809 resultados para Privacy.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of human tissue sample collections has become an important tool in biomedical research. The collection, use and distribution of human tissue samples, which include blood and diagnostic tissue samples, from which DNA can be extracted and analyzed has also become a major bio-political preoccupation, not only in national contexts, but also at the transnational level. The foundation of medical research rests on the relationship between the doctor and the research subject. This relationship is a social one, in that it is based on informed consent, privacy and autonomy, where research subjects are made aware of what they are getting involved in and are then able to make an informed decision as to whether or not to participate. Within the post-genomic era, however, our understanding of what constitutes informed consent, privacy and autonomy is changing in relation to the needs of researchers, but also as a reflection of policy aspirations. This reflects a change in the power relations between the rights of the individual in relation to the interests of science and society. Using the notions of tissue economies and biovalue (Waldby, 2002) this research explores the changing relationship between sources and users of samples in biomedical research by examining the contexts under which human tissue samples and the information that is extracted from them are acquired, circulated and exchanged in Finland. The research examines how individual rights, particularly informed consent, are being configured in relation to the production of scientific knowledge in tissue economies in Finland from the 1990s to the present. The research examines the production of biovalue through the organization of scientific knowledge production by examining the policy context of knowledge production as well as three case studies (Tampere Research Tissue Bank, Hereditary Non-polyposis Colorectal Cancer and the Finnish Genome Information Center) in which tissues are acquired, circulated and exchanged in Finland. The research shows how interpretations of informed consent have become divergent and the elements and processes that have contributed to these differences. This inquiry shows how the relationship between the interests of individuals is re-configured in relation to the interests of science and society. It indicates how the boundary between interpretations of informed consent, on the one hand, and social and scientific interests, on the other, are being re-drawn and that this process is underscored, in part, by the economic, commercial and preventive potential that research using tissue samples are believed to produce. This can be said to fundamentally challenge the western notion that the rights of the individual are absolute and inalienable within biomedical legislation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a generic three-pass key agreement protocol that is based on a certain kind of trapdoor one-way function family. When specialized to the RSA setting, the generic protocol yields the so-called KAS2 scheme that has recently been standardized by NIST. On the other hand, when specialized to the discrete log setting, we obtain a new protocol which we call DH2. An interesting feature of DH2 is that parties can use different groups (e.g., different elliptic curves). The generic protocol also has a hybrid implementation, where one party has an RSA key pair and the other party has a discrete log key pair. The security of KAS2 and DH2 is analyzed in an appropriate modification of the extended Canetti-Krawczyk security model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The rapid development of communication and networking has lessened geographical boundaries among actors in social networks. In social networks, actors often want to access databases depending upon their access rights, privacy, context, privileges, etc. Managing and handling knowledge based access of actors is complex and hard for which broad range of technologies need to be called. Access based on dynamic access rights and circumstances of actors impose major tasks on access systems. In this paper, we present an Access Mechanism for Social Networks (AMSN) to render access to actors over databases taking privacy and status of actors into consideration. The designed AMSN model is tested over an Agriculture Social Network (ASN) which utilises distinct access rights and privileges of actors related to the agriculture occupation, and provides access to actors over databases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many applications, when communicating with a host, we may or may not be concerned about the privacy of the data but are mainly concerned about the integrity of data being transmitted. This paper presents a simple algorithm based on zero knowledge proof by which the receiver can confirm the integrity of data without the sender having to send the digital signature of the message directly. Also, if the same document is sent across by the same user multiple times, this scheme results in different digital signature each time thus making it a practical one-time signature scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of developing privacy-preserving machine learning algorithms in a dis-tributed multiparty setting. Here different parties own different parts of a data set, and the goal is to learn a classifier from the entire data set with-out any party revealing any information about the individual data points it owns. Pathak et al [7]recently proposed a solution to this problem in which each party learns a local classifier from its own data, and a third party then aggregates these classifiers in a privacy-preserving manner using a cryptographic scheme. The generaliza-tion performance of their algorithm is sensitive to the number of parties and the relative frac-tions of data owned by the different parties. In this paper, we describe a new differentially pri-vate algorithm for the multiparty setting that uses a stochastic gradient descent based procedure to directly optimize the overall multiparty ob-jective rather than combining classifiers learned from optimizing local objectives. The algorithm achieves a slightly weaker form of differential privacy than that of [7], but provides improved generalization guarantees that do not depend on the number of parties or the relative sizes of the individual data sets. Experimental results corrob-orate our theoretical findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Résumé: A l’heure où l’on évoque une “génération précaire” il est intéressant de s’interroger sur l’accroissement de la précarité de l’emploi en France et d’étudier ses éventuels effets sur les salariés. L’objectif de la présente recherche était d’observer les impacts causés par la précarité de l’emploi sur une population de référence et voir si ces effets différaient selon le sexe du salarié soumis à la précarité. Pour ce faire, nous avons soumis un questionnaire à deux groupes de travailleurs. Ce dernier portait sur la précarité de l’emploi et ses impacts en termes de stress, consommation de substances et impacts sur la sphère privée. Les résultats font apparaître des effets significatifs et des tendances qui existent sur certaines des dimensions interrogées (stress et consommation) entre le groupe de travailleurs précaires et non précaires. De plus, des effets entre hommes et femmes ont également été relevés. Par contre, nous n’avons pas d’effets observés sur la sphère privée de l’individu. Suite à l’absence d’effet constaté nous interrogeons la spécificité de la population. Aussi, nous envisageons de prolonger cette étude sur la recherche d’indicateurs concernant la précarité enseignante. Mots clés: précarité professionnelle, précarité du travail, précarité de l’emploi, travailleurs précaires, inégalités hommes femmes, stress, substances addictives, impact vie hors travail

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: El problema de la deshumanización de la atención médica sido enfocado desde ópticas diferentes (y en diversos momentos históricos), ya sea desde la perspectiva del paciente, de los familiares o del propio equipo de salud que presta los servicios, pero no hay un estudio de las causas y de las posibles soluciones. Al realizar un recorrido de la atención profesional en el mundo de la salud observamos que solo podemos re humanizar esa atención con el compromiso directo de todos los participantes del equipo de salud para promover actos y condiciones que tengan como finalidad el respeto de los derechos humanos que se afirman en la dignidad de cada persona enferma. Creemos que esta presentación puede llevar a tomar conciencia sobre la vulnerabilidad de la intimidad en el proceso, hoy deshumanizante, de la atención profesional en el ámbito de la salud y desde este punto de partida asumiendo las responsabilidades subjetivas, sin anular la moralidad objetiva del hecho, comprometiéndonos a denunciar estas situaciones injustas y a trabajar día a día para humanizar la atención y de esta forma respetar el derecho a la intimidad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Es habitual que en la fundamentación de derecho de la privacidad se acuda al valor de la dignidad humana, pero cuando los autores realizan esa vinculación suelen entender a la dignidad hu - mana como justificada en la mera autonomía del sujeto. Para este punto de vista que denominamos visión moderna, en el ámbito de los derechos fundamentales existe un amplio e indefinido campo de libertad, y esta libertad es o sería el derecho básico en sí mismo, o derecho fundamental por antonomasia. Esto significa la concepción del derecho entendido bajo su faz subjetiva. El derecho como un mero poder cuyo límite está en el poder o la facultad de otro, y el Estado como arbitrador de esos poderes subjetivos en pugna. Sin embargo, los derechos fundamentales entre los que se encuentran el derecho a la intimidad y a la privacidad, el derecho al resguardo del honor y de la imagen, encuentran su justificación en lo justo objetivo y en la dignidad humana. La dignidad como un valor que da sentido se justifica cuando es entendida con una apertura a la trascendencia de la persona, y a un fin objetivo al que dicha trascendencia se encamina.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Esta ocasión me brinda la oportunidad de realizar algo más que un mero comentario a la Sentencia del Tribunal Europeo de Derechos Humanos (TEDH), “Costa y Pavan c/ Italia”. Es decir, voy a esbozar una toma de postura prescriptiva contraria a la filosofía individualista de fondo del TEDH respecto al presente caso, en base a un discurso jurídico-filosófico. La frivolidad del TEDH a la hora de tratar algunos temas de bioética y bioderecho se enmarca en el uso de un lenguaje políticamente correcto y de cierto consenso pragmático, recubierto en ocasiones de ropajes jurídico-formales, en lo concerniente al amplio artículo 8º del CEDH. Cuestiones vitales en la configuración de la realidad humana que deben tratarse desde una óptica comprometida con uno mismo y con el tiempo que le ha tocado vivir. Con semejante punto de vista resulta clave otorgar a las palabras un contenido, pero sobre ello siempre subyace el miedo a que las palabras acaben diciendo lo que nosotros queramos que digan. En el ámbito jurídico, en ocasiones, ese nosotros puede ser asumido por algún alto tribunal.

Relevância:

10.00% 10.00%

Publicador: