Insurance Block: An Insurance Data Security Transaction Authentication Scheme Suitable for Blockchain Environment

Author(s):  
Lijun Xiao ◽  
Yan Cheng ◽  
Han Deng ◽  
Shen Xu ◽  
Weidong Xiao
2009 ◽  
Vol 42 (21) ◽  
pp. 1-2
Author(s):  
ERIK L. GOLDMAN
Keyword(s):  

Crisis ◽  
2010 ◽  
Vol 31 (4) ◽  
pp. 217-223 ◽  
Author(s):  
Paul Yip ◽  
David Pitt ◽  
Yan Wang ◽  
Xueyuan Wu ◽  
Ray Watson ◽  
...  

Background: We study the impact of suicide-exclusion periods, common in life insurance policies in Australia, on suicide and accidental death rates for life-insured individuals. If a life-insured individual dies by suicide during the period of suicide exclusion, commonly 13 months, the sum insured is not paid. Aims: We examine whether a suicide-exclusion period affects the timing of suicides. We also analyze whether accidental deaths are more prevalent during the suicide-exclusion period as life-insured individuals disguise their death by suicide. We assess the relationship between the insured sum and suicidal death rates. Methods: Crude and age-standardized rates of suicide, accidental death, and overall death, split by duration since the insured first bought their insurance policy, were computed. Results: There were significantly fewer suicides and no significant spike in the number of accidental deaths in the exclusion period for Australian life insurance data. More suicides, however, were detected for the first 2 years after the exclusion period. Higher insured sums are associated with higher rates of suicide. Conclusions: Adverse selection in Australian life insurance is exacerbated by including a suicide-exclusion period. Extension of the suicide-exclusion period to 3 years may prevent some “insurance-induced” suicides – a rationale for this conclusion is given.


1997 ◽  
Vol 36 (02) ◽  
pp. 79-81
Author(s):  
V. Leroy ◽  
S. Maurice-Tison ◽  
B. Le Blanc ◽  
R. Salamon

Abstract:The increased use of computers is a response to the considerable growth in information in all fields of activities. Related to this, in the field of medicine a new component appeared about 40 years ago: Medical Informatics. Its goals are to assist health care professionals in the choice of data to manage and in the choice of applications of such data. These possibilities for data management must be well understood and, related to this, two major dangers must be emphasized. One concerns data security, and the other concerns the processing of these data. This paper discusses these items and warns of the inappropriate use of medical informatics.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document