295 resultados para confidentiality


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cover title.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An important aspect of designing any product is validation. Virtual design process (VDP) is an alternative to hardware prototyping in which analysis of designs can be done without manufacturing physical samples. In recent years, VDP have been generated either for animation or filming applications. This paper proposes a virtual reality design process model on one of the applications when used as a validation tool. This technique is used to generate a complete design guideline and validation tool of product design. To support the design process of a product, a virtual environment and VDP method were developed that supports validation and an initial design cycle performed by a designer. The product model car carrier is used as illustration for which virtual design was generated. The loading and unloading sequence of the model for the prototype was generated using automated reasoning techniques and was completed by interactively animating the product in the virtual environment before complete design was built. By using the VDP process critical issues like loading, unloading, Australian Design rules (ADR) and clearance analysis were done. The process would save time, money in physical sampling and to large extent in complete math generation. Since only schematic models are required, it saves time in math modelling and handling of bigger size assemblies due to complexity of the models. This extension of VDP process for design evaluation is unique and was developed, implemented successfully. In this paper a Toll logistics and J Smith and Sons car carrier which is developed under author’s responsibility has been used to illustrate our approach of generating design validation via VDP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record (EHR) systems to cut costs and improve patient outcomes through increased efficiency. This is accomplished by aggregating medical data from isolated Electronic Medical Record databases maintained by different healthcare providers. Concerns about the privacy and reliability of Electronic Health Records are crucial to healthcare service consumers. Traditional security mechanisms are designed to satisfy confidentiality, integrity, and availability requirements, but they fail to provide a measurement tool for data reliability from a data entry perspective. In this paper, we introduce a Medical Data Reliability Assessment (MDRA) service model to assess the reliability of medical data by evaluating the trustworthiness of its sources, usually the healthcare provider which created the data and the medical practitioner who diagnosed the patient and authorised entry of this data into the patient’s medical record. The result is then expressed by manipulating health record metadata to alert medical practitioners relying on the information to possible reliability problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic Health Record (EHR) systems are being introduced to overcome the limitations associated with paper-based and isolated Electronic Medical Record (EMR) systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about the privacy and reliability (trustworthiness) of Electronic Health Records. Security requirements such as confidentiality, integrity, and availability can be satisfied by traditional hard security mechanisms. However, measuring data trustworthiness from the perspective of data entry is an issue that cannot be solved with traditional mechanisms, especially since degrees of trust change over time. In this paper, we introduce a Time-variant Medical Data Trustworthiness (TMDT) assessment model to evaluate the trustworthiness of medical data by evaluating the trustworthiness of its sources, namely the healthcare organisation where the data was created and the medical practitioner who diagnosed the patient and authorised entry of this data into the patient’s medical record, with respect to a certain period of time. The result can then be used by the EHR system to manipulate health record metadata to alert medical practitioners relying on the information to possible reliability problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The proportion of older individuals in the driving population is predicted to increase in the next 50 years. This has important implications for driving safety as abilities which are important for safe driving, such as vision (which accounts for the majority of the sensory input required for driving), processing ability and cognition have been shown to decline with age. The current methods employed for screening older drivers upon re-licensure are also vision based. This study, which investigated social, behavioural and professional aspects involved with older drivers, aimed to determine: (i) if the current visual standards in place for testing upon re-licensure are effective in reducing the older driver fatality rate in Australia; (ii) if the recommended visual standards are actually implemented as part of the testing procedures by Australian optometrists; and (iii) if there are other non-standardised tests which may be better at predicting the on-road incident-risk (including near misses and minor incidents) in older drivers than those tests recommended in the standards. Methods: For the first phase of the study, state-based age- and gender-stratified numbers of older driver fatalities for 2000-2003 were obtained from the Australian Transportation Safety Bureau database. Poisson regression analyses of fatality rates were considered by renewal frequency and jurisdiction (as separate models), adjusting for possible confounding variables of age, gender and year. For the second phase, all practising optometrists in Australia were surveyed on the vision tests they conduct in consultations relating to driving and their knowledge of vision requirements for older drivers. Finally, for the third phase of the study to investigate determinants of on-road incident risk, a stratified random sample of 600 Brisbane residents aged 60 years and were selected and invited to participate using an introductory letter explaining the project requirements. In order to capture the number and type of road incidents which occurred for each participant over 12 months (including near misses and minor incidents), an important component of the prospective research study was the development and validation of a driving diary. The diary was a tool in which incidents that occurred could be logged at that time (or very close in time to which they occurred) and thus, in comparison with relying on participant memory over time, recall bias of incident occurrence was minimised. Association between all visual tests, cognition and scores obtained for non-standard functional tests with retrospective and prospective incident occurrence was investigated. Results: In the first phase,rivers aged 60-69 years had a 33% lower fatality risk (Rate Ratio [RR] = 0.75, 95% CI 0.32-1.77) in states with vision testing upon re-licensure compared with states with no vision testing upon re-licensure, however, because the CIs are wide, crossing 1.00, this result should be regarded with caution. However, overall fatality rates and fatality rates for those aged 70 years and older (RR=1.17, CI 0.64-2.13) did not differ between states with and without license renewal procedures, indicating no apparent benefit in vision testing legislation. For the second phase of the study, nearly all optometrists measured visual acuity (VA) as part of a vision assessment for re-licensing, however, 20% of optometrists did not perform any visual field (VF) testing and only 20% routinely performed automated VF on older drivers, despite the standards for licensing advocating automated VF as part of the vision standard. This demonstrates the need for more effective communication between the policy makers and those responsible for carrying out the standards. It may also indicate that the overall higher driver fatality rate in jurisdictions with vision testing requirements is resultant as the tests recommended by the standards are only partially being conducted by optometrists. Hence a standardised protocol for the screening of older drivers for re-licensure across the nation must be established. The opinions of Australian optometrists with regard to the responsibility of reporting older drivers who fail to meet the licensing standards highlighted the conflict between maintaining patient confidentiality or upholding public safety. Mandatory reporting requirements of those drivers who fail to reach the standards necessary for driving would minimise potential conflict between the patient and their practitioner, and help maintain patient trust and goodwill. The final phase of the PhD program investigated the efficacy of vision, functional and cognitive tests to discriminate between at-risk and safe older drivers. Nearly 80% of the participants experienced an incident of some form over the prospective 12 months, with the total incident rate being 4.65/10 000 km. Sixty-three percent reported having a near miss and 28% had a minor incident. The results from the prospective diary study indicate that the current vision screening tests (VA and VF) used for re-licensure do not accurately predict older drivers who are at increased odds of having an on-road incident. However, the variation in visual measurements of the cohort was narrow, also affecting the results seen with the visual functon questionnaires. Hence a larger cohort with greater variability should be considered for a future study. A slightly lower cognitive level (as measured with the Mini-Mental State Examination [MMSE]) did show an association with incident involvement as did slower reaction time (RT), however the Useful-Field-of-View (UFOV) provided the most compelling results of the study. Cut-off values of UFOV processing (>23.3ms), divided attention (>113ms), selective attention (>258ms) and overall score (moderate/ high/ very high risk) were effective in determining older drivers at increased odds of having any on-road incident and the occurrence of minor incidents. Discussion: The results have shown that for the 60-69 year age-group, there is a potential benefit in testing vision upon licence renewal. However, overall fatality rates and fatality rates for those aged 70 years and older indicated no benefit in vision testing legislation and suggests a need for inclusion of screening tests which better predict on-road incidents. Although VA is routinely performed by Australian optometrists on older drivers renewing their licence, VF is not. Therefore there is a need for a protocol to be developed and administered which would result in standardised methods conducted throughout the nation for the screening of older drivers upon re-licensure. Communication between the community, policy makers and those conducting the protocol should be maximised. By implementing a standardised screening protocol which incorporates a level of mandatory reporting by the practitioner, the ethical dilemma of breaching patient confidentiality would also be resolved. The tests which should be included in this screening protocol, however, cannot solely be ones which have been implemented in the past. In this investigation, RT, MMSE and UFOV were shown to be better determinants of on-road incidents in older drivers than VA and VF, however, as previously mentioned, there was a lack of variability in visual status within the cohort. Nevertheless, it is the recommendation from this investigation, that subject to appropriate sensitivity and specificity being demonstrated in the future using a cohort with wider variation in vision, functional performance and cognition, these tests of cognition and information processing should be added to the current protocol for the screening of older drivers which may be conducted at licensing centres across the nation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The School Based Youth Health Nurse Program was established in 1999 by the Queensland Government to fund school nurse positions in Queensland state high schools. Schools were required to apply for a School Based Youth Health Nurse during a five-phase recruitment process, managed by the health districts, and rolled out over four years. The only mandatory selection criterion for the position of School Based Youth Health Nurse was registration as a General Nurse and most School Based Youth Health Nurses are allocated to two state high schools. Currently, there are approximately 115 Full Time Equivalent School Based Youth Health Nurse positions across all Queensland state high schools. The literature review revealed an abundance of information about school nursing. Most of the literature came from the United Kingdom and the United States, who have a different model of school nursing to school based youth health nursing. However, there is literature to suggest school nursing is gradually moving from a disease-focused approach to a social view of health. The noticeable number of articles about, for example, drug and alcohol, mental health, and contemporary sexual health issues, is evidence of this change. Additionally, there is a significant the volume of literature about partnerships and collaboration, much of which is about health education, team teaching and how school nurses and schools do health business together. The surfacing of this literature is a good indication that school nursing is aligning with the broader national health priority areas. More particularly, the literature exposed a small but relevant and current body of research, predominantly from Queensland, about school based youth health nursing. However, there remain significant gaps in the knowledge about school based youth health nursing. In particular, there is a deficit about how School Based Youth Heath Nurses understand the experience of school based youth health nursing. This research aimed to reveal the meaning of the experience of school based youth health nursing. The research question was How do School Based Youth Health Nurses’ understand the experience of school based youth health nursing? This enquiry was instigated because the researcher, who had a positive experience of school based youth health nursing, considered it important to validate other School Based Youth Health Nurses’ experiences. Consequently, a comprehensive use of qualitative research was considered the most appropriate manner to explore this research question. Within this qualitative paradigm, the research framework consists of the epistemology of social constructionism, the theoretical perspective of interpretivism and the approach of phenomenography. After ethical approval was gained, purposeful and snowball sampling was used to recruit a sample of 16 participants. In-depth interviews, which were voluntary, confidential and anonymous, were mostly conducted in public venues and lasted from 40-75 minutes. The researcher also kept a researchers journal as another form of data collection. Data analysis was guided by Dahlgren and Fallsbergs’ (1991, p. 152) seven phases of data analysis which includes familiarization, condensation, comparison, grouping, articulating, labelling and contrasting. The most important finding in this research is the outcome space, which represents the entirety of the experience of school based youth health nursing. The outcome space consists of two components: inside the school environment and outside the school environment. Metaphorically and considered as whole-in-themselves, these two components are not discreet but intertwined with each other. The outcome space consists of eight categories. Each category of description is comprised of several sub-categories of description but as a whole, is a conception of school based youth health nursing. The eight conceptions of school based youth health nursing are: 1. The conception of school based youth health nursing as out there all by yourself. 2. The conception of school based youth health nursing as no real backup. 3. The conception of school based youth health nursing as confronted by many barriers. 4. The conception of school based youth health nursing as hectic and full-on. 5. The conception of school based youth health nursing as working together. 6. The conception of school based youth health nursing as belonging to school. 7. The conception of school based youth health nursing as treated the same as others. 8. The conception of school based youth health nursing as the reason it’s all worthwhile. These eight conceptions of school based youth health nursing are logically related and form a staged hierarchical relationship because they are not equally dependent on each other. The conceptions of school based youth health nursing are grouped according to negative, negative and positive and positive conceptions of school based youth health nursing. The conceptions of school based youth health nursing build on each other, from the bottom upwards, to reach the authorized, or the most desired, conception of school based youth health nursing. This research adds to the knowledge about school nursing in general but especially about school based youth health nursing specifically. Furthermore, this research has operational and strategic implications, highlighted in the negative conceptions of school based youth health nursing, for the School Based Youth Health Nurse Program. The researcher suggests the School Based Youth Health Nurse Program, as a priority, address the operational issues The researcher recommends a range of actions to tackle issues and problems associated with accommodation and information, consultations and referral pathways, confidentiality, health promotion and education, professional development, line management and School Based Youth Health Nurse Program support and school management and community. Strategically, the researcher proposes a variety of actions to address strategic issues, such as the School Based Youth Health Nurse Program vision, model and policy and practice framework, recruitment and retention rates and evaluation. Additionally, the researcher believes the findings of this research have the capacity to spawn a myriad of future research projects. The researcher has identified the most important areas for future research as confidentiality, information, qualifications and health outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Health Law in Australia is the first book to deal with health law on a comprehensive national basis. In a field of law that is becoming increasingly important and where the demand for expertise is rapidly expanding, Health Law in Australia takes a logical, structured approach to an examination of the law in all Australian jurisdictions. By covering all the major areas in this diverse field of law, Health Law in Australia enhances the understanding of the discipline as a whole. Beginning with an exploration of the general principles of health law, including chapters on “Medical Negligence”, “Children and Consent”, and “Confidentiality, Privacy, and Access to Health Records”, the book goes on to consider beginning-of-life and end-of-life issues before concluding with chapters on emerging areas in health law, such as biotechnology and medical research. The contributing authors include national leaders in the field who are specialists in these areas of health law and who can therefore reveal to readers the results of their research. Health Law in Australia has been written for those with a legal background and is essential reading for undergraduate law students, postgraduate law students, researchers and scholars in the disciplines of law, health and medicine, as well as legal practitioners, government departments and bodies in the health area, and private health providers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Communication security for wireless sensor networks (WSN) is a challenge due to the limited computation and energy resources available at nodes. We describe the design and implementation of a public-key (PK) platform based on a standard Trusted Platform Module (TPM) chip that extends the capability of a standard node. The result facilitates message security services such as confidentiality, authenticity and integrity. We present results including computation time, energy consumption and cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study focused on a group of primary school teachers as they implemented a variety of intervention actions within their class programs aimed towards supporting the reduction of high levels of communication apprehension (CA) among students.Six teachers and nine students, located across three primary schools, four year levels,and six classes, participated in this study. For reasons of confidentiality the schools,principals, parents, teachers, teacher assistants, and students who were involved in this study were given fictitious names. The following research question was explored in this study: What intervention actions can primary school teachers implement within their class programs that support the reduction of high CA levels among students? Throughout this study the term CA referred to "an individual's level of fear or anxiety associated with either real or anticipated (oral) communication with another person or persons" (McCroskey, 1984, p. 13). The sources of CA were explained with reference to McCroskey's state-trait continuum. The distinctions between high and appropriate levels of CA were determined conceptually and empirically. The education system within which this study was conducted promoted the philosophy of inclusion and the practices of inclusive schooling. Teachers employed in this system were encouraged to create class programs inclusive of and successful for all students. Consequently the conceptual framework within which this study was conducted was based around the notion of inclusion. Action research and case study research were the methodologies used in the study. Case studies described teachers' action research as they responded to the challenge of executing intervention actions within their class programs directed towards supporting the reduction of high CA levels among students. Consequently the teachers and not the researcher were the central characters in each of the case studies. Three principal data collection instruments were used in this study: Personal Report of Communication Fear (PRCF) scale, semistructured interviews, and dialogue journals. The PRCF scale was the screening tool used to identify a pool of students eligible for the study. Data relevant to the students involved in the study were gathered during semistructured interviews and throughout the dialogue journaling process. Dialogue journaling provided the opportunity for regular contact between teachers and the researcher, a sequence to teacher and student intervention behaviours, and a permanent record of teacher and student growth and development. The majority of teachers involved in this study endeavoured to develop class programs inclusive of all students.These teachers acknowledged the importance of modifying aspects of their class programs in response to the diverse and often multiple needs of individual students with high levels of CA. Numerous conclusions were drawn regarding practical ways that the teachers in this study supported the reduction of high CA levels among students. What this study has shown is that teachers can incorporate intervention actions within their class programs aimed towards supporting students lower their high levels of CA. Whilst no teacher developed an identical approach to intervention, similarities and differences were evident among teachers regarding their selection, interpretation, and implementation of intervention actions. Actions that teachers enacted within their class programs emerged from numerous fields of research including CA, inclusion, social skills, behaviour teaching, co-operative learning, and quality schools. Each teacher's knowledge of and familiarity with these research fields influenced their preference for and commitment to particular intervention actions. Additional factors including each teacher's paradigm of inclusion and exclusion contributed towards their choice of intervention actions. Possible implications of these conclusions were noted with reference to teachers,school administrators, support personnel, system personnel, teacher educators, parents, and researchers.