352 resultados para confidentiality


Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: This study aimed to investigate the frequency of positive results for hepatitis B and C, HIV and syphilis in blood donations at the Centro Regional de Hemoterapia de Ribeirão Preto, to describe donors with positive results according to some demographic and socioeconomic variables, to identify risk factors associated to these donors and the reasons that they were not detected during clinical screening. METHODS: A descriptive study was performed between July 1st 2005 and July 31st 2006 by interviewing 106 donors after medical consultations where they were informed of positive results for hepatitis B, hepatitis C, HIV or syphilis. RESULTS: There was a predominance of first-time donors, males, under 50-year olds, married individuals, from Ribeirão Preto, with elementary education, low economic status and of people who donated at the request of friends or relatives. Hepatitis C was the most frequently detected infection (56.6%), followed by hepatitis B (20.7%), HIV (12.3%) and syphilis(10.4%). About 40% of donors had omitted risk factors for different reasons: because they trusted the results of serological tests, did not feel comfortable about talking of risk factors or did not consider them relevant. Other justifications were the duration of the interview, the interviewer was unskilled, embarrassment and doubts about confidentiality. CONCLUSION: The results indicate the need for changes in the approach to clinical screening and a review of methods to attract and guide potential donors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis main topic is the conflict between disclosure in financial markets and the need for confidentiality of the firm. After a recognition of the major dynamics of information production and dissemination in the stock market, the analysis moves to the interactions between the information that a firm is tipically interested in keeping confidential, such as trade secrets or the data usually covered by patent protection, and the countervailing demand for disclosure arising from finacial markets. The analysis demonstrates that despite the seeming divergence between informational contents tipically disclosed to investors and information usually covered by intellectual property protection, the overlapping areas are nonetheless wide and the conflict between transparency in financial markets and the firm’s need for confidentiality arises frequently and sistematically. Indeed, the company’s disclosure policy is based on a continuous trade-off between the costs and the benefits related to the public dissemination of information. Such costs are mainly represented by the competitive harm caused by competitors’ access to sensitive data, while the benefits mainly refer to the lower cost of capital that the firm obtains as a consequence of more disclosure. Secrecy shields the value of costly produced information against third parties’ free riding and constitutes therefore a means to protect the firm’s incentives toward the production of new information and especially toward technological and business innovation. Excessively demanding standards of transparency in financial markets might hinder such set of incentives and thus jeopardize the dynamics of innovation production. Within Italian securities regulation, there are two sets of rules mostly relevant with respect to such an issue: the first one is the rule that mandates issuers to promptly disclose all price-sensitive information to the market on an ongoing basis; the second one is the duty to disclose in the prospectus all the information “necessary to enable investors to make an informed assessment” of the issuers’ financial and economic perspectives. Both rules impose high disclosure standards and have potentially unlimited scope. Yet, they have safe harbours aimed at protecting the issuer need for confidentiality. Despite the structural incompatibility between public dissemination of information and the firm’s need to keep certain data confidential, there are certain ways to convey information to the market while preserving at the same time the firm’s need for confidentality. Such means are insider trading and selective disclosure: both are based on mechanics whereby the process of price reaction to the new information takes place without any corresponding activity of public release of data. Therefore, they offer a solution to the conflict between disclosure and the need for confidentiality that enhances market efficiency and preserves at the same time the private set of incentives toward innovation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Switzerland, every physician has the right to report a patient that is potentially unfit to drive to the licensing authority without violating medical confidentiality. Verified information regarding physicians' attitudes concerning this discretionary reporting and the frequency of such reports are not available. In order to answer these questions, 635 resident physicians were sent a questionnaire. The response rate was 52%. On average, the responding physicians--for all specialties--reported 0.31 patients (SD 0.64, 95% CI 0.24-0.38) in the year before the survey and 1.00 patient (SD 1.74, 95% CI 0.81-1.20) in the past 5 years. Seventy-nine percent of the responding physicians indicated knowing the current legal requirements for driving in Switzerland. In applied logistic regression analysis, only two factors correlate significantly with reporting: male sex (odds ratio 5.4) and the specialty "general medicine" (odds ratio 3.4). Ninety-seven percent of the physicians were against abolishing medical discretionary reporting and 29% were in favor of introducing mandatory reporting. The great majority of the questioned physicians supported the discretionary reporting of drivers that are potentially unfit to drive as currently practiced in Switzerland. The importance and the necessity of a regular traffic medicine-related continuing education for medical professionals are shown by the low number of reports per physician.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Do you know what choices you would make if faced with an ethical dilemma? This fact-based case includes situations and issues that a real citizen considered when faced with the knowledge that his employer may have been overbilling the state of North Carolina for health care. Professionals, especially those in accounting and finance positions, are likely to face serious dilemmas in the course of their careers. These situations may require them to choose between honoring a confidentiality clause in an employment contract and acting according to ethical and professional values. This case provides facts gathered from an actual case in which an individual faced this particular challenge. By working through the case, students should develop an appreciation of the pressures and personal ethical challenges they are likely to face in the workplace. By engaging in discussion and role play, students will be more likely to recognize these issues when they occur, and will have already developed critical thinking skills to help them develop a plan of action.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Psychological assessment is a central component of applied sport psychology. Despite obvious and well-documented advantages of diagnostic online tools, there is a lack of a system for such tools for sport psychologists so far in Switzerland. Having the most frequently used questionnaires available online in one single tool for all listed Swiss sport psychologists would make the work of practitioners a lot easier and less time consuming. Therefore, the main goal of this project is to develop a diagnostic online tool system with the possibility to make available different questionnaires often used in sport psychology. Furthermore, we intend to survey status and use of this diagnostic online tool system and the questionnaires by Swiss sport psychologists. A specific challenge is to limit the access to qualified sport psychologists and to secure the confidentiality for the client. In particular, approved sport psychologists get an individual code for each of their athletes for the required questionnaire. With the help of this code, athletes can access the test via a secure website at any place of the world. As soon as they complete and submit the online questionnaire, analysed and interpreted data reach the sport psychologist via E-Mail, which is timesaving and easy applicable for the sport psychologist. Furthermore, data are available for interpretation with athletes and documentation of individual development over time is possible. Later on, completed and anonymised questionnaires will be collected and analysed. Bigger number of collected data give more insight in the psychometric properties, thus helping to improve and further develop the questionnaires. In this presentation, we demonstrate the tool and its feasibility using the German version of the Test of Performance Strategies (TOPS, Schmid et al., 2010). To conclude, this diagnostic online tool system offers new possibilities for sport psychologists working as practitioner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective. To explore issues in current literature concerning possible social and economic ramifications of pharmacogenomic research. Design. Review of the literature. Data sources: Academic Search Premier, Blackwell Synergy, PUBMED and Social Sciences Citation Index. Review methods. Articles dealing with the social and economic ramifications of pharmacogenomic research were selected. The articles discussed at least one of 5 areas (race, privacy/confidentiality, ethics, insurance, and research and development). Some restrictions were placed on the articles chosen to narrow down the number of articles to a relevant, manageable amount. Results. Approximately 219 articles were selected for review; 159 were fully reviewed and found to be relevant to the issues; and 33 were cited. Conclusion. Insurance and research and development decisions are led by the free-market system with limited intervention from government. Race/ethnicity, privacy/confidentiality, and ethics continue to be debated with no clear answer. However, some compromise is regulated by government based upon current laws involving these issues. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increasing attention has been given to the problem of medical errors over the past decade. Included within that focused attention has been a strong interest in reducing the occurrence of healthcare-associated infections (HAIs). Acting concurrently with federal initiatives, the majority of U.S. states have statutorily required reporting and public disclosure of HAI data. Although the occurrence of these state statutory enactments and other state initiatives represent a recognition of the strong concern pertaining to HAIs, vast differences in each state’s HAI reporting and public disclosure requirements creates a varied and unequal response to what has become a national problem.^ The purpose of this research was to explore the variations in state HAI legal requirements and other state mandates. State actions, including statutory enactments, regulations, and other initiatives related to state reporting and public disclosure mechanisms were compared, discussed, and analyzed in an effort to illustrate the impact of the lack of uniformity as a public health concern.^ The HAI statutes, administrative requirements, and other mandates of each state and two U.S. territories were reviewed to answer the following seven research questions: How far has the state progressed in its HAI initiative? If the state has a HAI reporting requirement, is it mandatory or voluntary? What healthcare entities are subject to the reporting requirements? What data collection system is utilized? What measures are required to be reported? What is the public disclosure mechanism? How is the underlying reported information protected from public disclosure or other legal release?^ Secondary publicly available data, including state statutes, administrative rules, and other initiatives, were utilized to examine the current HAI-related legislative and administrative activity of the study subjects. The information was reviewed and analyzed to determine variations in HAI reporting and public disclosure laws. Particular attention was given to the seven key research questions.^ The research revealed that considerable progress has been achieved in state HAI initiatives since 2004. Despite this progress, however, when reviewing the state laws and HAI programs comparatively, considerable variations were found to exist with regards to the type of reporting requirements, healthcare facilities subject to the reporting laws, data collection systems utilized, reportable measures, public disclosure requirements, and confidentiality and privilege provisions. The wide variations in state statutes, administrative rules, and other agency directives create a fragmented and inconsistent approach to addressing the nationwide occurrence of HAIs in the U.S. healthcare system. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation focuses on the leadership styles of managers, the impact these leadership styles have on the job satisfaction of staff nurses, and the proclivity of nurses to consider unionization. The aims of the dissertation include conducting a literature review on topics of leadership style, job satisfaction, and unionization; identifying and elucidating pertinent constructs with respect to shared interrelationships and how they could be measured; and developing a means of assessing if and to what extent transformational and transactional leadership styles affect nurse proclivity to unionize.^ The instrumentation selected includes the Multifactor Leadership Survey, Job Satisfaction Survey, and a newly created Union Preference Survey. Each survey instrument was evaluated as to its appropriateness to administer at a non-consultant level within a health care facility. Options other than self-administering the survey instruments include online access for participants, which provides confidentiality and encourages more responses. ^ The next part of the dissertation is a plan for health care facilities to use the survey tool by administering it themselves. The plan provides a general description of the survey tool, administering the instrument, rating the instrument, and leadership development. Integration of the three surveys is presented in a non-statistical format by coordinating the results of the three survey instrument responses. Recommendations are presented on how to improve leadership development warranted for improvement.^ The conclusions reached are that nurses’ preference for unions is influenced by the leadership style of direct report managers, as rated by staff nurses, and the nurses’ job satisfaction, which is in turn in part dependent on their managers’ leadership style. Thus, changes in leadership style can have a profound impact on nurse job satisfaction and on nurses’ preference for unionization.^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the past 30 years, states have expanded minors’ authority to consent to health care, including care related to sexual activity. This trend reflects U.S. Supreme Court rulings extending the constitutional right to privacy to a minor’s decision to obtain contraceptives and concluding that rights do not “come into being magically only when one attains the state-defined age of majority.” It also reflects the recognition that while parental involvement is desirable, many minors will remain sexually active but not seek services if they have to tell their parents. As a result, confidentiality is vital to ensuring minors’ access to contraceptive services. Even when a state has no relevant policy or case law, physicians may commonly provide medical care to a mature minor without parental consent, particularly if the state allows a minor to consent to related health services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a common reference for many in-development standards and execution frameworks, special attention is being paid to Service-Oriented Architectures. SOAs modeling, however, is an area in which a consensus has not being achieved. Currently, standardization organizations are defining proposals to offer a solution to this problem. Nevertheless, until very recently, non-functional aspects of services have not been considered for standardization processes. In particular, there exists a lack of a design solution that permits an independent development of the functional and non-functional concerns of SOAs, allowing that each concern be addressed in a convenient manner in early stages of the development, in a way that could guarantee the quality of this type of systems. This paper, leveraging on previous work, presents an approach to integrate security-related non-functional aspects (such as confidentiality, integrity, and access control) in the development of services.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen Ejecutivo Desde hace unos años, la tecnología RFID parece estar tecnológicamente madura, aunque se halla inmersa en una continua evolución y mejora de sus prestaciones frente a la tecnología basada en el código de barras. Esta tecnología está empezando a aumentar su comercialización y uso generalizado. Este proyecto describe su funcionamiento y arquitectura, las aplicaciones e implementaciones reales en diversos sectores empresariales y soluciones o propuestas para mejorar y fomentar investigaciones, desarrollos e implementaciones futuras. Una primera parte consiste en el desarrollo teórico del funcionamiento, parámetros físicos y la arquitectura RFID. En la segunda parte se estudian las aplicaciones potenciales, beneficios e inconvenientes y varios puntos de vista; empresas que invierten a favor de RFID y han realizado implementaciones reales exitosas y organizaciones en contra. La tercera y última parte analiza las consecuencias negativas que supone un mal uso de la tecnología como la pérdida de privacidad o confidencialidad, se proponen algunas medidas de seguridad y soluciones al problema utilizando la regularización y estandarización. Finalmente, tras estudiar la tecnología RFID, se aportan algunas conclusiones de carácter actual y de futuro después de observar resultados de expectativas previstas. Executive Summary For several years, RFID technology seems to be technologically mature, but is immersed in a continuous evolution and improvement of their performance than the technology based on the barcode. This technology is starting to increase their marketing and widespread use. This project describes its operation and architecture, applications and real implementations in different business sectors and solutions or proposals to improve and enhance research, development and future implementations. The first part consists of theory development of the operation, physical parameters and architecture RFID. The second part focuses on the potential applications, benefits and drawbacks and several points of view; companies investing on behalf of RFID and have made successful actual deployments and organizations against. The third and last part discusses the negative impact that is a bad use of technology such as loss of privacy or confidentiality; suggest some security measures and solutions to the problem using regularization and standardization. Finally, it provides some conclusions of the current character, after studying RFID technology and the future after observing results of expectations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The extraordinary increase of new information technologies, the development of Internet, the electronic commerce, the e-government, mobile telephony and future cloud computing and storage, have provided great benefits in all areas of society. Besides these, there are new challenges for the protection of information, such as the loss of confidentiality and integrity of electronic documents. Cryptography plays a key role by providing the necessary tools to ensure the safety of these new media. It is imperative to intensify the research in this area, to meet the growing demand for new secure cryptographic techniques. The theory of chaotic nonlinear dynamical systems and the theory of cryptography give rise to the chaotic cryptography, which is the field of study of this thesis. The link between cryptography and chaotic systems is still subject of intense study. The combination of apparently stochastic behavior, the properties of sensitivity to initial conditions and parameters, ergodicity, mixing, and the fact that periodic points are dense, suggests that chaotic orbits resemble random sequences. This fact, and the ability to synchronize multiple chaotic systems, initially described by Pecora and Carroll, has generated an avalanche of research papers that relate cryptography and chaos. The chaotic cryptography addresses two fundamental design paradigms. In the first paradigm, chaotic cryptosystems are designed using continuous time, mainly based on chaotic synchronization techniques; they are implemented with analog circuits or by computer simulation. In the second paradigm, chaotic cryptosystems are constructed using discrete time and generally do not depend on chaos synchronization techniques. The contributions in this thesis involve three aspects about chaotic cryptography. The first one is a theoretical analysis of the geometric properties of some of the most employed chaotic attractors for the design of chaotic cryptosystems. The second one is the cryptanalysis of continuos chaotic cryptosystems and finally concludes with three new designs of cryptographically secure chaotic pseudorandom generators. The main accomplishments contained in this thesis are: v Development of a method for determining the parameters of some double scroll chaotic systems, including Lorenz system and Chua’s circuit. First, some geometrical characteristics of chaotic system have been used to reduce the search space of parameters. Next, a scheme based on the synchronization of chaotic systems was built. The geometric properties have been employed as matching criterion, to determine the values of the parameters with the desired accuracy. The method is not affected by a moderate amount of noise in the waveform. The proposed method has been applied to find security flaws in the continuous chaotic encryption systems. Based on previous results, the chaotic ciphers proposed by Wang and Bu and those proposed by Xu and Li are cryptanalyzed. We propose some solutions to improve the cryptosystems, although very limited because these systems are not suitable for use in cryptography. Development of a method for determining the parameters of the Lorenz system, when it is used in the design of two-channel cryptosystem. The method uses the geometric properties of the Lorenz system. The search space of parameters has been reduced. Next, the parameters have been accurately determined from the ciphertext. The method has been applied to cryptanalysis of an encryption scheme proposed by Jiang. In 2005, Gunay et al. proposed a chaotic encryption system based on a cellular neural network implementation of Chua’s circuit. This scheme has been cryptanalyzed. Some gaps in security design have been identified. Based on the theoretical results of digital chaotic systems and cryptanalysis of several chaotic ciphers recently proposed, a family of pseudorandom generators has been designed using finite precision. The design is based on the coupling of several piecewise linear chaotic maps. Based on the above results a new family of chaotic pseudorandom generators named Trident has been designed. These generators have been specially designed to meet the needs of real-time encryption of mobile technology. According to the above results, this thesis proposes another family of pseudorandom generators called Trifork. These generators are based on a combination of perturbed Lagged Fibonacci generators. This family of generators is cryptographically secure and suitable for use in real-time encryption. Detailed analysis shows that the proposed pseudorandom generator can provide fast encryption speed and a high level of security, at the same time. El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de Internet, el comercio electrónico, la administración electrónica, la telefonía móvil y la futura computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección de la información, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos electrónicos. La criptografía juega un papel fundamental aportando las herramientas necesarias para garantizar la seguridad de estos nuevos medios, pero es imperativo intensificar la investigación en este ámbito para dar respuesta a la demanda creciente de nuevas técnicas criptográficas seguras. La teoría de los sistemas dinámicos no lineales junto a la criptografía dan lugar a la ((criptografía caótica)), que es el campo de estudio de esta tesis. El vínculo entre la criptografía y los sistemas caóticos continúa siendo objeto de un intenso estudio. La combinación del comportamiento aparentemente estocástico, las propiedades de sensibilidad a las condiciones iniciales y a los parámetros, la ergodicidad, la mezcla, y que los puntos periódicos sean densos asemejan las órbitas caóticas a secuencias aleatorias, lo que supone su potencial utilización en el enmascaramiento de mensajes. Este hecho, junto a la posibilidad de sincronizar varios sistemas caóticos descrita inicialmente en los trabajos de Pecora y Carroll, ha generado una avalancha de trabajos de investigación donde se plantean muchas ideas sobre la forma de realizar sistemas de comunicaciones seguros, relacionando así la criptografía y el caos. La criptografía caótica aborda dos paradigmas de diseño fundamentales. En el primero, los criptosistemas caóticos se diseñan utilizando circuitos analógicos, principalmente basados en las técnicas de sincronización caótica; en el segundo, los criptosistemas caóticos se construyen en circuitos discretos u ordenadores, y generalmente no dependen de las técnicas de sincronización del caos. Nuestra contribución en esta tesis implica tres aspectos sobre el cifrado caótico. En primer lugar, se realiza un análisis teórico de las propiedades geométricas de algunos de los sistemas caóticos más empleados en el diseño de criptosistemas caóticos vii continuos; en segundo lugar, se realiza el criptoanálisis de cifrados caóticos continuos basados en el análisis anterior; y, finalmente, se realizan tres nuevas propuestas de diseño de generadores de secuencias pseudoaleatorias criptográficamente seguros y rápidos. La primera parte de esta memoria realiza un análisis crítico acerca de la seguridad de los criptosistemas caóticos, llegando a la conclusión de que la gran mayoría de los algoritmos de cifrado caóticos continuos —ya sean realizados físicamente o programados numéricamente— tienen serios inconvenientes para proteger la confidencialidad de la información ya que son inseguros e ineficientes. Asimismo una gran parte de los criptosistemas caóticos discretos propuestos se consideran inseguros y otros no han sido atacados por lo que se considera necesario más trabajo de criptoanálisis. Esta parte concluye señalando las principales debilidades encontradas en los criptosistemas analizados y algunas recomendaciones para su mejora. En la segunda parte se diseña un método de criptoanálisis que permite la identificaci ón de los parámetros, que en general forman parte de la clave, de algoritmos de cifrado basados en sistemas caóticos de Lorenz y similares, que utilizan los esquemas de sincronización excitador-respuesta. Este método se basa en algunas características geométricas del atractor de Lorenz. El método diseñado se ha empleado para criptoanalizar eficientemente tres algoritmos de cifrado. Finalmente se realiza el criptoanálisis de otros dos esquemas de cifrado propuestos recientemente. La tercera parte de la tesis abarca el diseño de generadores de secuencias pseudoaleatorias criptográficamente seguras, basadas en aplicaciones caóticas, realizando las pruebas estadísticas, que corroboran las propiedades de aleatoriedad. Estos generadores pueden ser utilizados en el desarrollo de sistemas de cifrado en flujo y para cubrir las necesidades del cifrado en tiempo real. Una cuestión importante en el diseño de sistemas de cifrado discreto caótico es la degradación dinámica debida a la precisión finita; sin embargo, la mayoría de los diseñadores de sistemas de cifrado discreto caótico no ha considerado seriamente este aspecto. En esta tesis se hace hincapié en la importancia de esta cuestión y se contribuye a su esclarecimiento con algunas consideraciones iniciales. Ya que las cuestiones teóricas sobre la dinámica de la degradación de los sistemas caóticos digitales no ha sido totalmente resuelta, en este trabajo utilizamos algunas soluciones prácticas para evitar esta dificultad teórica. Entre las técnicas posibles, se proponen y evalúan varias soluciones, como operaciones de rotación de bits y desplazamiento de bits, que combinadas con la variación dinámica de parámetros y con la perturbación cruzada, proporcionan un excelente remedio al problema de la degradación dinámica. Además de los problemas de seguridad sobre la degradación dinámica, muchos criptosistemas se rompen debido a su diseño descuidado, no a causa de los defectos esenciales de los sistemas caóticos digitales. Este hecho se ha tomado en cuenta en esta tesis y se ha logrado el diseño de generadores pseudoaleatorios caóticos criptogr áficamente seguros.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a solution to the problem of strong authentication, portable and expandable using a combination of Java technology and storage of X.509 digital certificate in Java cards to access services offered by an institution, in this case, the technology of the University of Panama, ensuring the authenticity, confidentiality, integrity and non repudiation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last few decades, the ever-increasing output of scientific publications has led to new challenges to keep up to date with the literature. In the biomedical area, this growth has introduced new requirements for professionals, e.g., physicians, who have to locate the exact papers that they need for their clinical and research work amongst a huge number of publications. Against this backdrop, novel information retrieval methods are even more necessary. While web search engines are widespread in many areas, facilitating access to all kinds of information, additional tools are required to automatically link information retrieved from these engines to specific biomedical applications. In the case of clinical environments, this also means considering aspects such as patient data security and confidentiality or structured contents, e.g., electronic health records (EHRs). In this scenario, we have developed a new tool to facilitate query building to retrieve scientific literature related to EHRs. Results: We have developed CDAPubMed, an open-source web browser extension to integrate EHR features in biomedical literature retrieval approaches. Clinical users can use CDAPubMed to: (i) load patient clinical documents, i.e., EHRs based on the Health Level 7-Clinical Document Architecture Standard (HL7-CDA), (ii) identify relevant terms for scientific literature search in these documents, i.e., Medical Subject Headings (MeSH), automatically driven by the CDAPubMed configuration, which advanced users can optimize to adapt to each specific situation, and (iii) generate and launch literature search queries to a major search engine, i.e., PubMed, to retrieve citations related to the EHR under examination. Conclusions: CDAPubMed is a platform-independent tool designed to facilitate literature searching using keywords contained in specific EHRs. CDAPubMed is visually integrated, as an extension of a widespread web browser, within the standard PubMed interface. It has been tested on a public dataset of HL7-CDA documents, returning significantly fewer citations since queries are focused on characteristics identified within the EHR. For instance, compared with more than 200,000 citations retrieved by breast neoplasm, fewer than ten citations were retrieved when ten patient features were added using CDAPubMed. This is an open source tool that can be freely used for non-profit purposes and integrated with other existing systems.