Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 14 de 14
Filter
1.
Security and Communication Networks ; 2023, 2023.
Article in English | Scopus | ID: covidwho-20243671

ABSTRACT

Electronic health records (EHRs) and medical data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy, and accountability. Solutions for health data management, as in storing it, sharing and processing it, are emerging quickly and were significantly boosted by the COVID-19 pandemic that created a need to move things online. EHRs make a crucial part of digital identity data, and the same digital identity trends - as in self-sovereign identity powered by decentralized ledger technologies like blockchain, are being researched or implemented in contexts managing digital interactions between health facilities, patients, and health professionals. In this paper, we propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity (SSI) wallet and decentralized identifiers. We also make use of a consortium IPFS network for off-chain storage and attribute-based encryption (ABE) to ensure data confidentiality and integrity. Through our solution, we grant users full control over their medical data and enable them to securely share it in total confidentiality over secure communication channels between user wallets using encryption. We also use DIDs for better user privacy and limit any possible correlations or identification by using pairwise DIDs. Overall, combining this set of technologies guarantees secure exchange of EHRs, secure storage, and management along with by-design features inherited from the technological stack. © 2023 Marie Tcholakian et al.

2.
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023 ; : 398-403, 2023.
Article in English | Scopus | ID: covidwho-2300705

ABSTRACT

In the recent trends, block chain technology plays a vital role due to its secured methodology. Since many parts of the world severely affected by COVID pandemic situation, people used to perform more of digital transactions day by day. To provide more security for all online transactions, Block chain Technology is one of the solutions that many countries have started to utilize. Every block in a block chain should be validated and verified by the secured hash algorithms and digital signatures. Since Hacking is difficult in Block Chain Technology, due to its secure hash process, many people started using it for various applications. This article discusses about the working of Digital Signatures especially about Elliptic Curve Digital Signature Algorithm - ECDSA. Digital signatures are signatures done digitally for the purpose of security. ECDSA works on the mechanism of Elliptic Curve and Cryptography algorithms of Elliptic curve. The proposed research work has selected the private key as a random point, which is of type integer ranging between 1 and n-1 in Elliptic curve to sign documents. Then Public key is calculated by multiplying a point from elliptic curve with the Private key. Using this Public key, our digital signature is verified. This is much secured because no one can crack/hack private key. This process is used to verify digital transactions in the block chain technology. Our study helps researcher in block chain technologies to proceed ahead. © 2023 IEEE.

3.
37th International Conference on Information Networking, ICOIN 2023 ; 2023-January:230-235, 2023.
Article in English | Scopus | ID: covidwho-2274944

ABSTRACT

Owing to the spread of COVID-19, the digitalization of various services is rapidly being promoted. In particular, online services such as obtaining a digital certificate (e.g., digital signature) from an authority are becoming increasingly important. Therefore, systems that can autonomously generate digital signatures are urgently required. However, the autonomous generation of signatures is difficult because the secret key for signatures must be strictly managed. Moreover, a decentralized autonomous systems should be publicly verifiable. Thus, schemes that preclude strict control of the secret key are desirable. In this study, we propose a new decentralized scheme that autonomously generates a digital signature without a secret key, using blockchain-based smart contracts. The fundamental concept behind our scheme is to eliminate secret keys by leveraging the closed nature of the processing operations of smart contracts within the blockchain;thus, the process of generating signatures and their output values satisfies the condition of immutability. Finally, we perform a security evaluation and feasibility study of our proposed scheme and show that it works securely on the Ethereum blockchain. © 2023 IEEE.

4.
Journal of Pharmaceutical Negative Results ; 13:2895-2904, 2022.
Article in English | EMBASE | ID: covidwho-2206760

ABSTRACT

This article provides general information about the distance form of education and its traditional type, which is popular in our country, especially during the pandemic of Covid-19, pedagogical and integration problems of these two systems were discussed on a scientific basis on the basis of a comparative analysis of international experience, and the advantages and disadvantages of the mechanisms of organization of education in these two formats were studied and relevant recommendations were made. Copyright © 2022 Wolters Kluwer Medknow Publications. All rights reserved.

5.
Internet of Things ; : 263-284, 2023.
Article in English | Scopus | ID: covidwho-2173638

ABSTRACT

The Internet of Things paradigm envisions a world where every physical object is equipped with sensing/actuation capabilities and computing power and acquires its own digital identity. These objects are referred to as "smart” and have the goal of collecting and processing information about the environment surrounding them. One of the fields of interest in IoT applications concerns the intelligent management of activities in indoor environments, even if affected by unusual restrictions due to special conditions, such as those posed by the Covid-19 pandemic. This study focuses on the development of an IoT application based on the COGITO platform for the intelligent management of meeting rooms. By processing data collected from a set of IoT devices, cameras, and cognitive microphones, the developed prototype is able to autonomously monitor and make decisions about aspects that continuously affect environmental comfort, event management, and assessment of compliance with anti-contagious regulations throughout the time the room is occupied. After a brief review of the state of the art, the chapter describes the developed application. Furthermore, it highlights the features that make meeting room environments more comfortable for users and effective in managing events such as meetings and lectures. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

6.
Nauchnye I Tekhnicheskie Biblioteki-Scientific and Technical Libraries ; - (9):69-83, 2022.
Article in Russian | Web of Science | ID: covidwho-2100988

ABSTRACT

The authors speculate on the essence of electronic collection studies as the key component of library e-science. They offer and substantiate the definitions of electronic document and electronic document in library collection. The ways to acquire e-documents to the libraries are discussed. One of the goals of e-collection studies is to adapt traditional concepts for electronic documents acquired by modern libraries;to describe key processes of e-collection development and use, namely cataloguing, systematization, efficient arrangement in the library virtual space, e-document relegation from the collections, etc. The book market (including the market of audio books) transformations in the context of digitalization and corresponding provisions of e-collection studies are characterized, with the special attention given to the COVID-19 experiences. The role of e-documents within the mixed library and information infrastructure is reviewed: the need for theoretical insights into the problem is emphasized. The authors conclude that e-documents should be studied within the framework of electronic collection studies, the component of library e-science.

7.
14th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2018698

ABSTRACT

Digital transformation of public or private services, although it brings many improvements for our societies, it also raises security issues, mainly when focusing on the migration of physical signed documents in the digital environment. Digital signatures have proven to be reliable, thus they have seen a higher adoption in the last few years, especially in the context of the Covid-19 pandemic. Yet, a disadvantage is that digital signatures are volatile, being valid only for a maximum of a few years, depending on the validity of the asymmetric private key used to create that digital signature. Thus, validating a signed document after a few years could prove to be troublesome. In order to solve this problem, legislative and standardization efforts have been made and the legal and technical frameworks for long-term preservation services have been issued. In this paper we focus on the presentation of our implementation of a long-term preservation service for digital signatures, that is part of an entire long-term preservation system composed of multiple services, as mentioned in the paper. Our implementation is compliant with ETSI standards and uses the capabilities of current PKI infrastructures, while also adding in the resilience and trust of the blockchain. © 2022 IEEE.

8.
International Journal of Electrical and Computer Engineering ; 12(5):5330-5338, 2022.
Article in English | Scopus | ID: covidwho-1988500

ABSTRACT

Automated information retrieval and servicing systems are a priority demand system in today's businesses to ensure instantaneous customer satisfaction. The chatbot system is an incredible technological application that enables communication channels to automatically respond to end-users in real-time and 24 hours a day. By providing effective services for retrieving information and electronic documents continuously and automating the information service system, the coronavirus disease (COVID-19) is challenging to promote graduate school programs, update news, and retrieve student information in this era. This article discusses automated information retrieval and services based on the architecture, components, technology, and experiment of chatbots. The chatbot system's primary functions are to deliver the course and contact information, answer frequency questions, and provide a link menu to apply for our online course platform. We manage the entire functional process of gathering course information and submitting an application for a course online. The final results compare end users' perceptions of chatbot system usage to onsite services to ensure that the chatbot system can be integrated into the university's information system, supporting university-related questions and answers. We may expand our chatbot system's connection to the university's server to provide information services to students in various informative areas for future research. © 2022 Institute of Advanced Engineering and Science. All rights reserved.

9.
13th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2022 ; 2:92-97, 2022.
Article in English | Scopus | ID: covidwho-1836709

ABSTRACT

The COVID 19 pandemic has fuelled the acceleration of the use of remote services as, for example, video conferences or digital identity verification solutions. Due to videoconferences or social medias, attackers have access to rich biometric sources and therefore make it possible to carry out high quality attacks such as videos of deepfakes, or morphing, against face recognition system. These kind of video attacks allow the attacker to fool face recognition even when these systems are secured by challenge-based liveness detection by presenting them. In order to prevent against these kind of attacks, adding an artefact detection to these systems could be a good solution. However, we will see in this paper that the development of remote digital identity verification tools on mobile application or on a computer (through a web app) opens the path to video injection attacks which bypass all of these security systems, namely a face recognition system secured with both challenge-based liveness detection and artefact detection. © by the International Institute of Informatics and Systemics.

10.
19th IEEE International Conference on Dependable, Autonomic and Secure Computing, 19th IEEE International Conference on Pervasive Intelligence and Computing, 7th IEEE International Conference on Cloud and Big Data Computing and 2021 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021 ; : 879-883, 2021.
Article in English | Scopus | ID: covidwho-1788646

ABSTRACT

While the digital information age has brought us convenience in recent years. It has also brought many security risks. The centralized data storage poses the risk of data leakage. With the breakout of the Novel Coronavirus, it is common for schools to import the health management tools such as the body temperature monitoring system. If these health data are integrated together, it can facilitate school authorities to track students' health status, but centralized management has the risk of widespread data leakage. We propose a decentralized, personal cloud data model. The history of a student's health data will be stored only in each student's personal online datastore managed by Edu Pod, which is a student health information data management application that provides various services and mechanisms to secure the personal data in the Pod. By decentralizing the data to the students' individual Pods, it prevents the occurrence of large-scale data leaks by centralized management. We apply this model to the Campus Health Information System (CHIS) which we are studying in. The student's temperature data collected by face recognition will eventually be stored only in his or her personal Pod, which is a portable educational information storage unit, and the student can share the data with the university and any third-party health management software. The application of a centralized personal cloud data model can help students' personal data not be limited to a centralized server farm and can control their personal data more freely. It can also avoid information leakage and help to protect personal privacy at the same time. © 2021 IEEE.

11.
6th Latin American Conference on Learning Technologies, LACLO 2021 ; : 364-367, 2021.
Article in English | Scopus | ID: covidwho-1784520

ABSTRACT

The great technological convergence, which has emerged in recent years due to the appropriation of the globalized world and the emergence of the Covid-19 pandemic, leads us to formulate various approaches and questions, in relation to the digital identity of the users on the internet and on how to forge a global and secure digital citizenship. New media based on digital technologies such as social media, are generating a daily activity both as means of communication, interaction, and especially today as educational environments, this is leading to the formation of a digital society. This global phenomenon responds to a research study raised in university-level students from the city of Arequipa, this had as a pilot institution for the research process the Catholic University of Santa Mariá. Under the survey proposal, the implications related to social interaction in social media were determined;based on these results, some proposals were made to build safe environments for interaction in this time of pandemic and for subsequent years. It was concluded that it is essential to be able to generate and disseminate protocols and social norms to students for digital environments and social media, to establish safe environments for interaction and navigation. © 2021 IEEE.

12.
2021 International Conference on Technological Advancements and Innovations, ICTAI 2021 ; : 228-231, 2021.
Article in English | Scopus | ID: covidwho-1730985

ABSTRACT

This electronic document is a 'live' template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Many organizations have been forced to undergo significant change as a result of the COVID-19 pandemic, including rethinking key aspects of their business cycles and utilizing innovation to stay up with duties while adhering to a shifting scene of regulations and new techniques. This procedure can offer complete knowledge covering points of interest and after effects which influence society from COVID19, by using data frameworks and innovative viewpoints. The viewpoints by various welcomed subject specialists are examined and cross referenced by internet learning, AI brainpower, data board, social communication, network safety, huge information, block chain, innovation and methodology through the perspective of the current emergency and effect on these particular regions. The viewpoints offers and ideal understanding of the scope of points, distinguishing central questions and proposals for hypothesis and practice by utilizing chest X-ray pictures using ML-approach. In the paper, the use of these ML methods to cope with the COVID-19 pandemic flow situation is a promising aspect, just as the prevention of the Covid infection model is proposed. © 2021 IEEE.

13.
4th InternationalWorkshop on Emerging Technologies for Authorization and Authentication, ETAA 2021 co-located with 26th European Symposium on Research in Computer Security, ESORICS 2021 ; 13136 LNCS:68-76, 2021.
Article in English | Scopus | ID: covidwho-1703708

ABSTRACT

In developing regions a substantial number of users rely on legacy and ultra-low-cost mobile devices. Unfortunately, many of these devices are not equipped to run the standard authentication or identity apps that are available for smartphones. Increasingly, apps that display Quick Response (QR) codes are being used to communicate personal credentials (e.g., Covid-19 vaccination certificates). This paper describes a novel interface for QR code credentials that is compatible with legacy mobile devices. Our solution, which we have released under open source licensing, allows Web Application Enabled legacy mobile devices to load and display standard QR codes. This technique makes modern identity platforms available to previously excluded and economically disadvantaged populations. © 2021, Springer Nature Switzerland AG.

14.
2021 International Conference Engineering Technologies and Computer Science, EnT 2021 ; : 125-129, 2021.
Article in English | Scopus | ID: covidwho-1685065

ABSTRACT

The current state of digitalization of the Russian leasing services market is characterized. Trends and problems of digitalization of leasing companies in the domestic market are identified, not only as a provider of financing of digital assets, but also as a recipient of digital technologies. The main tools of digitalization that are available to leasing companies for implementation within their structure and that can be offered to the clients of these companies themselves are identified. The impact of the COVID-19 pandemic on the digitalization development in the leasing and financial sector as a whole is considered. © 2021 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL