The Challenge of Assuring Data Trustworthiness

Author(s):  
Elisa Bertino ◽  
Chenyun Dai ◽  
Murat Kantarcioglu
Keyword(s):  
2018 ◽  
Vol 21 (3) ◽  
pp. 213-233 ◽  
Author(s):  
Paolo Fogliaroni ◽  
Fausto D’Antonio ◽  
Eliseo Clementini

2019 ◽  
Vol 27 (6) ◽  
pp. 2294-2307 ◽  
Author(s):  
Haiqin Wu ◽  
Liangmin Wang ◽  
Guoliang Xue ◽  
Jian Tang ◽  
Dejun Yang

IEEE Access ◽  
2017 ◽  
Vol 5 ◽  
pp. 1382-1397 ◽  
Author(s):  
Maryam Pouryazdan ◽  
Burak Kantarci ◽  
Tolga Soyata ◽  
Luca Foschini ◽  
Houbing Song

2018 ◽  
Vol 14 (2) ◽  
Author(s):  
Gandhi Ramadhan ◽  
Ayu Niza Machfauzia

ABSTRACT This research aimed to (1) describe the effort to inculcate the values of nationalism in school; (2) describe efforts to inculcate the values of nationalism in the history learning; (3) identify the obstacles of history teacher in instilling the values of nationalism. This research was a naturalistic qualitative research. The sample was determined through purposive sampling and snowball sampling. The data were collected through observation, interviews, and documentation. The data trustworthiness was done through triangulation. Interactive model of Miles and Huberman were used for data analyzed. The results of the research showed that (1) the efforts to inculcate the values of nationalism in SMA Negeri 1 Pajangan had been implemented through the policy and school order. The suspension system became the basis for disciplining learners in school; (2) the inculcation of the values of nationalism by the history teacher was done through preparation of the lesson planing, teaching media according to material, lecturing method and discussion; (3) there were three factors that became obstacles of history teacher in the effort to inculcate the values of nationalism, were a) history teacher, b) attitudes of learners, and c) learning facilities. Keywords: the cultivation of the values of nationalism, nationalism, the study of history.


Understanding reasonable framework cyber attacks is essential for creating material assurance and recuperation measures. Propelled attacks follow exploited contact at diminished expenses and recognize capacity. This paper behaviors chance investigation of joined data trustworthiness and handiness attacks against the office framework state evaluation. We will in general contrast the consolidated attacks and unadulterated honesty attacks - false data infusion attacks. A safety record for defenselessness appraisal to those two sorts of attacks is arranged and created because a blended number connected science drawback. We will in general demonstrate that such joined attacks will prevail with less assets than false data infusion attacks. The consolidated attacks with confined data of the framework design also open gifts to keep camouflage against the undesirable data location. At last, the risk of joined attacks to dependable framework activity is assessed abuse the outcomes from defenselessness evaluation and attacks sway examination. The discoveries during this paper are substantial and upheld by a top to bottom contextual investigation


Author(s):  
Bandar Alhaqbani ◽  
Colin Fidge

Electronic Health Record systems are being introduced to overcome the limitations associated with paper-based and isolated Electronic Medical Record systems. This is accomplished by aggregating medical data and consolidating them in one digital repository. Though an EHR system provides obvious functional benefits, there is a growing concern about reliability trust (trustworthiness) of Electronic Health Records. Security requirements such as confidentiality, integrity, and availability can be satisfied by traditional data security mechanisms. However, measuring data trustworthiness is an issue that cannot be solved with traditional mechanisms, especially since degrees of trust change over time. In this chapter, a Medical Data Trustworthiness Assessment model to assist an EHR system to validate the trustworthiness of received/stored medical data based on who entered the data and when is presented. The MDTA model uses a statistical approach that depends on the observed experiences available to the EHR system. In order to provide an accurate trustworthiness estimate for historical medical data, a time scope around the time when the data was entered was used. This scope enables the model to capture the dynamic behavior of the data entry agent’s trustworthiness. To conduct this assessment medical metadata is used to extract information about the medical data sources (e.g. timestamps, and the identities of healthcare agents and medical practitioners) and, thereafter, this information is used in a statistical process to derive a trustworthiness value for the medical data. The result can then be expressed in the displayed health record by manipulating the EHR’s metadata to alert the medical practitioner to possible trustworthiness problems.


Sign in / Sign up

Export Citation Format

Share Document