Inicio > Tecnología, ingeniería, agricultura > Tecnología: cuestiones generales > Migliorare la sicurezza del Personal Health Record
Migliorare la sicurezza del Personal Health Record

Migliorare la sicurezza del Personal Health Record

Balamurugan Balusamy / Eshwar Sekar / Malathi Velu

64,95 €
IVA incluido
Disponible
Editorial:
KS OmniScriptum Publishing
Año de edición:
2025
Materia
Tecnología: cuestiones generales
ISBN:
9786208594008
64,95 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Per assicurare il controllo dei pazienti sull’accesso ai propri PHR, è un metodo promettente quello di criptare i PHR prima di esternalizzarli. In questo lavoro proponiamo un nuovo framework incentrato sul paziente e una serie di meccanismi per il controllo dell’accesso ai dati dei PHR memorizzati in server semi-affidati. Per ottenere un controllo dell’accesso ai dati a grana fine e scalabile per i PHR, utilizziamo tecniche di crittografia basate sugli attributi (ABE) per crittografare i file PHR di ciascun paziente. Per garantire un controllo della privacy incentrato sul paziente sui propri PHR, è essenziale disporre di meccanismi di controllo dell’accesso ai dati a grana fine che funzionino con server semi-affidati. Per proteggere i dati sanitari personali memorizzati su un server semi-fiduciario, adottiamo la crittografia basata sugli attributi (ABE) come primitiva di crittografia principale. Con l’ABE, le politiche di accesso sono espresse in base agli attributi degli utenti o dei dati, il che consente a un paziente di condividere selettivamente il proprio PHR tra un insieme di utenti, criptando il file in base a un insieme di attributi, senza la necessità di conoscere l’elenco completo degli utenti. Ci concentriamo sullo scenario di proprietari multipli di dati e dividiamo gli utenti del sistema PHR in domini di sicurezza multipli che riducono notevolmente la complessità della gestione delle chiavi per i proprietari.

Artículos relacionados

  • Science and the Big Issues of Our Time
    Martin Gellender
    Within the last few generations, our world has been shaped by technological change enabled by scientific advances. This is particularly evident to the 'baby boomer' generation, who have lived through and witnessed huge changes in society over the course of their lifetimes. Although many have little education in science, or have forgotten what they learned in high school, they u...
    Disponible

    26,58 €

  • Statics+++
    James W Dally / Robert J Bonenberger
    This textbook has been prepared to support a course offering for Statics at the University of Nevada at Reno.  Statics provides the first exposure of engineering students to the study of mechanics.  While Statics is a relatively simple subject, many students find it difficult, and they often perform far below our expectations.  In an effort to improve the curriculum, several me...
    Disponible

    101,22 €

  • Technical Writing, Presentational Skills, and Online Communication
    Raymond Greenlaw
    This book addresses four main topics: professional ethics, technical writing, presentation skills, and online writing. These topics are woven throughout the book and some of them are the main subjects of one or more chapters. The overarching theme of this book is to provide well-tested, best-practice techniques and strategies for main topic areas while focusing on information t...
  • Project Management Techniques and Innovations in Information Technology
    John Wang
    Managing cost, time, and quality of a project can be a challenging task for any project manager, but especially in times of an ever-changing and burgeoning field of IT. Project Management Techniques and Innovations in Information Technology offers a vital compendium of the latest research, case studies, best practices, and methodologies within the field of IT project management...
  • Phenomenology, Organizational Politics, and IT Design
    Information systems are researched, published on, and utilized as an extremely broad and vital sector of current technology development, usually studied from the scientific or technological viewpoints therein. Phenomenology, Organizational Politics, and IT Design: The Social Study of Information Systems offers a new look at the latest research and critical issues within the fie...
  • Geotechnical Applications for Earthquake Engineering
    Disaster preparedness and response management is a burgeoning field of technological research, and staying abreast of the latest developments within the field is a difficult task. Geotechnical Applications for Earthquake Engineering: Research Advancements has collected chapters from experts from around the world in a variety of applications, frameworks, and methodologies, and p...

Otros libros del autor

  • Verbesserung der Sicherheit in persönlichen Gesundheitsakten
    Balamurugan Balusamy / Eshwar Sekar / Malathi Velu
    Um sicherzustellen, dass die Patienten die Kontrolle über den Zugriff auf ihre eigenen PHRs haben, ist es eine vielversprechende Methode, die PHRs vor der Auslagerung zu verschlüsseln. In diesem Artikel schlagen wir einen neuartigen patientenzentrierten Rahmen und eine Reihe von Mechanismen für die Datenzugriffskontrolle auf PHRs vor, die auf halbvertrauenswürdigen Servern gesp...
    Disponible

    64,95 €

  • Renforcer la sécurité du dossier médical personnel
    Balamurugan Balusamy / Eshwar Sekar / Malathi Velu
    Pour garantir aux patients le contrôle de l’accès à leurs propres dossiers médicaux personnels, une méthode prometteuse consiste à crypter les dossiers médicaux personnels avant de les externaliser. Dans cet article, nous proposons un nouveau cadre centré sur le patient et une série de mécanismes pour le contrôle de l’accès aux données des dossiers médicaux personnels stockés d...
    Disponible

    64,95 €

  • Reforçar a segurança dos registos de saúde pessoais
    Balamurugan Balusamy / Eshwar Sekar / Malathi Velu
    Para garantir o controlo dos pacientes sobre o acesso aos seus próprios PHRs, é um método promissor encriptar os PHRs antes de os externalizar. Neste documento, propomos um novo quadro centrado no paciente e um conjunto de mecanismos para o controlo do acesso aos dados dos PHR armazenados em servidores semi-confiáveis. Para conseguir um controlo de acesso aos dados dos PHRs com...
    Disponible

    64,95 €