306 resultados para Predicate Encryption


Relevância:

10.00% 10.00%

Publicador:

Resumo:

En aquest projecte final de carrera es presenta un sistema capaç de gestionar i emmagatzemar leshistòries mèdiques dels pacients. El sistema permetrà realitzar operacions de lectura i modificació de dades sobre els expedients mèdics de manera segura i fiable tenint en compte que els accessos a la informació s'efectuen a través d'una xarxa de comunicació.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En el PFC implementarem en Java una aplicació per gestionar historials mèdics de manerasegura. Està desenvolupada seguint el model de capa de dades, capa de negoci i capa depresentació i el resultat són tres parts que anomenarem ¿part del gestor¿, ¿part del pacient¿ i ¿part del metge¿.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L'objectiu és implementar un esquema criptogràfic que garanteixi les necessitats de seguretat d'un historial mèdic que pot ser gestionat a través d'una xarxa de comunicacions (per exemple tota una intranet d'un centre mèdic).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L'objectiu es dissenyar i implementar un esquema criptogràfic que gestioni de forma segura els historials mèdics dels pacients a través d'una xarxa de comunicacions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El PFC té com objectiu dissenyar i implementar un esquema criptogràfic per a garantir un accéssegur a les dades proporcionant mecanismes per salvaguardar la confidencialitat, autenticitat i integritat de les dades i no repudi de les accions portades a terme pels usuaris.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Al llarg del present treball es construeix una aplicació de gestió d'historials metges per la qual cosa prèviament s'han estudiat els requisits de seguretat exigibles a la mateixa, com condicionants fonamentals per a la seva posada en funcionament.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En aquest projecte de final de carrera s'ha dissenyat, implementat i provat un sistema que utilitzant criptografia de clau pública, garanteix la correcta utilització de les dades en un procés de consulta i complimentació d'una història clínica informatitzada consultada a distància.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

El projecte ha de generar un seguit d'aplicacions per a que els usuaris i elsmetges puguin accedir a través d'una xarxa de comunicacions als historials clínicsmantenint sempre els requisits de seguretat.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Trabajo Final de Carrera en desarrollo .NET: Aplicación web ASP.NET MVC cliente de correo electrónico con cifrado PGP y servicio web WCF que brinda funcionalidades de cifrado PGP.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis suggests to carry on the philosophical work begun in Casati's and Varzi's seminal book Parts and Places, by extending their general reflections on the basic formal structure of spatial representation beyond mereotopology and absolute location to the question of perspectives and perspective-dependent spatial relations. We show how, on the basis of a conceptual analysis of such notions as perspective and direction, a mereotopological theory with convexity can express perspectival spatial relations in a strictly qualitative framework. We start by introducing a particular mereotopological theory, AKGEMT, and argue that it constitutes an adequate core for a theory of spatial relations. Two features of AKGEMT are of particular importance: AKGEMT is an extensional mereotopology, implying that sameness of proper parts is a sufficient and necessary condition for identity, and it allows for (lower- dimensional) boundary elements in its domain of quantification. We then discuss an extension of AKGEMT, AKGEMTS, which results from the addition of a binary segment operator whose interpretation is that of a straight line segment between mereotopological points. Based on existing axiom systems in standard point-set topology, we propose an axiomatic characterisation of the segment operator and show that it is strong enough to sustain complex properties of a convexity predicate and a convex hull operator. We compare our segment-based characterisation of the convex hull to Cohn et al.'s axioms for the convex hull operator, arguing that our notion of convexity is significantly stronger. The discussion of AKGEMTS defines the background theory of spatial representation on which the developments in the second part of this thesis are built. The second part deals with perspectival spatial relations in two-dimensional space, i.e., such relations as those expressed by 'in front of, 'behind', 'to the left/right of, etc., and develops a qualitative formalism for perspectival relations within the framework of AKGEMTS. Two main claims are defended in part 2: That perspectival relations in two-dimensional space are four- place relations of the kind R(x, y, z, w), to be read as x is i?-related to y as z looks at w; and that these four-place structures can be satisfactorily expressed within the qualitative theory AKGEMTS. To defend these two claims, we start by arguing for a unified account of perspectival relations, thus rejecting the traditional distinction between 'relative' and 'intrinsic' perspectival relations. We present a formal theory of perspectival relations in the framework of AKGEMTS, deploying the idea that perspectival relations in two-dimensional space are four-place relations, having a locational and a perspectival part and show how this four-place structure leads to a unified framework of perspectival relations. Finally, we present a philosophical motivation to the idea that perspectival relations are four-place, cashing out the thesis that perspectives are vectorial properties and argue that vectorial properties are relations between spatial entities. Using Fine's notion of "qua objects" for an analysis of points of view, we show at last how our four-place approach to perspectival relations compares to more traditional understandings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

L'objectiu principal del projecte és l'estudi, la implementació d'algoritmes i protocols amb criptografia basada en la identitat. Aquesta o Identity Based Encryption (IBE) s'utilitza per simplificar el procés de comunicacions segures, com per exemple el correu electrònic. IBE permet a les polítiques de seguretat ser codificades directament sense la necessitat d'usar certificats. Aquests esquemes van ser proposats inicialment per A. Shamir a l'any 1984 i han estat objecte d'estudi per D. Boneh, S. Galbraith, etc. En aquest farem l'estudi dels emparellaments de Werl i Tate a través de l'algorisme de Miller, que ens permetrà implementar aquests emparellaments sobre corbes el·líptiques supersingulars.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work investigates the syntactic, semantic, and pragmatic properties of nominal Split Topicalization (ST) constructions in Standard and non-Standard German. The topic phrase denotes a property, and the MF phrase either modifies this property or picks out a specific entity. Semantically, the topic phrase will be analysed as a property-denoting expression which restricts the denotation of the verbal predicate, while the MF phrase is composed either via specify or restrict (cf. Chung and Ladusaw, 2003). Syntactically, the base position of the topic phrase is the (incorporating) verb, and the MF phrase is generated independently as the complement of the verb containing an empty pronoun. Since predicates introduce abstract discourse referents, the topic phrase can be resumed via "pro" in the MF phrase.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper has three sections. In the first one, I expose and discuss Davidson's semantic account of adverbial sentences: the basic idea is that these sentences involve quantification over events, and I defend that view from opposing perspectives like the theory of adverbs as predicate modifiers. In the second section I defend the claim that in english constructions following the scheme: ¿X did V by T-ings¿, we are referring to the same action of X; what is sometimes called ¿The Anscombe Thesis¿. Again I discuss competing theories only to conclude that the Anscombe Thesis is true. In the third section, however, it is shown that to assume as premisses these two theses -Davidson's account and the Anscombe Thesis- leads to a serious conflict. Alternative solutions are worked out and rejected. It is also argued that the only tenable solution depends on certain metaphysical assumptions. Finally, however, I will cast doubt on this solution.