745 resultados para patron privacy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Agency performance plan and action plan for the Iowa Public Information Board

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Agency performance plan and action plan for the Iowa College Student Aid Commission

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through this article, we propose a mixed management of patients' medical records, so as to share responsibilities between the patient and the Medical Practitioner by making Patients responsible for the validation of their administrative information, and MPs responsible for the validation of their Patients' medical information. Our proposal can be considered a solution to the main problem faced by patients, health practitioners and the authorities, namely the gathering and updating of administrative and medical data belonging to the patient in order to accurately reconstitute a patient's medical history. This method is based on two processes. The aim of the first process is to provide a patient's administrative data, in order to know where and when the patient received care (name of the health structure or health practitioner, type of care: out patient or inpatient). The aim of the second process is to provide a patient's medical information and to validate it under the accountability of the Medical Practitioner with the help of the patient if needed. During these two processes, the patient's privacy will be ensured through cryptographic hash functions like the Secure Hash Algorithm, which allows pseudonymisation of a patient's identity. The proposed Medical Record Search Engines will be able to retrieve and to provide upon a request formulated by the Medical ractitioner all the available information concerning a patient who has received care in different health structures without divulging the patient's identity. Our method can lead to improved efficiency of personal medical record management under the mixed responsibilities of the patient and the MP.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random-ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in orderto obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Treball d'exploració de les dades privades de les nostres activitats a Facebook i de conscienciació dels usuaris de les xarxes socials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Projecte sobre l'extracció de dades massives de xarxes socials i els perills de publicar informació en aquestes pàgines web.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a class of models of social network formation based on a mathematical abstraction of the concept of social distance. Social distance attachment is represented by the tendency of peers to establish acquaintances via a decreasing function of the relative distance in a representative social space. We derive analytical results (corroborated by extensive numerical simulations), showing that the model reproduces the main statistical characteristics of real social networks: large clustering coefficient, positive degree correlations, and the emergence of a hierarchy of communities. The model is confronted with the social network formed by people that shares confidential information using the Pretty Good Privacy (PGP) encryption algorithm, the so-called web of trust of PGP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the American population continues to grow older, aging and sexuality has become a frequent topic of discussion. Specifically, questions have been raised about if and how older adults experience sexual desire; how dementia and other age-related health issues impact an individual’s ability to express desire for and consent to sexual acts; and whether older adults forfeit their right to intimacy once they move into a long-term care facility. By federal law, individuals residing in long-term care are afforded multiple rights, many of which are relevant to sexuality. These rights include but are not limited to: the rights to privacy, confidentiality, dignity and respect; the right to make independent choices; and the right to choose visitors and meet in a private location. The OSLTCO strives to preserve these rights by promoting attitudes of awareness, acceptance, and respect of sexual diversity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

By federal law, individuals residing in long-term care are afforded multiple rights, many of which are relevant to sexuality. These rights include but are not limited to: the rights to privacy, confidentiality, dignity and respect, the right to make independent choices, and the right to choose visitors and meet in a private location. The Office of the State Long-Term Care Ombudsman strives to preserve these rights by promoting attitudes of awareness, acceptance, and respect of sexual diversity. Though outcomes to sexually-related situations vary innumerably, as each is different and must be considered independently, the OSLTCO believes a multidisciplinary effort is necessary to develop a thoughtful process from which to draw and support conclusions. It is not the responsibility of the long-term care facility or assisted living program (or a single staff member) to solely determine whether a resident/tenant should or should not be sexually expressive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the evolution of the P2P research eld, new problems, such as those related with information security, have arisen. It is important to provide security mechanisms to P2P systems, since it has already become one of the key issues when evaluating them. However, even though many P2P systems have been adapted to provide a security baseline to their underlying applications, more advanced capabilities are becoming necessary. Speci cally, privacy preservation and anonymity are deemed essential to make the information society sustainable. Unfortunately, sometimes, it may be di cult to attain anonymity unless it is included into the system's initial design. The JXTA open protocols speci cation is a good example of this kind of scenario. This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints'identities to third parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

10.00% 10.00%

Publicador:

Resumo:

JXTA define un conjunto de seis protocolos básicos especialmente adecuados para una computación ad hoc, permanente, multi-hop, peer-to-peer (P2P). Estos protocolos permiten que los iguales cooperen y formen grupos autónomos de pares. Este artículo presenta un método que proporciona servicios de seguridad en los protocolos básicos: protección de datos, autenticidad, integridad y no repudio. Los mecanismos que se presentan son totalmente distribuidos y basados ¿¿en un modelo puro peer-to-peer, que no requieren el arbitraje de un tercero de confianza o una relación de confianza establecida previamente entre pares, que es uno de los principales retos en este tipo de entornos.