authorization control
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 7)

H-INDEX

4
(FIVE YEARS 0)

F1000Research ◽  
2021 ◽  
Vol 10 ◽  
pp. 901
Author(s):  
Olaosebikan Tahir Yinka ◽  
Su-Cheng Haw ◽  
Timothy Tzen Vun Yap ◽  
Samini Subramaniam

Introduction: Unauthorized access to data is one of the most significant privacy issues that hinder most industries from adopting big data technologies. Even though specific processes and structures have been put in place to deal with access authorization and identity management for large databases nonetheless, the scalability criteria are far beyond the capabilities of traditional databases. Hence, most researchers are looking into other solutions, such as big data management. Methods: In this paper, we firstly study the strengths and weaknesses of implementing cryptography and blockchain for identity management and authorization control in big data, focusing on the healthcare domain. Subsequently, we propose a decentralized data access and sharing system that preserves privacy to ensure adequate data access management under the blockchain. In addition, we designed a blockchain framework to resolve the decentralized data access and sharing system privacy issues, by implementing a public key infrastructure model, which utilizes a signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed blockchain model to previous techniques to see how well it performed. Results: We evaluated the blockchain on four performance metrics which include throughput, latency, scalability, and security. The proposed blockchain model was tested using a sample of 5000 patients and 500,000 observations. The performance evaluation results further showed that the proposed model achieves higher throughput and lower latency compared to existing approaches when the workload varies up to 10,000 transactions. Discussion: This research reviews the importance of blockchains as they provide infinite possibilities to individuals, companies, and governments.


F1000Research ◽  
2021 ◽  
Vol 10 ◽  
pp. 901
Author(s):  
Olaosebikan Tahir Yinka ◽  
Su-Cheng Haw ◽  
Timothy Tzen Vun Yap ◽  
Samini Subramaniam

Introduction: Unauthorized access to data is one of the most significant privacy issues that hinder most industries from adopting big data technologies. Even though specific processes and structures have been put in place to deal with access authorization and identity management for large databases nonetheless, the scalability criteria are far beyond the capabilities of traditional databases. Hence, most researchers are looking into other solutions, such as big data management. Methods: In this paper, we firstly study the strengths and weaknesses of implementing cryptography and blockchain for identity management and authorization control in big data, focusing on the healthcare domain. Subsequently, we propose a decentralized data access and sharing system that preserves privacy to ensure adequate data access management under the blockchain. In addition, we designed a blockchain framework to resolve the decentralized data access and sharing system privacy issues, by implementing a public key infrastructure model, which utilizes a signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed blockchain model to previous techniques to see how well it performed. Results: We evaluated the blockchain on four performance metrics which include throughput, latency, scalability, and security. The proposed blockchain model was tested using a sample of 5000 patients and 500,000 observations. The performance evaluation results further showed that the proposed model achieves higher throughput and lower latency compared to existing approaches when the workload varies up to 10,000 transactions. Discussion: This research reviews the importance of blockchains as they provide infinite possibilities to individuals, companies, and governments.


F1000Research ◽  
2021 ◽  
Vol 10 ◽  
pp. 901
Author(s):  
Olaosebikan Tahir Yinka ◽  
Su-Cheng Haw ◽  
Timothy Tzen Vun Yap ◽  
Samini Subramaniam

Introduction Unauthorized access to data is one of the most significant privacy issues that hinder most industries from adopting big data technologies. Even though specific processes and structures have been put in place to deal with access authorization and identity management for large databases nonetheless, the scalability criteria are far beyond the capabilities of traditional databases. Hence, most researchers are looking into other solutions, such as big data management. Methods In this paper, we firstly study the strengths and weaknesses of implementing cryptography and blockchain for identity management and authorization control in big data, focusing on the healthcare domain. Subsequently, we propose a decentralized data access and sharing system that preserves privacy to ensure adequate data access management under the blockchain. In addition, we designed a blockchain framework to resolve the decentralized data access and sharing system privacy issues, by implementing a public key infrastructure model, which utilizes a signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed blockchain model to previous techniques to see how well it performed. Results We evaluated the blockchain on four performance metrics which include throughput, latency, scalability, and security. The proposed blockchain model was tested using a sample of 5000 patients and 500,000 observations. The performance evaluation results further showed that the proposed model achieves higher throughput and lower latency compared to existing approaches when the workload varies up to 10,000 transactions. Discussion This research reviews the importance of blockchains as they provide infinite possibilities to individuals, companies, and governments.


2020 ◽  
Vol 23 (1) ◽  
pp. 169-182
Author(s):  
Khom Raj Kharel ◽  
Suman Kharel

Local governments are the closest administrative units which deliver public services to the grassroots level of citizens. Local governments enhance the access of services to the citizens. Effectiveness of budget implementation depends on the absorptive capacity of local governments and local level transparency in their affairs. The effectiveness of budget implementation is measured in terms mobilization of local resources and development of surrounding. Through the local resource mobilization, countries accelerate their economic growth by raising and spending their own funds for public goods and services such as schools, hospitals, clean water, electricity and roads. Local government investment in their own public goods and services in infrastructure is also essential for attracting private investment and laying the foundation of long term economic growth. The Constitution of Nepal 2015 defines Nepal as a federal democratic republic organized three level governments as federal, province and local. Local governments are the development partners to the central government need to mobilize enough revenue locally to support the central government development agenda. Inadequate financial resources can undermine the effective implementation of developmental projects in Nepal. Budgets are important as they prudential manage scarce financial resources and at the same time serve as a means of expenditure authorization, control and evaluation base.


passer ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 187-193
Author(s):  
Nigar Mahmoud Shafiq ◽  
Mohammed Y. Shakor

The global spread of Covid-19 has enhanced the adoption of virtual education and the use of technology in order to reduce the risk of contagion. Recently, the academics have turn out to be more technology-orientated and the educational establishments continue to seek opportunities in order to adopt an environment where all researchers could have access to high-quality scientific resources at anytime and anywhere in the world. Cloud computing is a model, which provides the users with services and application software on-demand, using the Internet. While the use of cloud computing applications is growing, there are ongoing research challenges related to guaranteeing security, privacy and the integration of the cloud applications. To the extent of our knowledge, the present study is the first from this type to thoroughly present the impacts of the COVID-19 pandemic on cloud computing environment in higher education institutions in Iraqi universities. This study will critically analysis the views of the faculty staff and researchers in Iraqi universities on cloud computing. It also tries to take a quick look at how Iraqi university staff responded to the epidemic in terms of research activities. The results shows that about 99% of the respondents considered the cloud applications to have great role in encouraging the research works in their institutes. Concerning the benefits of cloud services, the availability and saving cost were selected as most important factors that encouraging the adoption of cloud services. On the other hand, issues related to performance, lack of user control were selected as major problems in applying cloud services in Iraqi institutions Finally, it can be concluding that reducing the risks of the security, authorization, control and providing better performance of cloud services can enhance the use of cloud applications by researchers at Iraqi universities.


2018 ◽  
Vol 87 ◽  
pp. 712-724 ◽  
Author(s):  
Zehong Chen ◽  
Fangguo Zhang ◽  
Peng Zhang ◽  
Joseph K. Liu ◽  
Jiwu Huang ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-8 ◽  
Author(s):  
Marcelo Antonio de Carvalho Junior ◽  
Paulo Bandiera-Paiva

Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.


2014 ◽  
Vol 989-994 ◽  
pp. 4342-4345
Author(s):  
An Ming Hu

Lightweight J2EE framework to actually use efficiency, has been widely used in all kinds of information system development,However ,Spring is open source framework, its security and access control has been problem of concern,How to construct safe and effective Web applications, is the development process of the important link must be thinking。Based on the Spring frame structure technology on the basis of summing up the access authorization control methods and strategies, highlights the Spring framework in the development process of the advantage technology.


Sign in / Sign up

Export Citation Format

Share Document