Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2008

ACCESS AND PRIVACY RIGHTS USING WEB SECURITY STANDARDS TO INCREASE PATIENT EMPOWERMENT

Autores
Falcao Reis, F; Costa Pereira, A; Correia, ME;

Publicação
MEDICAL AND CARE COMPUNETICS 5

Abstract
Electronic Health Record (EHR) systems are becoming more and more sophisticated and include nowadays numerous applications, which are not only accessed by medical professionals, but also by accounting and administrative personnel. This could represent a problem concerning basic rights such as privacy and confidentiality. The principles, guidelines and recommendations compiled by the OECD protection of privacy and trans-border flow of personal data are described and considered within health information system development. Granting access to an Elf R should be dependent upon the owner of the record; the patient: he must be entitled to define who is allowed to access his EHRs, besides the access control scheme each health organization may have implemented. In this way, it's not only up to health professionals to decide who have access to what, but the patient himself Implementing such a policy is walking towards patient empowerment which society should encourage and governments should promote. The paper then introduces a technical solution based on web security standards. This would give patients the ability to monitor and control which entities have access to their personal EHRs, thus empowering them with the knowledge of how much of his medical history is known and by whom. It is necessary to create standard data access protocols, mechanisms and policies to protect the privacy rights and furthermore, to enable patients, to automatically track the movement (flow) of their personal data and information in the context of health information systems. This solution must be functional and, above all, user-friendly and the interface should take in consideration some heuristics of usability in order to provide the user with the best tools. The current official standards on confidentiality and privacy in health care, currently being developed within the EU, are explained, in order to achieve a consensual idea of the guidelines that all member states should follow to transfer such principles into national laws. A perspective is given on the state of the art concerning web security standards, which can be used to easily engineer health information systems complying with the patient empowering goals. In conclusion health systems with the characteristics thus described are technically feasible and should be generally implemented and deployed.

2008

SECURING A HEALTH INFORMATION SYSTEM WITH A GOVERNMENT ISSUED DIGITAL IDENTIFICATION CARD

Autores
Santos, R; Correia, ME; Antunes, L;

Publicação
42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS

Abstract
Health Information Systems (HIS) are often deployed with inadequate security mechanisms and with users being generally pointed out as the weakest link. The launch of the Portuguese digital national identification smart card, the Citizen Card (CC), with strong authentication and digital signing capabilities, represents a new and viable economic opportunity for securing a HIS and at the same time foster the creation of a much more secure national health information infrastructure. Smart cards are being deployed in healthcare in several places around the world with highly encouraging results. Major programs have already been deployed with great success, although there are some well identified issues that need to be addressed. The CC is a versatile and secure card, with the latest in encryption and tamper resistance technologies, with standard support for a Public Key Infrastructure (PKI). We present the advantages and enumerate some of the problems of using a smart card in a HIS, as well as the CC possible contributions in this area, namely as an easy, inexpensive, widely deployed way of using current technology to protect HIS security, and ultimately patient information, while at the same time fostering the expansion and deployment of inter operable HIS. Issues are identified that will need to be resolved and a detailed plan for further work to assess the level of impact the CC can have on the national HIS is indicated.

2008

Early introduction of competitive programming

Autores
Ribeiro, P; Guerreiro, P;

Publicação
Olympiads in Informatics

Abstract
Those who enjoy programming enjoy programming competitions, either as contestants or as coaches. Often coaches are teachers, who, aiming at better results in the future, would like to have more and more students participating, from earlier stages. Learning all the basic algorithms takes some time, of course; on the other hand, competition environments can be introduced right from the beginning as a pedagogical tool. If handled correctly, this can be very effective in helping to reach the goals of the course and, as a side-effect, in bringing larger crowds of students into the programming competition arena. © 2008 Institute of Mathematics and Informatics, Vilnius.

2008

Minimality in a Linear Calculus with Iteration

Autores
Alves, S; Florido, M; Mackie, I; Sinot, FR;

Publicação
Electronic Notes in Theoretical Computer Science

Abstract
System L is a linear version of Gödel's System T, where the ?-calculus is replaced with a linear calculus; or alternatively a linear ?-calculus enriched with some constructs including an iterator. There is thus at the same time in this system a lot of freedom in reduction and a lot of information about resources, which makes it an ideal framework to start a fresh attempt at studying reduction strategies in ?-calculi. In particular, we show that call-by-need, the standard strategy of functional languages, can be defined directly and effectively in System L, and can be shown minimal among weak strategies.

2008

Resource Management and Signalling Architecture of a Hybrid Multicast Service for Multimedia Distribution

Autores
Borcoci, E; Pinto, A; Mehaoua, A; Fang, L; Wang, N;

Publicação
MANAGEMENT OF CONVERGED MULTIMEDIA NETWORKS AND SERVICES, PROCEEDINGS

Abstract
This paper further develops an architecture and design elements for a resource management and a signalling system to support the construction and maintenance of a mid-long term hybrid multicast tree for multimedia distribution services in a QoS guaranteed way, over multiple IP domains. The system called E-cast is composed of an overlay part - in inter-domain and possible IP level multicast in intra-domain. Each E-cast tree is associated with a given QoS class and is composed of unicast pipes established through Service Level Specification negotiations between the domain managers. The paper continues a previous work, by proposing an inter-domain signalling system to support the multicast management and control operations and then defining the resource management for tree construction and adjustment procedures in order to assure the required static and dynamic properties of the tree.

2008

Admission Control in IP Multicast over Heterogeneous Access Networks

Autores
Santos, P; Pinto, A; Ricardo, M; Almeida, T; Fontes, F;

Publicação
NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS

Abstract
Network operators have been reluctant to deploy IP multicast services mainly due to the lack of native control rover multicast groups. This lack of control does not only prevent operators from generating revenue from multicast-based services but also hinders regular network management. In this work we identified the network elements where admission control should be enforced for multicast session spawning over heterogeneous access networks. The architecture proposed uses existing AAA functionality to perform user identification and multicast session admission control. This control is made at the network layer with no protocol modifications. Three access networks were considered: xDSL, WiMAX and UMTS.

  • 171
  • 201