scholarly journals Mitigation of Random Query String DoS via Gossip

Author(s):  
Stefano Ferretti ◽  
Vittorio Ghini
Keyword(s):  
2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Marcelo Antonio de Carvalho Junior ◽  
Paulo Bandiera-Paiva

Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.


Algorithms ◽  
2018 ◽  
Vol 11 (8) ◽  
pp. 118 ◽  
Author(s):  
Andrej Brodnik ◽  
Matevž Jekovec

We consider a sliding window W over a stream of characters from some alphabet of constant size. We want to look up a pattern in the current sliding window content and obtain all positions of the matches. We present an indexed version of the sliding window, based on a suffix tree. The data structure of size Θ(|W|) has optimal time queries Θ(m+occ) and amortized constant time updates, where m is the length of the query string and occ is its number of occurrences.


JAMIA Open ◽  
2020 ◽  
Author(s):  
Elizabeth S Gromisch ◽  
Aaron P Turner ◽  
Jodie K Haselkorn ◽  
Albert C Lo ◽  
Thomas Agresta

Abstract Objectives Persons with multiple sclerosis (MS) can face a number of potential healthcare-related barriers, for which mobile health (mHealth) technology can be potentially beneficial. This review aimed to understand the frequency, current uses, and potential barriers with mHealth usage among persons with MS. Methods A query string was used to identify articles on PubMed, MEDLINE, CINAHL, and IEEE Xplore that were published in English between January 2010 and December 2019. Abstracts were reviewed and selected based on a priori inclusion and exclusion criteria. Fifty-nine peer-reviewed research studies related to the study questions are summarized. Results The majority of persons with MS were reported as using smartphones, although rates of mHealth utilization varied widely. mHealth usage was grouped into 3 broad categories: (1) disability and symptom measurement; (2) interventions and symptom management; and (3) tracking and promoting adherence. While there have been an increasing number of mHealth options, certain limitations associated with MS (eg, poor dexterity, memory problems) may affect usage, although including persons with MS in the design process can address some of these issues. Discussion Given the increased attention to mHealth in this population and the current need for telehealth and at home devices, it is important that persons with MS and healthcare providers are involved in the development of new mHealth tools to ensure that the end product meets their needs. Considerations for addressing the potential mHealth use barriers in persons with MS are discussed.


Author(s):  
Raoul Pascal Pein ◽  
Joan Lu ◽  
Wolfgang Renz

In this chapter, a CBIR design based on previous work of the author (Pein, 2008) is presented. The available system already allows for a retrieval by a query string (Pein, Lu, & Renz, 2008a). In the context of this investigation, the system has been extended to support alternative user interfaces as well as a testing module used in the case studies below. Being a pure research prototype, the retrieval engine is optimized for generating accurate results in order to have a reliable data foundation. Further, the query language syntax and the constraints for a practical application of the learning algorithm are presented.


2000 ◽  
Vol 10 (1) ◽  
pp. 1-18 ◽  
Author(s):  
ERIK MEIJER

The Common Gateway Interface (CGI) for generating dynamic documents on web servers imposes much accidental complexity on the programmer. The Haskell/CGI library documented in this paper hides all this unpleasantness by using the common sense ‘design pattern’ of separating model and presentation. Low-level query string requests are represented by association lists, and primitive HTTP responses are easily constructed using a set of HTML generating combinators. The CGI programmer only needs to write a worker function that maps an abstract request into an abstract response. A (higher-order) wrapper function then transmutes the worker into a real low-level CGI script that deals with the exact format of concrete requests and responses as required by the CGI standard.


2015 ◽  
Vol 14 (6) ◽  
pp. 561-581 ◽  
Author(s):  
Alice Kozakevicius ◽  
Cristian Cappo ◽  
Bruno A. Mozzaquatro ◽  
Raul Ceretta Nunes ◽  
Christian E. Schaerer

MENDEL ◽  
2019 ◽  
Vol 25 (1) ◽  
pp. 23-30
Author(s):  
Marina Volkova ◽  
Petr Chmelar ◽  
Lukas Sobotka

SQL injection is one of the most popular and serious information security threats. By exploiting database vulnerabilities, attackers may get access to sensitive data or enable compromised computers to conduct further network attacks. Our research is focused on applying machine learning approaches for identication of injection characteristics in the HTTP query string. We compare results from Rule-based Intrusion Detection System, Support Vector Machines, Multilayer Perceptron, Neural Network with Dropout layers, and Deep Sequential Models (Long Short-Term Memory, and Gated Recurrent Units) using multiple string analysis, bag-of-word techniques, and word embedding for query string vectorization. Results proved benets of applying machine learning approach for detection malicious pattern in HTTP query string.


2004 ◽  
Vol 15 (01) ◽  
pp. 57-71 ◽  
Author(s):  
ABDULLAH N. ARSLAN ◽  
ÖMER EĞECIOĞLU

Let [Formula: see text] be a dictionary consisting of n binary strings of length m each, represented as a trie. The usual d-query asks if there exists a string in [Formula: see text] within Hamming distance d of a given binary query string q. We present a simple algorithm to determine if there is a member in [Formula: see text] within edit distanced of a given query string q of length m. The method takes time O(dmd+1) in the RAM model, independent of n, and requires O(dm) additional space. We also generalize the results for the case of the problem over a larger alphabet.


Sign in / Sign up

Export Citation Format

Share Document