Showing 81 - 90 of 2,358
The Florida Health Information Exchange has grown over the years since its inception in 2004. Harris Corporation was contracted to provide some basic services to the health care industry in 2011 and this relationship has continued to the present time. As services have expanded, challenges have...
Persistent link: https://www.econbiz.de/10012047079
understanding the basis of securing healthcare data. Disparity exists between the rising need for security of electronic healthcare … confidence in medical providers and patients that electronic medical data is safe and accurate. However, data security and …
Persistent link: https://www.econbiz.de/10012047087
implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design … natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud …
Persistent link: https://www.econbiz.de/10012047296
by information security standards might allow a proactive attitude in the face of the diversity of threats that as the … vulnerabilities that could be explored, using information security international standards to support the activities needed to assume … information safeguard. Another intention is the establishment of a basis of references in information security to define a level …
Persistent link: https://www.econbiz.de/10012047305
This article aims at presenting the provisions of eIDAS regulation and the related implementing acts along with the work of the eSENS project, regarding the cross - border identification of a patient, using the infrastructure foreseen in the eIDAS and in the Directive 2011/24/EU. The Patient...
Persistent link: https://www.econbiz.de/10012047335
Cryptographic Substitution-boxes are source of nonlinearity in modern block encryption systems. The robustness and confusion imparted through these systems heavily rely on the strength of their S-boxes. This brings new challenges to design cryptographically potent S-boxes to develop strong...
Persistent link: https://www.econbiz.de/10012047411
against various attacks. However, the security analysis of the scheme unveils that it has serious inherent flaws. In this … analysis of the proposed cryptanalysis is provided to exemplify the proposed attack and lack of security of the anticipated … watermarking scheme. In addition, an improved version is proposed to enhance the security performance of the watermarking scheme …
Persistent link: https://www.econbiz.de/10012047421
accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access …
Persistent link: https://www.econbiz.de/10012047531
number of security problems altogether, such as online guessing attacks, relay attacks, and, if combined with dual …
Persistent link: https://www.econbiz.de/10012047567
banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems …
Persistent link: https://www.econbiz.de/10012047574