2012
Authors
Nassif, H; Cunha, F; Moreira, IC; Cruz Correia, R; Sousa, E; Page, D; Burnside, E; Dutra, I;
Publication
Proceedings - 2012 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2012
Abstract
In this work we build the first BI-RADS parser for Portuguese free texts, modeled after existing approaches to extract BI-RADS features from English medical records. Our concept finder uses a semantic grammar based on the BI-RADS lexicon and on iterative transferred expert knowledge. We compare the performance of our algorithm to manual annotation by a specialist in mammography. Our results show that our parser's performance is comparable to the manual method. © 2012 IEEE.
2012
Authors
Augusto, AB; Correia, ME;
Publication
INFORMATION SECURITY AND PRIVACY RESEARCH
Abstract
Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with these developments, Internet application providers like Google and Facebook are developing and deploying an ever increasing set of personal services that are being aggregated and structured over personal user accounts were an ever increasing set of personal private sensitive attributes is being massively aggregated. In this paper we describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a framework for user centric identity management that provides an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users identity attributes to offer a versatile set of identity services. In OFELIA personal attributes are distributed among and protected by several otherwise unrelated AAs (Attribute Authorities). Only the user mobile device knows how to aggregate these scattered AAs identity attributes back into some useful identifiable entity identity. Moreover by recurring to an IdB (Identity Broker), acting as a privacy enhancing blind caching-proxy, in OFELIA the identity attributes location in the Internet is hidden from the RP/SP (Relying Party, Service Provider) that wants to have temporary access to the users personal data. The mobile device thus becomes the means by which the user can asynchronously exercise discretionary access control over their most sensitive dynamic identity attributes in a simple but highly transparent way.
2012
Authors
Santos Pereira, C; Augusto, AB; Correia, ME; Ferreira, A; Cruz Correia, R;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
The Internet has proved the enormous benefits that can be accrued to all players involved in online services. However, it has also clearly demonstrated the risks involved in exposing personal data to the outside world and constitutes at the same time a teeming breeding ground of innovation for highly flexible security solutions that can minimize these risks. It is now widely believed that the benefits of online services to healthcare in general supplant the risks involved, provided adequate security measures are taken and the role played by all the parties involved, be they physicians, nurses or patients are clearly outlined. Due to the highly sensitive nature of the data held on the Electronic Health Record (EHR), it is commonly agreed that providing online access to patients EHR to the outside world carries an unacceptable level of risk not only to the patients but also to the healthcare institution that plays a custodian to that sensitive data. However, by sharing these risks with the patients, healthcare institutions can start to equate the possibility of providing controlled exterior online access to patients EHR. The mobile phone is nowadays the preferred mean by which people can interact with each other at a distance. Not only that, the smartphone constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with information systems. In this paper we propose a discretionary online access rights management mechanism based on the Role Based Access Control (RBAC) model that takes advantage on the personal/technical characteristics and data communications capabilities of the smartphone in order to provide patients with the means by which they can conveniently exercise safe discretionary online access permissions to their own EHR. © 2012 Springer-Verlag.
2012
Authors
Martins, RA; Correia, ME; Augusto, AB;
Publication
INFORMATION SYSTEMS AND TECHNOLOGIES
Abstract
This paper performs a survey on the state of the art in the security and access controls mechanisms employed by multi agent systems as a form of data transaction, with special emphasis on their security threats and how these issues are currently being tackled for multi-agent systems. In this paper we provide a brief summary of current approaches and provide comments on their relevance, implementation and safety assumptions behind their safe operation on real systems with sensitive data. We also take special notice on the security issues approached by each one of the analysed proposals and the sometimes ingenious ways proposed by different authors to solve them. We also pay special attention to issues related with the authentication, confidentiality, integrity and access control mechanisms employed to minimise security incidents. Nowadays multi-agent systems are increasingly being researched and deployed to solve complex interoperability issues that normally occur between different institutions. The final result of this survey is a summary aggregation of knowledge about security and access control practices for multi agent models and implementations.
2012
Authors
Maia, LA; Correia, ME;
Publication
SISTEMAS Y TECNOLOGIAS DE INFORMACION, VOLS 1 AND 2
Abstract
The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with Information systems. It can also act as a convenient and highly practical storage place for sensitive identity information. Moreover nowadays there is a real urgent need to have in place secure, non-refutable and securely managed identities and communications, with sufficiently strong authentication mechanisms that can assure, among other important properties, strong non-repudiation. In this paper we describe how we have managed to combine the functionalities provided by OpenSC and the University of Graz IAIK java security provider to more easily port java security applications based on the desktop JCA API to the Android platform. This enables us to take advantage of the full extent of the security programming facilities provided by the Java programming language on android devices equipped with smart digital (SD) based smart cards.
2012
Authors
Ramalho, JC; Simoes, A; Queiros, R;
Publication
Innovations in XML Applications and Metadata Management: Advancing Technologies
Abstract
As new concepts such as virtualization, cloud computing, and web applications continue to emerge, XML has begun to assume the role as the universal language for communication among contrasting systems that grow throughout the internet. Innovations in XML Applications and Metadata Management: Advancing Technologies addresses the functionality between XML and its related technologies towards application development based on previous concepts. This book aims to highlights the variety of purposes for XML applications and how the technology development brings together advancements in the virtual world.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.