authorized access
Recently Published Documents


TOTAL DOCUMENTS

69
(FIVE YEARS 33)

H-INDEX

4
(FIVE YEARS 2)

2021 ◽  
Vol 60 (1) ◽  
pp. 39-47
Author(s):  
Gleb A. Kochergin ◽  
Ildar N. Muratov

The paper proposes a new risk-oriented approach to the implementation of control and supervision activities in the field of regional environmental control. The issues of building a simulation model of oil spill risks assessment, implemented in the form of a digital mapof the region based on a combination of clustering methods and spatial data analysis are considered. The analysis is based on data on accidents at field oil pipelines in the license areas of Khanty-Mansi Autonomous Okrug for the period from 2014 to 2020. The result of the analysis is a digital mappublished on the Internet with authorized access and reflecting 5 levels of risk for the districts of the study area.


2021 ◽  
Vol 31 (5) ◽  
pp. 6-10
Author(s):  
Dmytro Pokryshen

Formulation of the problem. The article is devoted to the possibility of conducting centralized or regional accounting of professional development of educators, recognition of learning outcomes of various subjects of professional development. The review and analysis of the structure of the information system of accounting for professional development of educators in formal and non-formal education is made, its structural components are characterized. The purpose of its use is determined. An ER model of such a system has been designed. The system of data access and the level of its distribution are determined. Materials and methods. To achieve this goal, the following research methods were used: theoretical - analysis of legal documents relating to the system of teacher training; generalization of best practices in business documentation, accounting for issued certificates; analysis and systematization of functional responsibilities in educational institutions; diagnostic - research of structure of a database of the account of documents on passing of advanced training for the purpose of necessary structure; analysis of the activities of persons keeping records. Results. The proposed structure of the information system of accounting for professional development of educators in formal and non-formal education provides for the need to preserve information about the educator, the subject of professional development, acquired competencies and documents received. The structure of each entity is proposed, the indices and the relationship between the components are defined. The information system needs to define users and access rights. Access to the table with information on professional development of educators should be open. This is necessary so that stakeholders and other educators can see how a teacher is involved in professional development. Data entry is provided through authenticated authorized access of the employee responsible for advanced training (internship) and certification. This person has the necessary data about educators, enters this information into the database. Conclusions. The functioning of such a regional or all-Ukrainian information system for accounting for professional development of educators in formal and non-formal education will address a number of issues arising in the certification and certification of educators.


2021 ◽  
Author(s):  
Thomas Hardjono

It is time for Australia to contemplate the development for a digital marketplace data & insights that permit relevant information to be obtained by relevant parties in a timely manner, all the time preserving the privacy of individual data-subjects. The Data Exchange is a technological representation and implementation of the data & insights marketplace. The data traders entities supply and purchase data & insights from the marketplace platform. The data trader entities can be organizations, collectives, data cooperatives or individuals. The data trader parties obtain authorized access to data objects in a protected manner, where data objects include: raw data, references to data, collated data and reports, metadata and insights.


2021 ◽  
Author(s):  
Thomas Hardjono

It is time for Australia to contemplate the development for a digital marketplace data & insights that permit relevant information to be obtained by relevant parties in a timely manner, all the time preserving the privacy of individual data-subjects. The Data Exchange is a technological representation and implementation of the data & insights marketplace. The data traders entities supply and purchase data & insights from the marketplace platform. The data trader entities can be organizations, collectives, data cooperatives or individuals. The data trader parties obtain authorized access to data objects in a protected manner, where data objects include: raw data, references to data, collated data and reports, metadata and insights.


Biosensors ◽  
2021 ◽  
Vol 11 (10) ◽  
pp. 404
Author(s):  
Liuyin Yang ◽  
Arno Libert ◽  
Marc M. Van Van Hulle

With the advent of the digital age, concern about how to secure authorized access to sensitive data is increasing. Besides traditional authentication methods, there is an interest in biometric traits such as fingerprints, the iris, facial characteristics, and, recently, brainwaves, primarily based on electroencephalography (EEG). Current work on EEG-based authentication focuses on acute recordings in laboratory settings using high-end equipment, typically equipped with 64 channels and operating at a high sampling rate. In this work, we validated the feasibility of EEG-based authentication in a real-world, out-of-laboratory setting using a commercial dry-electrode EEG headset and chronic recordings on a population of 15 healthy people. We used an LSTM-based network with bootstrap aggregating (bagging) to decode our recordings in response to a multitask scheme consisting of performed and imagined motor tasks, and showed that it improved the performance of the standard LSTM approach. We achieved an authentication accuracy, false acceptance rate (FAR), and false rejection rate (FRR) of 92.6%, 2.5%, and 5.0% for the performed motor task; 92.5%, 2.6%, and 4.9% for the imagined motor task; and 93.0%, 1.9%, and 5.1% for the combined tasks, respectively. We recommend the proposed method for time- and data-limited scenarios.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Tarek Frikha ◽  
Ahmed Chaari ◽  
Faten Chaabane ◽  
Omar Cheikhrouhou ◽  
Atef Zaguia

Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection with the proposed IoT blockchain platform. The use of these devices helps us in extracting an amount of highly valuable heath data that are filtered, analyzed, and stored in electronic health records (EHRs). Different actors of the platform, coaches, patients, and doctors, collaborate to provide an on-time diagnosis and treatment for various diseases in an easy and cost-effective way. Our main purpose is to provide a distributed, secure, and authorized access to these sensitive data using the Ethereum blockchain technology. We have designed an integrated low-powered IoT blockchain platform for a healthcare application to store and review EHRs. This architecture, based on the blockchain Ethereum, includes a web and mobile application allowing the patient as well as the medical and paramedical staff to have a secure access to health information. The Ethereum node is implemented on an embedded platform, which should provide an efficient, flexible, and secure system despite the limited resources and low power consumption of the multiprocessor platform.


2021 ◽  
Vol 9 ◽  
pp. 68-77
Author(s):  
Jan Prochazka ◽  
Petr Novobilsky ◽  
Dana Prochazkova

The necessity to protect the critical infrastructure in way as the cyber-physical system (CPS) is growing with the development of communication and control technologies. The one of elemen-tary approach of protection is to close critical elements to a protected area with secure access. This principle is used in both spaces, the physical and the cyber. Access to these protected areas is then through the gateways. Gateways shall be able identify and authenticate of persons or processes with authorized access and to prevent the access of unauthorized. The presence of many moving elements (for example, trains) is the specific problem of transport infrastructures, as railway is. The security of moving elements within the CPS must therefore be ensured against both physical and cyber intrusion. We will deal with the cyber gateway of the train at this article, which is called a mobile communication gateway (MCG). The MCG is asso-ciated with problems of the standard cyber gateway and the problems specific to the moving systems. It is impossible to secure communication between train and control centrum through a closed communication system only, it must take place through open space because of extensive infrastructure with assistance of ground communication gateway (GCG). The MCG design shall ensure the security functions of the gateway as well as sufficient com-munication capacity. Our control over environmental conditions of MCG is limited because it is in open space, both physical and cyber, often in motion. The MCG therefore needs to be able to respond dynamically to environmental changes caused by deliberate attacks or unintentional changes in the system. The ability of the adaptability must be given to the MCG in design.


2021 ◽  
pp. 154-165
Author(s):  
Pavel Lozhnikov ◽  
◽  
Samal Zhumazhanova ◽  

Existing asymmetric encryption algorithms involve the storage of a secret private key, authorized access to which, as a rule, is carried out upon presentation of a password. Passwords are vulnerable to social engineering and human factors. Combining biometric security techniques with cryptography is seen as a possible solution to this problem, but any biometric cryptosystem should be able to overcome the small differences that exist between two different implementations of the same biometric parameter. This is especially true for dynamic biometrics, when differences can be caused by a change in the psychophysiological state of the subject. The solution to the problems is the use of a system based on the "biometrics-code" converter, which is configured to issue a user key after presentation of his/her biometric image. In this case, the key is generated in advance in accordance with accepted standards without the use of biometric images. The work presents results on using thermal images of a user for reliable biometric authentication based on a neural network "biometrics-code" converter. Thermal images have recently been used as a new approach in biometric identification systems and are a special type of biometric images that allow us to solve the problem of both the authentication of the subject and the identification of his psychophysiological state. The advantages of thermal imaging are that this technology is now becoming available and mobile, allowing the user to be identified and authenticated in a non-contact and continuous manner. In this paper, an experiment was conducted to verify the images of thermograms of 84 subjects and the following indicators of erroneous decisions were obtained: EER = 0.85 % for users in the "normal"state.


2021 ◽  
Author(s):  
Dhanalakshmi P. ◽  
Rajarajeswari S ◽  
Nripendra Narayan Das ◽  
Karthikeyan C ◽  
L. Chandra Sekhar Reddy ◽  
...  

Abstract In the fast-developing technological world, a large number of informational data is obtained out of different software applications and hardware sources. Data storing, sharing of data, and then processing is more effective through the cloud computing method. In practice, the issue faced is a lack of security where the user details are leaked due to the exposure of software and hardware conflict. Among different data sharing technique, cloud computing is the most convenient method to be adapted due to service satisfying features and economy. Attribute-Based-Encryption (ABE) has the potential to detect even a narrow-drawn data sharing. The drawback of the conventional attribute-based encryption (ABE) poor data security and high over-head computation. The customer side satisfaction is not achieved because of security lacking in narrow-drawn informational data sharing as well as processing. The difficulty in achieving a standardized form of data sharing is an unsolved challenge for secured data processing. The attribute-based data sharing method is more effective for secured data processing in cloud computing. Customer satisfaction can be achieved through the secured services of cloud. The customer’s data should be secured and also the customer’s data is under an authorized access. The protection of data in cloud computing includes the usage of hardware solutions for a secured data operation, provides support in data storage, access, sharing, and automated detecting of risk during data processing.


Sign in / Sign up

Export Citation Format

Share Document