episcopo procedure (latissimus dorsi [LD] and teres major [TM] transfer) with a simultaneous RSA would restore shoulder function and activities of daily living (ADLs).
Resumo:
Reproductive failure, determined as recurrent spontaneous abortions (RSA) or recurrent implantation failure (RIF) in women is not well understood. Several factors, including embryo quality, and cellular and molecular changes in endometrium may contribute to the insufficient feto-maternal interaction resulting in reproductive failure. Prior clinical studies suggest an inadequate endometrial growth and development of the endometrium, leading to a lesser endometrial thickness.
Resumo:
Tenofovir (TDF) is increasingly used in second-line antiretroviral treatment (ART) in sub-Saharan Africa. We compared outcomes of second-line ART containing and not containing TDF in cohort studies from Zambia and the Republic of South Africa (RSA).
Resumo:
Heart rate and breathing rate fluctuations represent interacting physiological oscillations. These interactions are commonly studied using respiratory sinus arrhythmia (RSA) of heart rate variability (HRV) or analyzing cardiorespiratory synchronization. Earlier work has focused on a third type of relationship, the temporal ratio of respiration rate and heart rate (HRR). Each method seems to reveal a specific aspect of cardiorespiratory interaction and may be suitable for assessing states of arousal and relaxation of the organism. We used HRR in a study with 87 healthy subjects to determine the ability to relax during 5 day-resting periods in comparison to deep sleep relaxation. The degree to which a person during waking state could relax was compared to somatic complaints, health-related quality of life, anxiety and depression. Our results show, that HRR is barely connected to balance (LF/HF) in HRV, but significantly correlates to the perception of general health and mental well-being as well as to depression. If relaxation, as expressed in HRR, during day-resting is near to deep sleep relaxation, the subjects felt healthier, indicated better mental well-being and less depressive moods.
Evolution of capital cities economies: Towards a knowledge intensive and thus more resilient economy
Resumo:
BACKGROUND Record linkage of existing individual health care data is an efficient way to answer important epidemiological research questions. Reuse of individual health-related data faces several problems: Either a unique personal identifier, like social security number, is not available or non-unique person identifiable information, like names, are privacy protected and cannot be accessed. A solution to protect privacy in probabilistic record linkages is to encrypt these sensitive information. Unfortunately, encrypted hash codes of two names differ completely if the plain names differ only by a single character. Therefore, standard encryption methods cannot be applied. To overcome these challenges, we developed the Privacy Preserving Probabilistic Record Linkage (P3RL) method. METHODS In this Privacy Preserving Probabilistic Record Linkage method we apply a three-party protocol, with two sites collecting individual data and an independent trusted linkage center as the third partner. Our method consists of three main steps: pre-processing, encryption and probabilistic record linkage. Data pre-processing and encryption are done at the sites by local personnel. To guarantee similar quality and format of variables and identical encryption procedure at each site, the linkage center generates semi-automated pre-processing and encryption templates. To retrieve information (i.e. data structure) for the creation of templates without ever accessing plain person identifiable information, we introduced a novel method of data masking. Sensitive string variables are encrypted using Bloom filters, which enables calculation of similarity coefficients. For date variables, we developed special encryption procedures to handle the most common date errors. The linkage center performs probabilistic record linkage with encrypted person identifiable information and plain non-sensitive variables. RESULTS In this paper we describe step by step how to link existing health-related data using encryption methods to preserve privacy of persons in the study. CONCLUSION Privacy Preserving Probabilistic Record linkage expands record linkage facilities in settings where a unique identifier is unavailable and/or regulations restrict access to the non-unique person identifiable information needed to link existing health-related data sets. Automated pre-processing and encryption fully protect sensitive information ensuring participant confidentiality. This method is suitable not just for epidemiological research but also for any setting with similar challenges.
Resumo:
PURPOSE The implementation of genomic-based medicine is hindered by unresolved questions regarding data privacy and delivery of interpreted results to health-care practitioners. We used DNA-based prediction of HIV-related outcomes as a model to explore critical issues in clinical genomics. METHODS We genotyped 4,149 markers in HIV-positive individuals. Variants allowed for prediction of 17 traits relevant to HIV medical care, inference of patient ancestry, and imputation of human leukocyte antigen (HLA) types. Genetic data were processed under a privacy-preserving framework using homomorphic encryption, and clinical reports describing potentially actionable results were delivered to health-care providers. RESULTS A total of 230 patients were included in the study. We demonstrated the feasibility of encrypting a large number of genetic markers, inferring patient ancestry, computing monogenic and polygenic trait risks, and reporting results under privacy-preserving conditions. The average execution time of a multimarker test on encrypted data was 865 ms on a standard computer. The proportion of tests returning potentially actionable genetic results ranged from 0 to 54%. CONCLUSIONS The model of implementation presented herein informs on strategies to deliver genomic test results for clinical care. Data encryption to ensure privacy helps to build patient trust, a key requirement on the road to genomic-based medicine.Genet Med advance online publication 14 January 2016Genetics in Medicine (2016); doi:10.1038/gim.2015.167.
Resumo:
Archduke Ernest of Austria (1553–1595), second son of Emperor Maximilian II and younger brother of Emperor Rudolf II, was in his youth a possible candidate for the thrones of the Empire or the Spanish Kingdom. Instead, he became Governor-General of the Netherlands in 1593 and relocated to Brussels in 1594 where he was welcomed with lavish festivities as the bearer of hope and prosperity. Unfortunately, Ernest died only thirteen months later without having achieved any political success. His brother and successor Albert of Austria commissioned the funeral monument for Ernest in 1600 after it was settled that he would be buried in Brussels and not Vienna. Focusing on this monument, which draws stylistically from various dynasty-related models, it will be shown that Albert intended to use this monument – and thus his brother’s memoria – to make the Brussels Cathedral the primary location of Habsburg dynastic memory in the Low Countries.
Resumo:
Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.
Resumo:
Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.