The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), Medical Record department (MRD) and X-Ray department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital Information System (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion...
详细信息
ISBN:
(纸本)9781424441488
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusions. However, most existing works about minimal exposure path are based on omnidirectional sensors. In contrast, this paper studies the minimal exposure path problem for directional sensor networks. We first develop a directional sensing model: directional sensitivity model. Then, we formulate the minimal exposure path problem by using two sensing intensity functions: all-sensor intensity function and maximum-sensor intensity function, and generate two weighted grids to convert the minimal exposure path problem into two discrete geometric problems. Based on the above weighted grids, we also develop two approximation algorithms to find the minimal exposure path for the directional sensitive model. We conduct extensive simulations to validate and evaluate our proposed models and algorithms.
The current researches and industries are looking forward to integrate different technologies to get a global technology that offers all of the intended services in a simple way. In this paper, a new communications sy...
详细信息
The current researches and industries are looking forward to integrate different technologies to get a global technology that offers all of the intended services in a simple way. In this paper, a new communications system is proposed to integrate the use of GSM over the available satellites infrastructures. The proposed communications system could be used to facilitates and get benefits of both systems (the GSM and Satellites) to achieve competitive services over the world. The proposed system is concentrated on a global communications system that served all over the world and gives some specialization and privacy for each country. Furthermore, this paper shows an algorithm on how to implement the GSM over satellite systems in an efficient, flexible, and cost-effective manner.
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con...
详细信息
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud reso...
详细信息
ISBN:
(纸本)9781424446469;9780769537559
Cloud resource providers in a market face dynamic and unpredictable consumer behavior. The way, how prices are set in a dynamic environment, can influence the demand behavior of price sensitive customers. A cloud resource provider has to decide on how to allocate his scarce resources in order to maximize his profit. The application of bid price control for evaluating incoming service requests is a common approach for capacity control in network revenue management. In this paper we introduce a customized version of the concept of self-adjusting bid prices and apply it to the area of cloud computing. Furthermore, we perform a simulation in order to test the efficiency of the proposed model.
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directl...
详细信息
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directly be applied to databases because the data on the Internet and database are in different forms. So keyword search systems in relational databases have recently proposed. However existing systems limit type of keywords to database value terms, and generally assumed that answers are in instance level. Thus, this research aims to propose an effective approach for free-form keyword searching in databases which allows users to search either with database value terms, metadata terms or user terms. The metadata model accommodates these terms as well as underlying database semantics. Moreover, we present a branch and bound algorithm used for finding the optimal answer graphs. Our preliminary experiment results confirm precision of our approach.
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant vo...
详细信息
Assessing softwareengineering course projects should evaluate the achievement of proposed goals, as well as the compliance with mandated standards and processes. This might require the examination of a significant volume of materials, following a consistent, repetitive and effective procedure, even for small projects. Quality assurance must be performed according to similar requirements. This paper discusses the use of quality audits, a comprehensive quality assurance procedure, as a tool for the assessment of course projects.
This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both...
详细信息
This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both mobile servers and lightweight mobile agents. We aim to design a data gathering system using a special kind of mobile agent called TinyBee to collect data all over a network. TinyBee migrates from node to node after being dispatched from a mobile server in order to collect data so that physical movement of mobile servers is greatly reduced. Mobile-agent-based approaches outperform traditional client/server paradigms in terms of execution time and power consumption. Extensive simulation results demonstrate that our proposed schemes achieve significant performance gains.
With the ongoing trend towards the globalization of softwaresystems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs ...
详细信息
ISBN:
(纸本)9781424445257
With the ongoing trend towards the globalization of softwaresystems and their development, components in these systems might not only work together, but may end up evolving independently from each other. Modern IDEs have started to incorporate support for these highly distributed environments, by adding new collaborative features. As a result, assessing and controlling system quality (e.g. security concerns) during system evolution in these highly distributed systems become a major challenge. In this research, we introduce a unified ontological representation that integrates best security practices in a context-aware tool implementation. As part of our approach, we integrate information from traditional static source code analysis with semantic rich structural information in a unified ontological representation. We illustrate through several use cases how our approach can support the evolvability of softwaresystems from a security quality perspective.
Over the last decades, softwareengineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct result of the Internet. The introduction o...
详细信息
Over the last decades, softwareengineering processes have constantly evolved to reflect cultural, social, technological, and organizational changes, which are often a direct result of the Internet. The introduction of the Web 2.0 resulted in further changes creating an interactive, community driven platform. However, these ongoing changes have yet to be reflected in the way we document softwaresystems. Documentation generators, like Doxygen and its derivatives (Javadoc, Natural Docs, etc.) have become the de-facto industry standards for creating external technical software documentation from source code. However, the inter-woven representation of source code and documentation within a source code editor limits the ability of these approaches to provide rich media, internationalization, and interactive content. In this paper, we combine the functionality of a Web browser with a source code editor to provide source code documentation with rich media content. The paper presents our fully functional implementation of the editor within the Eclipse framework.
暂无评论