Analysing Data Security Requirements of Android Mobile Banking Application

Author(s):  
Shikhar Bhatnagar ◽  
Yasir Malik ◽  
Sergey Butakov
2013 ◽  
Vol 834-836 ◽  
pp. 1795-1798
Author(s):  
Jun Qin ◽  
Ya Ping Zhang ◽  
Ping Zong

In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.


2012 ◽  
Vol 8 (1) ◽  
pp. 51-65 ◽  
Author(s):  
T. Chandrakumar ◽  
S. Parthasarathy

Enterprise resource planning (ERP) is integrated packaged software, which addresses most fundamental business processing functionality across different functional areas and business units, in a single software system, with single database and accessible through a unified interface and channel of communication. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online ERP System requires an accurate, precise and Data security in business concepts of the enterprise. The authors introduce basic features and security of ERP System using Extensible Mark-up Language (XML) technology. Traditionally, XML security has developed along two distinct though related lines of research, corresponding to two facts of the XML security notion. The first fact defines XML security as a set of security techniques (encryption, digital signature) tightly coupled with XML to maintain the main features of the XML semi-structured data model while adding to it all necessary security capabilities. In this paper we will explore XML Signature specification from W3C and its implementation in .NET.


Author(s):  
Emily Rodriguez ◽  
Challace Pahlevan-lbrekic ◽  
Elaine L. Larson

Review of clinical research by institutional review boards (IRBs) is integral to the protection of human subjects and necessary for the conduct of legal and ethical research. Because such review is time and resource intensive, it is critical to identify common issues that contribute to delayed review and approval of research. Hence, the aim of this quality improvement project was to identify factors associated with long delays in IRB approval and identify potential strategies to streamline the review process. In collaboration with the human subjects research protection program at a large academic health center in the northeastern United States, we conducted a content analysis of minutes of convened IRB meetings for every new protocol (initial submission) approved between January and September 2019 that required greater than or equal to two full board reviews prior to approval ( n = 33). We also examined characteristics of new protocols that were reviewed less than twice at convened meetings during the same time frame ( n = 244). Using χ2 or Fisher's exact tests, the characteristics of protocols with multiple reviews by the convened IRBs were compared with those protocol submissions reviewed by the convened IRBs only once. Three factors significantly associated with increased delays were researcher conflict of interest (30% vs. 12%, respectively, p < .01), need for radiation safety evaluation (36% vs. 20%, respectively, p = .03), and protocols that were clinical trials (73% vs. 60%, respectively, p < .01). Other factors associated with delayed IRB approval were excessive technical jargon (93.94%, n = 31), inadequate description of data security or inability to meet data security requirements of the institution (75.76%, n = 25), protocol design affecting patient safety (57.58%, n = 19), and lack of clarity regarding compensation and payment or study duration ( n = 18, 54.54% each). Approaches to mitigate delays in approval and increase the efficiency and efficacy of the IRB process are recommended.


2019 ◽  
Vol 8 (3) ◽  
pp. 47-59
Author(s):  
Panagiotis Vartholomaios ◽  
Nacim Ramdani ◽  
Christophoros Christophorou ◽  
Dimosthenis Georgiadis ◽  
Thomas Guilcher ◽  
...  

Hospitals are considered a field of logistic robotics of high commercial potential and therefore a handful of mobile robot solutions exist. However, they have failed to trigger widespread acceptance by the market. The ENDORSE system will pursue 4 innovation pillars: an infrastructure-less multi-robot navigation, i.e. minimum installation of sensors and communications buses inside the building for the localization of robots, targets and docking stations; advanced HRI for resolving deadlocks and achieving efficient sharing of space resources in crowded environments; the deployment of ENDORSE software as a cloud-based service facilitating its integration with corporate software solutions such as ERP and CRM, complying with GDPR data security requirements; and allowing for reconfigurable and modular hardware architectures so that diverse modules can be easily swapped. ENDORSE functionality will be demonstrated via the integration of an e-diagnostic support module for vital signs monitoring, facilitating connectivity to cloud-based EHR, and validated in an operational hospital environment for realistic assessment.


Sign in / Sign up

Export Citation Format

Share Document