scholarly journals Third-party transfers in WLCG using HTTP

2020 ◽  
Vol 245 ◽  
pp. 04031
Author(s):  
Brian Bockelman ◽  
Andrea Ceccanti ◽  
Fabrizio Furano ◽  
Paul Millar ◽  
Dmitry Litvintsev ◽  
...  

Since its earliest days, the Worldwide LHC Computational Grid (WLCG) has relied on GridFTP to transfer data between sites. The announcement that Globus is dropping support of its open source Globus Toolkit (GT), which forms the basis for several FTP client and servers, has created an opportunity to reevaluate the use of FTP. HTTP-TPC, an extension to HTTP compatible with WebDAV, has arisen as a strong contender for an alternative approach. In this paper, we describe the HTTP-TPC protocol itself, along with the current status of its support in different implementations, and the interoperability testing done within the WLCG DOMA working group’s TPC activity. This protocol also provides the first real use-case for token-based authorisation for this community. We will demonstrate the benefits of such authorisation by showing how it allows HTTP-TPC to support new technologies (such as OAuth, OpenID Connect, Macaroons and SciTokens) without changing the protocol. We will also discuss the next steps for HTTP-TPC and the plans to use the protocol for WLCG transfers.

2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2011 ◽  
Vol 135 (7) ◽  
pp. 860-869 ◽  
Author(s):  
Soheil S. Dadras

Abstract Context.—In the current “molecular” era, the advent of technology, such as array-based platforms, systems biology, and genome-wide approaches, has made it possible to examine human cancers, including melanoma, for genetic mutations, deletions, amplification, differentially regulated genes, and epigenetic changes. Advancement in current technologies is such that one can now examine ribonucleic acid (RNA), deoxyribonucleic acid (DNA), and protein directly from the patient's own tumor. Objective.—To apply these new technologies in advancing molecular diagnostics in melanoma has historically suffered from a major obstacle, namely, the scarcity of fresh frozen, morphologically defined tumor banks, annotated with clinical information. Recently, some of the new platforms have advanced to permit utilization of formalin-fixed, paraffin-embedded (FFPE) tumor specimens as starting material. Data Sources.—This article reviews the latest technologies applied to FFPE melanoma sections, narrowing its focus on the utility of transcriptional profiling, especially for melastatin; comparative genomic hybridization; BRAF and NRAS mutational analysis; and micro ribonucleic acid profiling. Conclusion.—New molecular approaches are emerging and are likely to improve the classification of melanocytic neoplasms.


2021 ◽  
Author(s):  
Jiyeon Yu ◽  
Angelica de Antonio ◽  
Elena Villalba-Mora

BACKGROUND eHealth and Telehealth play a crucial role in assisting older adults who visit hospitals frequently or who live in nursing homes and can benefit from staying at home while being cared for. Adapting to new technologies can be difficult for older people. Thus, to better apply these technologies to older adults’ lives, many studies have analyzed acceptance factors for this particular population. However, there is not yet a consensual framework to be used in further development and the search for solutions. OBJECTIVE This paper presents an Integrated Acceptance Framework (IAF) for the older user’s acceptance of eHealth, based on 43 studies selected through a systematic review. METHODS We conducted a four-step study. First, through a systematic review from 2010 to 2020 in the field of eHealth, the acceptance factors and basic data for analysis were extracted. Second, we carried out a thematic analysis to group the factors into themes to propose and integrated framework for acceptance. Third, we defined a metric to evaluate the impact of the factors addressed in the studies. Last, the differences amongst the important IAF factors were analyzed, according to the participants’ health conditions, verification time, and year. RESULTS Through the systematic review, 731 studies were founded in 5 major databases, resulting in 43 selected studies using the PRISMA methodology. First, the research methods and the acceptance factors for eHealth were compared and analyzed, extracting a total of 105 acceptance factors, which were grouped later, resulting in the Integrated Acceptance Framework. Five dimensions (i.e., personal, user-technology relational, technological, service-related, environmental) emerged with a total of 23 factors. Also, we assessed the quality of the evidence. And then, we conducted a stratification analysis to reveal the more appropriate factors depending on the health condition and the assessment time. Finally, we assess which are the factors and dimensions that are recently becoming more important. CONCLUSIONS The result of this investigation is a framework for conducting research on eHealth acceptance. To elaborately analyze the impact of the factors of the proposed framework, the criteria for evaluating the evidence from the studies that have extracted factors are presented. Through this process, the impact of each factor in the IAF has been presented, in addition to the framework proposal. Moreover, a meta-analysis of the current status of research is presented, highlighting the areas where specific measures are needed to facilitate e-Health acceptance.


2009 ◽  
Vol 10 (1) ◽  
pp. 34-40 ◽  
Author(s):  
Virginia J. Noland Dodd ◽  
Ying Li

The health education profession has made significant advances throughout the past few decades. However, health education is still described as an emerging profession. This article suggests strategies to move health education from its status as an emerging profession into that of an acknowledged profession. The authors assert that actively seeking direct third-party reimbursement will advance health education's emergence as a profession as well as increase its legitimacy in the eyes of other professions. The benefits of direct third-party reimbursement, experiences of the nursing profession's pursuit of direct third-party reimbursement, and the current status of health education are discussed. The article concludes by offering strategies for pursuing direct third-party reimbursement.


Digestion ◽  
2021 ◽  
pp. 1-7
Author(s):  
Zili Xiao ◽  
Danian Ji ◽  
Feng Li ◽  
Zhengliang Li ◽  
Zhijun Bao

<b><i>Background:</i></b> With the development of new technologies such as magnifying endoscopy with narrow band imaging, endoscopists achieved better accuracy for diagnosis of gastric cancer (GC) in various aspects. However, to master such skill takes substantial effort and could be difficult for inexperienced doctors. Therefore, a novel diagnostic method based on artificial intelligence (AI) was developed and its effectiveness was confirmed in many studies. AI system using convolutional neural network has showed marvelous results in the ongoing trials of computer-aided detection of colorectal polyps. <b><i>Summary:</i></b> With AI’s efficient computational power and learning capacities, endoscopists could improve their diagnostic accuracy and avoid the overlooking or over-diagnosis of gastric neoplasm. Several systems have been reported to achieved decent accuracy. Thus, AI-assisted endoscopy showed great potential on more accurate and sensitive ways for early detection, differentiation, and invasion depth prediction of gastric lesions. However, the feasibility, effectiveness, and safety in daily practice remain to be tested. <b><i>Key messages:</i></b> This review summarizes the current status of different AI applications in early GC diagnosis. More randomized controlled trails will be needed before AI could be widely put into clinical practice.


2020 ◽  
Vol 198 ◽  
pp. 04030
Author(s):  
Dai Yanyan ◽  
Chen Meng

With the development of new technologies such as artificial intelligence, big data, and cloud computing, the “intelligent airport” is considered to be an effective means to solve or alleviate the current industry problems such as large-scale airport business, the large number of operating entities, and the complicated operation conditions. This paper is about the collaboration between universities and enterprises based on the concept of service design. Relying on big data and cloud computing technology, this paper addresses the problems of airport service robots in inquiries, blind spots of security inspection, and full monomer smart navigation diffluence, combined with the basic technology of service robot artificial intelligence and the third-party interface to design solutions to effectively solve the problems of process.


2009 ◽  
pp. 269-283
Author(s):  
Suhong Li

The purpose of this chapter is to investigate the current status of online privacy policies of Fortune 100 Companies. It was found that 94% of the surveyed companies have posted an online privacy policy and 82% of them collect personal information from consumers. The majority of the companies only partially follow the four principles (notice, choice, access, and security) of fair information practices. For example, most of the organizations give consumers some notice and choice in term of the collection and use of their personal information. However, organizations fall short in security requirements. Only 19% of organizations mention that they have taken steps to provide security for information both during transmission and after their sites have received the information. The results also reveal that a few organizations have obtained third-party privacy seals including TRUSTe, BBBOnline Privacy, and Safe Harbor.


Sign in / Sign up

Export Citation Format

Share Document