Cookies
Usamos cookies para melhorar nosso site e a sua experiência. Ao continuar a navegar no site, você aceita a nossa política de cookies. Ver mais
Aceitar Rejeitar
  • Menu
Tópicos
de interesse
Detalhes

Detalhes

  • Nome

    Manuel Eduardo Correia
  • Cluster

    Informática
  • Cargo

    Investigador Sénior
  • Desde

    01 janeiro 2009
004
Publicações

2020

Profiling IT security and interoperability in Brazilian health organisations from a business perspective

Autores
Rui, RJ; Martinho, R; Oliveira, AA; Alves, D; Nogueira Reis, ZSN; Santos Pereira, C; Correia, ME; Antunes, LF; Cruz Correia, RJ;

Publicação
International Journal of E-Health and Medical Communications

Abstract
The proliferation of electronic health (e-Health) initiatives in Brazil over the last 2 decades has resulted in a considerable fragmentation within health information technology (IT), with a strong political interference. The problem regarding this issue became twofold: 1) there are considerable flaws regarding interoperability and security involving patient data; and 2) it is difficult even for an experienced company to enter the Brazilian health IT market. In this article, the authors aim to assess the current state of IT interoperability and security in hospitals in Brazil and evaluate the best business strategy for an IT company to enter this difficult but very promising health IT market. A face-to-face questionnaire was conducted among 11 hospital units to assess their current status regarding IT interoperability and security aspects. Global Brazilian socio-economic data was also collected, and helped to not only identify areas of investment regarding health IT security and interoperability, but also to derive a business strategy, composed out of recommendations listed in the paper. Copyright © 2020, IGI Global.

2020

Illegitimate HIS access by healthcare professionals detection system applying an audit trail-based model

Autores
Sa Correia, L; Correia, ME; Cruz Correia, R;

Publicação
HEALTHINF 2020 - 13th International Conference on Health Informatics, Proceedings; Part of 13th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2020

Abstract
Complex data management on healthcare institutions makes very hard to identify illegitimate accesses which is a serious issue. We propose to develop a system to detect accesses with suspicious behavior for further investigation. We modeled use cases (UC) and sequence diagrams (SD) showing the data flow between users and systems. The algorithms represented by activity diagrams apply rules based on professionals' routines, use data from an audit trail (AT) and classify accesses as suspicious or normal. The algorithms were evaluated between 23rd and 31st July 2019. The results were analyzed using absolute and relative frequencies and dispersion measures. Access classification was in accordance to rules applied. "Check time of activity" UC had 64, 78% of suspicious classifications, being 55% of activity period shorter and 9, 78% longer than expected, "Check days of activity" presented 2, 27% of suspicious access and "EHR read access" 79%, the highest percentage of suspicious accesses. The results show the first picture of HIS accesses. Deeper analysis to evaluate algorithms sensibility and specificity should be done. Lack of more detailed information about professionals' routines and systems, and low quality of systems logs are some limitations. Although we believe this is an important step in this field.

2020

Providing Secured Access Delegation in Identity Management Systems

Autores
Shehu, AS; Pinto, A; Correia, ME;

Publicação
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020.

Abstract

2020

Container Hardening Through Automated Seccomp Profiling

Autores
Lopes, N; Martins, R; Correia, ME; Serrano, S; Nunes, F;

Publicação
Proceedings of the 6th International Workshop on Container Technologies and Container Clouds, WOC@Middleware 2020, Delft, The Netherlands, December 07-11, 2020

Abstract

2019

Reputation-Based Security System For Edge Computing

Autores
Nwebonyi, FN; Martins, R; Correia, ME;

Publicação
Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018

Abstract

Teses
supervisionadas

2020

Establishing Trust and Confidence Among Entities in Distributed Networks

Autor
Francis Nwebonyi Nwebonyi

Instituição
UP-FCUP

2019

Establishing Trust and Confidence Among Entities in Distributed Networks

Autor
Francis Nwebonyi Nwebonyi

Instituição
UP-FCUP

2018

Infrastructure for Identity Management, Authentication and Authorization

Autor
Muhammad Shehu Abubakar-Sadiq

Instituição
UP-FCUP

2018

Authentication modules for Keycloak authentication server

Autor
Daicy Patricia Duarte Paiva

Instituição
UP-FCUP

2017

A flexible framework for Rogue Access Point detection

Autor
Ricardo Jorge Esteves Gonçalves

Instituição
UP-FCUP