Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
1.
Comput Biol Med ; 167: 107702, 2023 12.
Article in English | MEDLINE | ID: mdl-37976822

ABSTRACT

In response to the evolving landscape of digital technology in healthcare, this study addresses the multifaceted challenges pertaining to identity and data privacy. The core of our key recovery-enabled framework revolves around the establishment of a robust identity verification system, leveraging the World Wide Web Consortium(W3C) standard for verifiable credentials(VC) and a test blockchain network. The approach leverages cryptographic proofs embedded within credentials issued by various entities to securely validate the legitimacy of identities. To ensure standardized identity establishment, the roles and responsibilities of entities align with the UK digital identity and attribute trust framework, resulting in a cohesive verification process. Embracing self-sovereign identity (SSI), encrypted credentials are stored within the owner's device, empowering individuals with data control while prioritizing privacy and security. Furthermore, the work introduces an algorithm that places paramount importance on owner-centricity, trustworthiness, and privacy-aware handling of SSI credentials, subjected to threat modeling through the Owasp Dragon tool. A key recovery algorithm, a key component of our Recovery-Enabled Framework, empowers users to regain credentials using a trustee-based recovery system with a memorized PIN, eliminating the need for third-party reliance. Furthermore, a trust score, a crucial component of the framework, assesses the conformity of verified credentials with stated standards, boosting trust in established identities. Leveraging the modularity of Hyperledger Fabric, the work utilizes smart contracts to impose context-aware attribute-based policies, ensuring controlled access, traceability, and auditability, consequently strengthening security. Through comprehensive development, refinement, and rigorous testing, the prototype emerges as a potent tool for enhancing security within the Digital Health Ecosystem. It equips organizations with the means to navigate this digital landscape while inspiring trust among stakeholders, significantly contributing to the resilience of identity in the digital health ecosystem.


Subject(s)
Algorithms , Ecosystem , Humans , Camphor , Health Facilities , Menthol
2.
J Cloud Comput (Heidelb) ; 12(1): 79, 2023.
Article in English | MEDLINE | ID: mdl-37220560

ABSTRACT

Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to enable business-appropriate decision-making. In view of this challenge, a new model is proposed in this paper for assignment of monetary losses terms to the consequences nodes, thereby enabling experts to understand better the financial risks of any consequence. The proposed model is named Cloud Enterprise Dynamic Risk Assessment (CEDRA) model that uses CVSS, threat intelligence feeds and information about exploitation availability in the wild using dynamic Bayesian networks to predict vulnerability exploitations and financial losses. A case study of a scenario based on the Capital One breach attack was conducted to demonstrate experimentally the applicability of the model proposed in this paper. The methods presented in this study has improved vulnerability and financial losses prediction.

3.
Sci Rep ; 12(1): 15647, 2022 09 19.
Article in English | MEDLINE | ID: mdl-36123364

ABSTRACT

Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It's Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional machine learning approaches may become data-dependent, insensitive to error cost, and thus may not tackle zero-day ransomware attacks. Zero-day ransomware have normally unseen underlying data distribution. This paper presents a Cost-Sensitive Pareto Ensemble strategy, CSPE-R to detect novel Ransomware attacks. Initially, the proposed framework exploits the unsupervised deep Contractive Auto Encoder (CAE) to transform the underlying varying feature space to a more uniform and core semantic feature space. To learn the robust features, the proposed CSPE-R ensemble technique explores different semantic spaces at various levels of detail. Heterogeneous base estimators are then trained over these extracted subspaces to find the core relevance between the various families of the ransomware attacks. Then, a novel Pareto Ensemble-based estimator selection strategy is implemented to achieve a cost-sensitive compromise between false positives and false negatives. Finally, the decision of selected estimators are aggregated to improve the detection against unknown ransomware attacks. The experimental results show that the proposed CSPE-R framework performs well against zero-day ransomware attacks.


Subject(s)
Computer Security , Deep Learning , Costs and Cost Analysis , Machine Learning , Neural Networks, Computer
4.
IEEE J Biomed Health Inform ; 18(1): 56-66, 2014 Jan.
Article in English | MEDLINE | ID: mdl-24403404

ABSTRACT

A clinical decision support system forms a critical capability to link health observations with health knowledge to influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited to provide efficient and accurate clinical decision support in healthcare. In this scenario, clinicians can use the health knowledge located in remote servers via the Internet to diagnose their patients. However, the fact that these servers are third party and therefore potentially not fully trusted raises possible privacy concerns. In this paper, we propose a novel privacy-preserving protocol for a clinical decision support system where the patients' data always remain in an encrypted form during the diagnosis process. Hence, the server involved in the diagnosis process is not able to learn any extra knowledge about the patient's data and results. Our experimental results on popular medical datasets from UCI-database demonstrate that the accuracy of the proposed protocol is up to 97.21% and the privacy of patient data is not compromised.


Subject(s)
Computer Security , Confidentiality , Decision Support Systems, Clinical , Support Vector Machine , Databases, Factual , Humans , Internet , Normal Distribution
5.
Appl Opt ; 51(34): 8195-202, 2012 Dec 01.
Article in English | MEDLINE | ID: mdl-23207391

ABSTRACT

A finite element method based on the full-vectorial H-field formulation has been employed to achieve the maximum field penetration in the sensing medium of the slot-waveguide-based ring resonator biosensor. The use of nanometer scale guiding structure where optical mode is confined in a low-index region permits a very compact sensor with high optical intensity in the region, which makes it possible to detect minimum refractive index change, and offers higher sensitivities. We analyze the change in effective refractive index of mode, sensitivity, and power confinement of the proposed slot-waveguide-based ring resonator biosensor for the detection of DNA hybridization. The biosensor exhibited theoretical sensitivity of 856 nm per refractive index unit (RIU) and a detection limit of 1.43×10(-6) RIU.


Subject(s)
Biosensing Techniques/instrumentation , DNA/genetics , In Situ Hybridization/instrumentation , Nanotechnology/instrumentation , Oligonucleotide Array Sequence Analysis/instrumentation , Refractometry/instrumentation , Base Sequence , Computer-Aided Design , DNA/analysis , Equipment Design , Equipment Failure Analysis , Molecular Sequence Data , Staining and Labeling
6.
Int J Electron Healthc ; 3(4): 395-416, 2007.
Article in English | MEDLINE | ID: mdl-18048274

ABSTRACT

Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major challenge in this respect. This paper presents a novel protocol that will send the information securely while including the access privileges to the authorized recipient.


Subject(s)
Computer Security , Computers, Handheld , Medical Records Systems, Computerized/organization & administration , Computer Communication Networks , Humans
7.
Appl Opt ; 43(27): 5228-35, 2004 Sep 20.
Article in English | MEDLINE | ID: mdl-15473244

ABSTRACT

Design issues such as optical transmission, interference mechanisms, the splitting ratio, the polarization dependence, and the fabrication tolerances of a compact parabolically tapered multimode-interference (MMI)-based 3-dB power splitter on an InP-based deeply etched ridge waveguide, by use of the finite-element-based beam-propagation method, are presented. The benefits and drawbacks of the use of the tapered structure, in comparison with an untapered MMI-based 3-dB splitter, have also been investigated.

SELECTION OF CITATIONS
SEARCH DETAIL
...