scholarly journals Build Encrypted Interconnection Networks by application of IP Security and Mac Address Filtering Authentication Methods: بناء شبكات ربط مشفرة من خلال تطبيق أساليب مصادقة أمان IP وتصفية عنوان Mac

Author(s):  
Jouma Ali AlMohamad Jouma Ali AlMohamad

To improve the security in data networks we use of IP Security and MAC Address Filtering authentication methods on network devices is very useful to be able to protect, verify and filter company data especially if data contain sensitive information like credit cards while using public data network. IP Security authentication provides integrity between connections, then Filtering MAC Address can help the router task to be able recognize users on the network, So that expected the combination between IP Security and Mac Address Filtering will provide security for every transfer and receive data from Headquarter to branch office, then the company doesn't have to worry about data package being robbed or manipulated by the unauthorized parties.

1992 ◽  
pp. 11-22
Author(s):  
Josef Pužman ◽  
Boris Kubín
Keyword(s):  

1979 ◽  
Vol 18 (2) ◽  
pp. 223-243 ◽  
Author(s):  
J. R. Halsey ◽  
L. E. Hardy ◽  
L. F. Powning
Keyword(s):  

2019 ◽  
Author(s):  
Ho Heon Kim ◽  
Bora Kim ◽  
Segyeong Joo ◽  
Soo-Yong Shin ◽  
Hyo Soung Cha ◽  
...  

BACKGROUND There has been significant effort in attempting to use health care data. However, laws that protect patients’ privacy have restricted data use because health care data contain sensitive information. Thus, discussions on privacy laws now focus on the active use of health care data beyond protection. However, current literature does not clarify the obstacles that make data usage and deidentification processes difficult or elaborate on users’ needs for data linking from practical perspectives. OBJECTIVE The objective of this study is to investigate (1) the current status of data use in each medical area, (2) institutional efforts and difficulties in deidentification processes, and (3) users’ data linking needs. METHODS We conducted a cross-sectional online survey. To recruit people who have used health care data, we publicized the promotion campaign and sent official documents to an academic society encouraging participation in the online survey. RESULTS In total, 128 participants responded to the online survey; 10 participants were excluded for either inconsistent responses or lack of demand for health care data. Finally, 118 participants’ responses were analyzed. The majority of participants worked in general hospitals or universities (62/118, 52.5% and 51/118, 43.2%, respectively, multiple-choice answers). More than half of participants responded that they have a need for clinical data (82/118, 69.5%) and public data (76/118, 64.4%). Furthermore, 85.6% (101/118) of respondents conducted deidentification measures when using data, and they considered rigid social culture as an obstacle for deidentification (28/101, 27.7%). In addition, they required data linking (98/118, 83.1%), and they noted deregulation and data standardization to allow access to health care data linking (33/98, 33.7% and 38/98, 38.8%, respectively). There were no significant differences in the proportion of responded data needs and linking in groups that used health care data for either public purposes or commercial purposes. CONCLUSIONS This study provides a cross-sectional view from a practical, user-oriented perspective on the kinds of data users want to utilize, efforts and difficulties in deidentification processes, and the needs for data linking. Most users want to use clinical and public data, and most participants conduct deidentification processes and express a desire to conduct data linking. Our study confirmed that they noted regulation as a primary obstacle whether their purpose is commercial or public. A legal system based on both data utilization and data protection needs is required.


Author(s):  
P. Durgaprasad ◽  
K. Kranthi Kumar

<p>The named data network is a new technology in routing were its forwarding plane helps us to recover the data on its own when the network failures occur.in this NDN the major issue are when the data is sent from one network to the other the data flow is not stable. By major survey we came to know that routing protocols plays a major role for the stable and scalable data flow. This routing protocols and be classified by forwarding process and also network topologies were the protocols have the data that can be retrieved back whenever the network faults occur. In this paper we proposed that hybrid flow architecture, network topologies and routing protocols are improved to get the stable and scalable routing when the data flow is interrupted.</p>


Sign in / Sign up

Export Citation Format

Share Document