Security Policies for Intelligent Health Care Environment

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Controlling security policies in a distributed environment

This paper presents a type system to control the migration of codebetween nodes in a concurrent distributed framework, using Dπ. Weexpress resource policies with types and enforce them via a type sys-tem. Sites are organised hierarchically in subnetworks that share thesame security policies, statically specified by a network administrator.The type system guarantees that,...

متن کامل

Security and Privacy in the Intelligent Environment

The Problem: The idea of ubiquitous a computing environment where sensors and devices exist everywhere around us has opened up interesting security and privacy issues. Imagine a scenario in which Ben is working in an intelligent room. He does not want to be disturbed by anyone, so he tells the intelligent room that he does not want to be reached by anyone in the next two hours unless it is an e...

متن کامل

Intelligent Data Processing in Global Monitoring for Environment and Security 121 4 Intelligent Tools for Environment Monitoring: Features and Applications

Remote sensing for agricultural purposes has intensive development in Bulgaria and Ukraine during the last twenty years. The researches in this area are supported by Governments of both countries. The data of remote sensing can be used in the management only when they are combined with data from synchronous or quasi‐synchronous land surface agrophysical and microclimatic measurements and purpos...

متن کامل

A security mediator for health care information.

The TIHI (Trusted Interoperation of Healthcare Information) project addresses a security issue that arises when some information is being shared among collaborating enterprises, although not all enterprise information is sharable. It assumes that protection exists to prevent intrusion by adversaries through secure transmission and firewalls. The TIHI system design provides a gateway, owned by t...

متن کامل

Security of health care and global health.

1. Aid flight reported downed by Nigeria. New York Times. June 7, 1969. 2. Galeota WR. Conversation in a L.I. bar with a soldier of fortune: he flew food to Biafra. Harvard Crimson. August 16, 1968 (http:// www.thecrimson.com/article/1968/8/16/ conversation-in-a-li-bar-with/). 3. Re: Chinamanda and Achebe hate campaign — a word of advice. Nigerian Village Square. December 19, 2012 (http://www ....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2016

ISSN: 1877-0509

DOI: 10.1016/j.procs.2016.07.341