首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The combination of digitized health information and web-based technologies offers many possibilities for data analysis and business intelligence. In the healthcare and biomedical research domain, applications depending on electronic health records (EHRs) identify privacy preservation as a major concern. Existing solutions cannot always satisfy the evolving research demands such as linking patient records across organizational boundaries due to the potential for patient re-identification. In this work, we show how semantic methods can be applied to support the formulation and enforcement of access control policy whilst ensuring that privacy leakage can be detected and prevented. The work is illustrated through a case study associated with the Australasian Diabetes Data Network (ADDN – www.addn.org.au), the national paediatric type-1 diabetes data registry, and the Australian Urban Research Infrastructure Network (AURIN – www.aurin.org.au) platform that supports Australia-wide access to urban and built environment data sets. We demonstrate that through extending the eXtensible Access Control Markup Language (XACML) with semantic capabilities, finer-grained access control encompassing data risk disclosure mechanisms can be supported. We discuss the contributions that can be made using this approach to socio-economic development and political management within business systems, and especially those situations where secure data access and data linkage is required.  相似文献   

2.
3.
Nowadays, people are practicing physical exercise in order to maintain good health conditions. Such physical workouts are required by a plan, which should be designed and supervised by sport specialists and medical assistants. Thus, the exercise sessions shall start with consultation of a coach, doctor and dietician; however, many times this scenario is not presented. In typical activities such as running, cycling and fitness, people use health mobile apps with their smartphones, which offer support for these activities. Nevertheless, the functionality and operation of these applications are isolated, because many and long questionnaires are performed. Additionally, the physical and health state of a user is not considered. These issues would be taken into account for determining recommendations about the time for doing exercise and the kind of activity for each person. In this work, a social semantic mobile framework to generate recommendations where a mobile application allows sensing the physical performance, taking into consideration medical criteria with smartphones is proposed. The approach includes a semantic cross-information that comes from social network and official data as well as sport activities and medical knowledge. This knowledge is translated into application ontologies related directly to health, nutrition and training domains. The methodology also covers physical fitness tests and a monitoring tool for evaluating the nutrition plan and the correct execution of the training. As case study, the mobile application offers to evaluate the physical and health conditions of a runner, automatically generate a nutrition plan and training, monitor plans and recomputed them if users make changes in their routines. The data provided from the social network are used as feedback in the application, in order to make the training and nutrition plans more flexible by applying spatio-temporal analysis based on machine learning. Finally, the generated training and nutrition plans were validated by specialists, they have demonstrated 82% of effectiveness rate in exercise training routines and 86% in nutrition plans. In addition, the results were compared with isolated approaches and manual recommendations made by specialists, the obtained overall performance was 81%.  相似文献   

4.
基于策略驱动的移动agent安全框架研究   总被引:3,自引:0,他引:3  
针对移动agent系统面临的安全问题,本文介绍了一种将安全性与agent平台融为一体的框架(SOMA),这个框架可根据实际移动agent应用系统的需要,灵活动态地提供不同质量的安全服务,并针对这一框架系统的局限性作进一步的研究和探讨,提出了一种新的基于硬件的保护策略(TPE)。  相似文献   

5.
基于Android的移动互联网应用框架方案   总被引:1,自引:0,他引:1  
随着移动互联网的快速发展,市场对于移动互联网应用会有大量并且变化的需求.企业和个人开发者通过应用开发框架的支持,可以实现高效率的开发,并保证工程质量.本文分析了基于Android的移动互联网应用框架的需求,提出满足这一需求的框架设计方案.框架包含能力框架的三大组件、依赖于能力框架的服务以及UI框架.本文针对每一个部分,论述了功能要点以及设计思路.  相似文献   

6.
7.
《现代电子技术》2016,(22):44-46
移动互联网时代的到来将移动通信、互联网相互整合,促使移动设备可借助Wi Fi,4G等随时随地访问互联网资源。智能手机作为移动互联网时代的标志性工具,Android是一套具有开放性的移动设备平台,该平台有利于降低开发成本,拥有巨大的市场空间。从Android系统的相关知识点入手,分析基于Android设计移动互联网应用框架的需求,提出满足上述要求的框架设计方案。该框架包含UI框架、SQLite数据库、文件存储等模块,从而提升应用框架的开发和应用效率。  相似文献   

8.
Android平台移动通讯设备的GPS定位以其优良系统性能在人们的生活中以智能手机为媒介被广泛使用,基于此如何提高Android平台的GPS导航的精确度对于现代高科技产品的发展尤为重要。通过对GPS定位卫星所得到的原始数据处理,根据GPS卫星数据之间的联系得出有效的分析数据来弥补在定位时可能产生的误差,从而降低不安全因素,提高GPS定位的精确度。  相似文献   

9.
基于Android移动平台和GPS应用服务研究   总被引:1,自引:0,他引:1  
利用Android智能手机平台和GPS特性,结合Google Map,设计并实现了一个基于An-droid智能手机平台的个人移动地图的终端软件系统,并对整个系统的各个主要功能模块进行了详细的分析与研究。系统经过严格测试,可以稳定良好运行,记录数据准确,基本上满足手机用户的地图服务需求,具有广阔的推广应用前景。  相似文献   

10.
康燕茹 《电子测试》2014,(10):16-18
随着校园远程教育技术、数字化学习等的不断发展,移动学习作为校园新型的学习方式,以移动计算与数字化技术为基础,正在不断的推广和应用。本文针对Android系统的使用率高的特点,开发出基于Android系统的大学英语移动学习平台,提出平台开发的原则和系统需求,并给出了系统的测试结果。  相似文献   

11.
康燕茹 《电子测试》2014,(19):16-18
随着校园远程教育技术、数字化学习等的不断发展,移动学习作为校园新型的学习方式,以移动计算与数字化技术为基础,正在不断的推广和应用。本文针对Android系统的使用率高的特点,开发出基于Android系统的大学英语移动学习平台,提出平台开发的原则和系统需求,并给出了系统的测试结果。  相似文献   

12.
为了提高NFC技术的安全性,针对Android平台NFC应用进行NDEF协议漏洞挖掘研究,提出了一种基于Fuzzing技术的测试方法。该方法采用手工、生成和变异3种策略构造测试用例,使用报文逆向分析和嗅探2种手段辅助分析并构造报文;然后,利用构造的测试用例对NFC应用目标进行漏洞挖掘并输出结果。根据该方法,开发了一个NFC应用安全漏洞挖掘系统ANDEFVulFinder,采用logcat和进程监控的手段在漏洞挖掘过程中对目标进行监测,并通过模拟标签和触碰操作实现漏洞挖掘过程自动化。最后,通过测试MIUI系统和6个应用,发现了8个漏洞,结果表明了漏洞挖掘方法的有效性。  相似文献   

13.
聂春 《电子测试》2014,(19):28-30
本文通过构建开放度模型,对移动通信网络安全重点威胁进行信任度分析,并通过安全平面的方式对其进行威胁的划分,从而对整体的移动网络安全环境进行评估,以此为移动网络通信的安全处理奠定基础。  相似文献   

14.
聂春 《电子测试》2014,(10):28-30
本文通过构建开放度模型,对移动通信网络安全重点威胁进行信任度分析,并通过安全平面的方式对其进行威胁的划分,从而对整体的移动网络安全环境进行评估,以此为移动网络通信的安全处理奠定基础。  相似文献   

15.
Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost.  相似文献   

16.
针对手机丢失后个人隐私信息泄露所带来的安全隐患,提出并设计了一种基于Android平台的手机防盗安全软件,利用后台监听技术,通过远程控制,实现防盗追踪和私密信息销毁的功能。介绍了软件系统的总体设计方案,详细分析了各模块的具体实现方法,并在模拟器和真机两种测试环境下对手机安全防盗软件进行实验测试。实验测试结果表明:该软件设计合理、有效,能够实现预期的功能,具有一定的实用价值。  相似文献   

17.
18.
《信息技术》2017,(1):30-33
当前高校及移动信息化平台发展的关键问题依然是信息泄露、信息安全存储的问题,文中针对平台应用的小波信息安全的问题进行了改进。首先对小波分解频带和隐藏位置的确定进行了优化,通过改进算法的抗攻击性测试得出,算法系统对于滤波及噪声等常见攻击具有一定的抵抗力。进一步提出了一种基于小波变换域的信息隐藏算法,实验结果表明算法得到的嵌入图像的不可见性及安全隐蔽性相对比较好。这一研究,对外高校移动信息安全问题的改进具有一定的实际意义。  相似文献   

19.
This paper presents a roadmap for the transition from current gadget-centric digital services towards a gadget-free services environment called the Naked world. The main idea of the Naked world is that all the services which are currently provided by gadgets will be provided by the infrastructure, thus no gadgets will be needed to use any kind of digital services. When a user in the Naked world intends to use a service, the infrastructure senses the user, the nearby intelligent surrounding launches an interactive user interface, performs identification through biometric identities, provides the service, and then closes the session when the user finishes the job. Therefore, the Naked world comprises highly intelligent and context-aware interactive environments. The vision of the Naked world is an evolution towards a user-friendly and ubiquitously available digital services, which is naturally bounded by the technological advancement. Henceforth, this paper presents the essential technologies and functional requirements along with the current and forthcoming novel technological concepts and challenges for the realization of the Naked world.  相似文献   

20.
云计算是一种基于互联网的新兴应用计算机技术。私有云是在企业自有数据中心内部搭建云管理环境系统的基础支撑,为定义、运行云应用提供计算、存储和网络资源管控平台。对企业私有云建设方案进行了探讨,介绍和分析了企业私有云建设内容、目标及效益分析,并进一步分析了私有云所面临的安全问题,提出了私有云的安全框架,为企业私有云建设提供参考。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号