共查询到20条相似文献,搜索用时 15 毫秒
1.
The combination of digitized health information and web-based technologies offers many possibilities for data analysis and business intelligence. In the healthcare and biomedical research domain, applications depending on electronic health records (EHRs) identify privacy preservation as a major concern. Existing solutions cannot always satisfy the evolving research demands such as linking patient records across organizational boundaries due to the potential for patient re-identification. In this work, we show how semantic methods can be applied to support the formulation and enforcement of access control policy whilst ensuring that privacy leakage can be detected and prevented. The work is illustrated through a case study associated with the Australasian Diabetes Data Network (ADDN – www.addn.org.au), the national paediatric type-1 diabetes data registry, and the Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) platform that supports Australia-wide access to urban and built environment data sets. We demonstrate that through extending the eXtensible Access Control Markup Language (XACML) with semantic capabilities, finer-grained access control encompassing data risk disclosure mechanisms can be supported. We discuss the contributions that can be made using this approach to socio-economic development and political management within business systems, and especially those situations where secure data access and data linkage is required. 相似文献
2.
3.
Felix Mata Miguel Torres-Ruiz Roberto Zagal Giovanni Guzman Marco Moreno-Ibarra Rolando Quintero 《Telematics and Informatics》2018,35(4):837-853
Nowadays, people are practicing physical exercise in order to maintain good health conditions. Such physical workouts are required by a plan, which should be designed and supervised by sport specialists and medical assistants. Thus, the exercise sessions shall start with consultation of a coach, doctor and dietician; however, many times this scenario is not presented. In typical activities such as running, cycling and fitness, people use health mobile apps with their smartphones, which offer support for these activities. Nevertheless, the functionality and operation of these applications are isolated, because many and long questionnaires are performed. Additionally, the physical and health state of a user is not considered. These issues would be taken into account for determining recommendations about the time for doing exercise and the kind of activity for each person. In this work, a social semantic mobile framework to generate recommendations where a mobile application allows sensing the physical performance, taking into consideration medical criteria with smartphones is proposed. The approach includes a semantic cross-information that comes from social network and official data as well as sport activities and medical knowledge. This knowledge is translated into application ontologies related directly to health, nutrition and training domains. The methodology also covers physical fitness tests and a monitoring tool for evaluating the nutrition plan and the correct execution of the training. As case study, the mobile application offers to evaluate the physical and health conditions of a runner, automatically generate a nutrition plan and training, monitor plans and recomputed them if users make changes in their routines. The data provided from the social network are used as feedback in the application, in order to make the training and nutrition plans more flexible by applying spatio-temporal analysis based on machine learning. Finally, the generated training and nutrition plans were validated by specialists, they have demonstrated 82% of effectiveness rate in exercise training routines and 86% in nutrition plans. In addition, the results were compared with isolated approaches and manual recommendations made by specialists, the obtained overall performance was 81%. 相似文献
4.
5.
基于Android的移动互联网应用框架方案 总被引:1,自引:0,他引:1
随着移动互联网的快速发展,市场对于移动互联网应用会有大量并且变化的需求.企业和个人开发者通过应用开发框架的支持,可以实现高效率的开发,并保证工程质量.本文分析了基于Android的移动互联网应用框架的需求,提出满足这一需求的框架设计方案.框架包含能力框架的三大组件、依赖于能力框架的服务以及UI框架.本文针对每一个部分,论述了功能要点以及设计思路. 相似文献
6.
7.
8.
9.
10.
随着校园远程教育技术、数字化学习等的不断发展,移动学习作为校园新型的学习方式,以移动计算与数字化技术为基础,正在不断的推广和应用。本文针对Android系统的使用率高的特点,开发出基于Android系统的大学英语移动学习平台,提出平台开发的原则和系统需求,并给出了系统的测试结果。 相似文献
11.
随着校园远程教育技术、数字化学习等的不断发展,移动学习作为校园新型的学习方式,以移动计算与数字化技术为基础,正在不断的推广和应用。本文针对Android系统的使用率高的特点,开发出基于Android系统的大学英语移动学习平台,提出平台开发的原则和系统需求,并给出了系统的测试结果。 相似文献
12.
为了提高NFC技术的安全性,针对Android平台NFC应用进行NDEF协议漏洞挖掘研究,提出了一种基于Fuzzing技术的测试方法。该方法采用手工、生成和变异3种策略构造测试用例,使用报文逆向分析和嗅探2种手段辅助分析并构造报文;然后,利用构造的测试用例对NFC应用目标进行漏洞挖掘并输出结果。根据该方法,开发了一个NFC应用安全漏洞挖掘系统ANDEFVulFinder,采用logcat和进程监控的手段在漏洞挖掘过程中对目标进行监测,并通过模拟标签和触碰操作实现漏洞挖掘过程自动化。最后,通过测试MIUI系统和6个应用,发现了8个漏洞,结果表明了漏洞挖掘方法的有效性。 相似文献
13.
本文通过构建开放度模型,对移动通信网络安全重点威胁进行信任度分析,并通过安全平面的方式对其进行威胁的划分,从而对整体的移动网络安全环境进行评估,以此为移动网络通信的安全处理奠定基础。 相似文献
14.
本文通过构建开放度模型,对移动通信网络安全重点威胁进行信任度分析,并通过安全平面的方式对其进行威胁的划分,从而对整体的移动网络安全环境进行评估,以此为移动网络通信的安全处理奠定基础。 相似文献
15.
Jafar A. Alzubi Omar A. Alzubi Ashish Singh Tareq Mahmod Alzubi 《International Journal of Network Management》2023,33(5):e2240
Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost. 相似文献
16.
17.
18.
19.
Ijaz Ahmad Tanesh Kumar Madhusanka Liyanage Mika Ylianttila Timo Koskela Timo Braysy Antti Anttonen Vesa Pentikinen Juha- Pekka Soininen Jyrki Huusko 《Telematics and Informatics》2018,35(1):82-92
This paper presents a roadmap for the transition from current gadget-centric digital services towards a gadget-free services environment called the Naked world. The main idea of the Naked world is that all the services which are currently provided by gadgets will be provided by the infrastructure, thus no gadgets will be needed to use any kind of digital services. When a user in the Naked world intends to use a service, the infrastructure senses the user, the nearby intelligent surrounding launches an interactive user interface, performs identification through biometric identities, provides the service, and then closes the session when the user finishes the job. Therefore, the Naked world comprises highly intelligent and context-aware interactive environments. The vision of the Naked world is an evolution towards a user-friendly and ubiquitously available digital services, which is naturally bounded by the technological advancement. Henceforth, this paper presents the essential technologies and functional requirements along with the current and forthcoming novel technological concepts and challenges for the realization of the Naked world. 相似文献