Security Test by using F T M and Data Allocation Strategies on Leakage Detection

2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.

Author(s):  
GIRISH SHANKAR ◽  
SOMESHWAR DHAYALAN ◽  
ASHISH ANAND

Leaking of confidential data to an unauthorized agent is a major concern for an organization. In this article we seek to detect the trusted node that leaks the confidential data to an unauthorized agent. Traditionally, leakage of data is handled by water marking technique which requires data modification. If the watermarked copy is found at some unauthorized site then distributor can claim his ownership. But one of the issues with watermarking method is data modification. To overcome the disadvantages of using watermark, data allocation strategies are used to improve the probability of identifying guilty third parties. The idea is to distribute the data intelligently to agents based on sample data request and explicit data request in order to improve the chance of detecting the guilty agents. Modern business activities also rely on extensive email exchange. Email leakages have become widespread, and the severe damage caused by such leakages constitutes a disturbing problem for organizations. Hence, filtering of E-mails is also necessary. This can be done by blocking E-mails which contains images, videos or sensitive data and filtering the text file of an organization.


Author(s):  
VIRGINIE MARION-POTY ◽  
SERGE MIGUET

This paper discusses several data allocation strategies used for the parallel implementation of basic imaging operators. It shows that depending on the operator (sequential or parallel, with regular or irregular execution time), the image data must be partitioned in very different manners: The square sub-domains are best adapted for minimizing the communication volume, but rectangles can perform better when we take into account the time for constructing messages. Block allocations are well adapted for inherently parallel operators since they minimize interprocessor interactions, but in the case of recursive operators, they lead to nearly sequential executions. In this framework, we show the usefulness of block-cyclic allocations. Finally, we illustrate the fact that allocating the same amount of image data to each processor can lead to severe load imbalance in the case of some operators with data-dependant execution times.


2021 ◽  
Vol 18 (4) ◽  
pp. 22-34
Author(s):  
Lyubov Yu. Arkhangelskaya ◽  
Viktor N. Salin

Factoring is a fairly new way for Russia to finance the accounts payable and receivable of business structures by specialized companies or credit institutions and their divisions (Factors) against the assignment of claims against one of the parties (buyer or seller) of a sale and purchase transaction of products or property to a third party (Factor) is currently developing at a high pace. On average, according to sample data for 2011 -2019 the annual growth rate of the volumes of financing of accounts payable and receivable of companies in Russia due to factoring operations increased by 20%, which in absolute terms amounted to 303.3 billion rubles, and reached by 2019 - 3.5 trillion rubles.However, there is still no established definition of this economic category in the Civil Code of the Russian Federation. In the scientific and educational foreign and domestic literature there are somewhat contradictory interpretations of the classifications of the types of factoring, there is no legislatively established system of statistical indicators characterizing this segment of the financial intermediation services market. The lack of a developed regulatory framework for regulating relations in this market segment slows down its development, necessitates improving both Russian legislation and methodological support for a comprehensive statistical analysis of the state and development of this market segment. In this regard, the purpose of this study is to develop a methodology for a comprehensive statistical analysis of the market segment of financial intermediation services, to determine the prevailing sectoral, territorial and types of proportions related to the scale of business of the parties to the factoring agreement in this market segment using the statistical methodology for analyzing the series of dynamics and attributive groupings of the main indicators characterizing the state and development of the Russian factoring market. Based on the theoretical analysis, the author’s interpretation of the content of the economic category “factoring” is given, a system of indicators is proposed that characterizes factoring as a type of financial intermediation services (object of research), based on the development of the Association of factoring companies, Rosstat, expert agencies (for example, “Expert RA”); the features of the formation of statistical groupings (series: attributive, variation, dynamics) for various purposes of analyzing the market of factoring services are revealed, the author’s method of complex statistical analysis of any segment of the financial intermediation services market, which is the subject of research, is presented. The results of approbation of the methodology for a comprehensive statistical analysis of the Russian factoring market based on sample data for 2011 – 2019 are presented, conclusions are drawn about the dynamics of the main indicators of the factoring market development, structural shifts and changes in proportions in this market segment, a forecast of expected changes in the Russian factoring market for  2021 is made, incl. and influenced by the Covid-19 pandemic.The results of this study are aimed at developing a methodology for a comprehensive statistical analysis of factoring as a segment of the financial intermediation services market, including for the purposes of international comparisons of indicators of the state and development of the Factors and their clients.They can be useful to the professional community of factoring companies (Factors), business structures - consumers of factoring services, and also be used in educational activities in the preparation of financial specialists in economic universities of the country.


Author(s):  
Elizabeth Fife ◽  
Laura Hosman

This paper analyses the recent phenomenon of private/public partnerships (PPPs) in the ICT sector of the developing world. The partners may come to these projects with divergent motivations: profit on the one hand and the provision of public services on the other, but at the end of the day, the interests of the partners that are symbiotic can – and indeed should – be aligned to ensure successful long-term projects. To investigate what can be done to promote successful and sustainable PPPs, this paper extends the traditional two-actor analysis to include both a third-party non-profit-oriented facilitating organization and the technology recipients that are the targets of these projects. Following an overview of the current state of PPPs in the developing world, the paper provides two case studies, based in Vietnam, where all four of the above-mentioned stakeholders were involved. The cases reveal important success factors that can be applied to future PPPs in the ICT sector.


2018 ◽  
Vol 25 (4) ◽  
pp. 1398-1411 ◽  
Author(s):  
Vishal Patel

The electronic sharing of medical imaging data is an important element of modern healthcare systems, but current infrastructure for cross-site image transfer depends on trust in third-party intermediaries. In this work, we examine the blockchain concept, which enables parties to establish consensus without relying on a central authority. We develop a framework for cross-domain image sharing that uses a blockchain as a distributed data store to establish a ledger of radiological studies and patient-defined access permissions. The blockchain framework is shown to eliminate third-party access to protected health information, satisfy many criteria of an interoperable health system, and readily generalize to domains beyond medical imaging. Relative drawbacks of the framework include the complexity of the privacy and security models and an unclear regulatory environment. Ultimately, the large-scale feasibility of such an approach remains to be demonstrated and will depend on a number of factors which we discuss in detail.


PEDIATRICS ◽  
1975 ◽  
Vol 56 (2) ◽  
pp. 329-329 ◽  
Author(s):  
Hugh C. Thompson ◽  
Stanton J. Barron ◽  
John P. Connelly ◽  
Andrew Margileth ◽  
Richard Olmsted ◽  
...  

Historically, medical records have been maintamed by individual physicians to record specific information concerning patients. This information was often understandable only to the writer. The data were of outstanding events. This was thought to be sufficient documentation for patient care. Records are now read by others than the individual physicians. Groups of physicians working together often share the same patients and their records. Patients may have multiple sources of care. Our population has become more mobile which makes it necessary to transfer vast amounts of medical information. The medical record many times is the one instrument which gives a complete and continuous documentation of the patient's medical history. Third-party payers are requesting access to medical records to document services provided. Chart audit is being tested as a mechanism for evaluating physician performance. Records must reflect what the physician does in order to be useful in such an appraisal. Much clinical research on the delivery of health care depends on accurately kept records which are easily interpreted. A chart is also a legal document for the protection of the physician as well as the patient. Thus, records will be used in other than traditional ways. Proper confidentiality must be maintained when such uses are necessary. Physicians generally agree as to the essential content of a medical record. However, there is little unanimity as to the structure of the chart. No one system of keeping records is now appropriate for all situations. The maintenance of adequate charts requires additional cost in both time and money.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing is expanding in reach, with its utility-based features and enhanced agility. Still, there is a big concern about the privacy and security of the data. Because of these concerns, third-party cloud users are employing the cloud only for less sensitive data, and the advantage of cloud computing is not fully harnessed. In order to ensure the privacy and security of data, proper compliance and regulatory standards become very important for the cloud domain. Although a number of such standards exist for the traditional computing, they must be modified for their wider adoption to the cloud platforms. This chapter considers the worldwide available standards in the technical and non-technical categories for wider coverage of the cloud platforms. In the technical category, security standards presently followed by cloud computing have been discussed, while in the non-technical category, privacy and accounting standards like HIPPA, SAS 70, GAPP, etc. have been considered.


Author(s):  
Maria N. Koukovini ◽  
Eugenia I. Papagiannakopoulou ◽  
Georgios V. Lioudakis ◽  
Nikolaos L. Dellas ◽  
Dimitra I. Kaklamani ◽  
...  

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.


Sign in / Sign up

Export Citation Format

Share Document