scholarly journals Safe and sound: why a robust and workable data security policy is fundamental in healthcare programs

mHealth ◽  
2016 ◽  
Vol 2 ◽  
pp. 19-19
Author(s):  
Dale Jessop
2011 ◽  
Vol 187 ◽  
pp. 358-361
Author(s):  
Hua Jiang ◽  
Jing Wen

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.


2021 ◽  
Vol 102 (2) ◽  
pp. 40-49
Author(s):  
Elena Zinovieva ◽  
◽  
Valeriya Bulva ◽  

Today ensuring data security is becoming one of the priority areas of EU policy. In February 2020, the EU adopted the Data Strategy aiming at strengthening its leadership in a digital society. Although the strategy sets primarily economic goals, the problem of ensuring digital sovereignty occupies an important place. The purpose of this study is to examine the EU information security policy, starting from the concept of "Westphalian sovereignty" proposed by the S. Krasner. This concept found coverage in the works of M.M. Lebedeva. S. Krasner defines "Westphalian sovereignty" as the completeness of state power within the borders and the absence of other subjects of power. Analysis of the EU strategy in the field of information security and big data allows us to conclude that the EU emphasizes the need to limit the “Westphalian sovereignty” within the framework of an integration structure, and not individual member states. This contributes to understanding of the trends of evolution of state sovereignty in the context of globalization and the modern data revolution.


Suggestion of applicability of ISO to improve the security of company information. Elaborated through a bibliographic research to understand the concepts applied in the present work, adopting a quantitative research through a questionnaire. Research directed to professionals and university students of information technology, and to a random audience. A documentary research was also carried out to collect data in informal *institutions*. The following technical standards were adopted: NBR-ISO-27001, NBR-ISO-27002, NBR-ISO-27008, NBR-ISO-27036, with distinct characteristics and with the intention of being useful in suggesting the applicability of ISO in company procedures. It was possible to evaluate the reliability of the companies in relation to the security of their employee data. With the suggestion of applying the ISO to companies, it is possible to obtain a greater security, as well as a greater availability, with more efficient data exchange. The information security policy is established through rules, standards, and procedures, which must be used internally and externally, providing more reliability. Company employees will begin to carry out processes more efficiently within the organizations. Therefore, the suggestion of using the ISO for information security in companies becomes significantly important because it is one more contribution so that they can have rules to protect both their data and those of their employees.


2014 ◽  
Vol 912-914 ◽  
pp. 1160-1163
Author(s):  
Ning Wang

Cloud computer technology is one of current hot areas of the development of the information technology, and the data storage service based on the cloud is developing rapidly, which makes more and more enterprises and individuals enjoy the efficiency, convenience as well as low cost supplied by cloud storage. However, at the same time, the security problem of cloud storage arouses users' attention. This paper firstly expounds the basic information and system of cloud storage, then analyses the status quo of the development of cloud storage, and finally offers some preventive strategies based on cloud storage security.


Author(s):  
Yuxin Liang ◽  
Zhiyong Liu ◽  
Yong Song ◽  
Aidong Yang ◽  
Xiaozhou Ye ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
JiMin Liu ◽  
HuiQi Zhao ◽  
Chen Liu ◽  
QuanQiu Jia

The deterioration of aging population has seriously hindered the development of society. Medical cloud platform has been widely used to alleviate the pressure of aging population on social economy. Most of them collect the user’s sign information through the edge node and complete the disease prediction and diagnosis function combined with the cloud platform. However, the limited resources prevent the edge node from deploying the corresponding security policy after completing the data collection, storage, and calculation, which makes the edge data easy to be stolen. This paper proposes a security architecture of medical cloud platform based on lightweight algorithm model, which not only satisfies the needs of medical cloud platform to complete disease prediction and diagnosis accurately, but also creates a more secure edge node environment combined with other security strategies and hardware design. Finally, the prediction of cerebrovascular disease is used to verify the effectiveness of the proposed algorithm model.


Sign in / Sign up

Export Citation Format

Share Document