Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 198
Filtrar
3.
PLoS One ; 16(11): e0260014, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34843485

RESUMEN

Current image encryption methods have many shortcomings for the medical image encryption with high resolution, strong correlation and large storage space, and it is difficult to obtain reliable clinically applicable medical images. Therefore, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. And the dynamic analysis of the phase diagram and bifurcation diagram of the five-dimensional three-leaf chaotic system selected in this paper is carried out, and NIST is used to test the randomness of its chaotic sequence. This algorithm follows the diffusion-scrambling framework, especially using the principle of DNA recombination combined with the five-dimensional three-leaf chaotic system to generate a chaotic matrix that participates in the operation. The bit-level DNA mutation operation is introduced in the diffusion, and the scrambling and diffusion effects have been further improved. Algorithm security and randomness have been enhanced. This paper evaluates the efficiency of this algorithm for medical image encryption in terms of security analysis and time performance. Security analysis is carried out from key space, information entropy, histogram, similarity between decrypted image and original image, PSNR, correlation, sensitivity, noise attack, cropping attack and so on. Perform time efficiency analysis from the perspective of time performance. The comparison between this algorithm and the experimental results obtained by some of the latest medical image encryption algorithms shows that this algorithm is superior to the existing medical image encryption algorithms to a certain extent in terms of security and time efficiency.


Asunto(s)
Procesamiento de Imagen Asistido por Computador/métodos , Algoritmos , Seguridad Computacional/tendencias , Difusión , Entropía , Modelos Teóricos , Dinámicas no Lineales
4.
PLoS One ; 16(10): e0258091, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34624046

RESUMEN

Quantum signature is the use of the principles of quantum computing to establish a trusted communication between two parties. In this paper, a quantum signature scheme using amplitude amplification techniques will be proposed. To secure the signature, the proposed scheme uses a partial diffusion operator and a diffusion operator to hide/unhide certain quantum states during communication. The proposed scheme consists of three phases, preparation phase, signature phase and verification phase. To confuse the eavesdropper, the quantum states representing the signature might be hidden, not hidden or encoded in Bell states. It will be shown that the proposed scheme is more secure against eavesdropping when compared with relevant quantum signature schemes.


Asunto(s)
Seguridad Computacional/tendencias , Metodologías Computacionales , Confidencialidad/normas , Algoritmos , Comunicación , Humanos , Teoría Cuántica , Confianza
5.
Am J Nurs ; 121(10): 46-50, 2021 10 01.
Artículo en Inglés | MEDLINE | ID: mdl-34554984

RESUMEN

ABSTRACT: Advances in medical device technology have led to greater connectivity with other devices, networks, and systems, raising concerns about associated security risks. Many clinicians, as well as the patients who rely on these lifesaving devices, are unaware of these risks and how they can be mitigated. This article describes several types of cyberattacks, including medjacking, hacking, and ransomware, and what nurses can do to guard against security threats and educate patients.


Asunto(s)
Seguridad Computacional/tendencias , Equipos y Suministros/normas , Tecnología Inalámbrica/tendencias , Presión de las Vías Aéreas Positiva Contínua , Humanos , Invenciones , Rol de la Enfermera , Marcapaso Artificial , Educación del Paciente como Asunto , Dispositivos Electrónicos Vestibles
6.
PLoS One ; 16(8): e0256223, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34415945

RESUMEN

Cryptographic cloud storage is used to make optimal use of the cloud storage infrastructure to outsource sensitive and mission-critical data. The continuous growth of encrypted data outsourced to cloud storage requires continuous updating. Attacks like file-injection are reported to compromise confidentiality of the user as a consequence of information leakage during update. It is required that dynamic schemes provide forward privacy guarantees. Updates should not leak information to the untrusted server regarding the previously issued queries. Therefore, the challenge is to design an efficient searchable encryption scheme with dynamic updates and forward privacy guarantees. In this paper, a novel private multi-linked dynamic index for encrypted document retrieval namely Pindex is proposed. The multi-linked dynamic index is constructed using probabilistic homomorphic encryption mechanism and secret orthogonal vectors. Full security proofs for correctness and forward privacy in the random oracle model is provided. Experiments on real world Enron dataset demonstrates that our construction is practical and efficient. The security and performance analysis of Pindex shows that the dynamic multi-linked index guarantees forward privacy without significant loss of efficiency.


Asunto(s)
Indización y Redacción de Resúmenes/normas , Nube Computacional/tendencias , Seguridad Computacional/tendencias , Algoritmos , Confidencialidad/normas , Humanos , Servicios Externos/normas , Privacidad , Registros
8.
PLoS One ; 16(4): e0250593, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-33905444

RESUMEN

The tiny encryption algorithm (TEA) is widely used when performing dissipative particle dynamics (DPD) calculations in parallel, usually on distributed memory systems. In this research, we reduced the computational cost of the TEA hash function and investigated the influence of the quality of the random numbers generated on the results of DPD calculations. It has already been established that the randomness, or quality, of the random numbers depend on the number of processes from internal functions such as SHIFT, XOR and ADD, which are commonly referred to as "rounds". Surprisingly, if we choose seed numbers from high entropy sources, with a minimum number of rounds, the quality of the random numbers generated is sufficient to successfully perform accurate DPD simulations. Although it is well known that using a minimal number of rounds is insufficient for generating high-quality random numbers, the combination of selecting good seed numbers and the robustness of DPD simulations means that we can reduce the random number generation cost without reducing the accuracy of the simulation results.


Asunto(s)
Inteligencia Artificial/tendencias , Seguridad Computacional/tendencias , Simulación por Computador , Algoritmos , Entropía
9.
PLoS One ; 16(4): e0250205, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-33901206

RESUMEN

Satellite communication has played an important part in many different industries because of its advantages of wide coverage, strong disaster tolerance and high flexibility. The security of satellite communication systems has always been the concern of many scholars. Without authentication, user should not obtain his/her required services. Beyond that, the anonymity also needs to be protected during communications. In this study, we design an efficient and provably secure key agreement scheme for satellite communication systems. In each session, we replace user's true identity by a temporary identity, which will be updated for each session, to guarantee the anonymity. Because the only use of lightweight algorithms, our proposed scheme has high performance. Furthermore, the security of the proposed scheme is proved in the real-or-random model and the performance analysis shows that the proposed scheme is more efficient than some other schemes for satellite communication systems.


Asunto(s)
Seguridad Computacional/normas , Seguridad Computacional/tendencias , Comunicaciones por Satélite/tendencias , Algoritmos , Comunicación , Seguridad Computacional/estadística & datos numéricos , Confidencialidad , Humanos , Industrias , Sistemas de Información/economía , Sistemas de Información/tendencias , Comunicaciones por Satélite/economía , Telemedicina
10.
Hypertension ; 77(4): 1029-1035, 2021 04.
Artículo en Inglés | MEDLINE | ID: mdl-33583200

RESUMEN

The General Data Protection Regulation (GDPR) became binding law in the European Union Member States in 2018, as a step toward harmonizing personal data protection legislation in the European Union. The Regulation governs almost all types of personal data processing, hence, also, those pertaining to biomedical research. The purpose of this article is to highlight the main practical issues related to data and biological sample sharing that biomedical researchers face regularly, and to specify how these are addressed in the context of GDPR, after consulting with ethics/legal experts. We identify areas in which clarifications of the GDPR are needed, particularly those related to consent requirements by study participants. Amendments should target the following: (1) restricting exceptions based on national laws and increasing harmonization, (2) confirming the concept of broad consent, and (3) defining a roadmap for secondary use of data. These changes will be achieved by acknowledged learned societies in the field taking the lead in preparing a document giving guidance for the optimal interpretation of the GDPR, which will be finalized following a period of commenting by a broad multistakeholder audience. In parallel, promoting engagement and education of the public in the relevant issues (such as different consent types or residual risk for re-identification), on both local/national and international levels, is considered critical for advancement. We hope that this article will open this broad discussion involving all major stakeholders, toward optimizing the GDPR and allowing a harmonized transnational research approach.


Asunto(s)
Investigación Biomédica , Seguridad Computacional , Registros de Salud Personal/ética , Difusión de la Información , Investigación Biomédica/ética , Investigación Biomédica/legislación & jurisprudencia , Seguridad Computacional/legislación & jurisprudencia , Seguridad Computacional/tendencias , Europa (Continente) , Humanos , Difusión de la Información/legislación & jurisprudencia , Difusión de la Información/métodos
11.
J Am Med Inform Assoc ; 28(5): 948-954, 2021 04 23.
Artículo en Inglés | MEDLINE | ID: mdl-33585936

RESUMEN

Clinicians often attribute much of their burnout experience to use of the electronic health record, the adoption of which was greatly accelerated by the Health Information Technology for Economic and Clinical Health Act of 2009. That same year, AMIA's Policy Meeting focused on possible unintended consequences associated with rapid implementation of electronic health records, generating 17 potential consequences and 15 recommendations to address them. At the 2020 annual meeting of the American College of Medical Informatics (ACMI), ACMI fellows participated in a modified Delphi process to assess the accuracy of the 2009 predictions and the response to the recommendations. Among the findings, the fellows concluded that the degree of clinician burnout and its contributing factors, such as increased documentation requirements, were significantly underestimated. Conversely, problems related to identify theft and fraud were overestimated. Only 3 of the 15 recommendations were adjudged more than half-addressed.


Asunto(s)
Agotamiento Profesional , Seguridad Computacional/tendencias , Registros Electrónicos de Salud/tendencias , Predicción , Informática Médica , Sociedades Médicas , Técnica Delphi , Fraude/tendencias , Humanos , Estudios Retrospectivos , Estados Unidos
12.
Yakugaku Zasshi ; 141(2): 187-191, 2021.
Artículo en Japonés | MEDLINE | ID: mdl-33518638

RESUMEN

In September 2015, "the Act on the Protection of Personal Information" was amended. Accordingly, "the Ethical Guidelines for Medical Research Involving Human Subjects" were also amended. "The Act on Anonymized Medical Data That Are Meant to Contribute to Research and Development in the Medical Field," which came into effect in May 2018, aims to collect and utilize medical information of each patient from medical institutions for the purpose of research and development in the medical field. Thus, the rules of personal information that need to be followed are changing considerably in the balance between importance of protection and utilization for medical development. Therefore, health care professionals and researchers are required to fully understand the current situation and the future.


Asunto(s)
Seguridad Computacional/ética , Seguridad Computacional/tendencias , Confidencialidad/ética , Confidencialidad/tendencias , Instituciones de Salud , Seguridad Computacional/legislación & jurisprudencia , Confidencialidad/legislación & jurisprudencia , Humanos
13.
PLoS One ; 16(2): e0246293, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-33529188

RESUMEN

Eliminating unnecessary exposure is a principle of server security. The huge IPv6 address space enhances security by making scanning infeasible, however, with recent advances of IPv6 scanning technologies, network scanning is again threatening server security. In this paper, we propose a new model named addressless server, which separates the server into an entrance module and a main service module, and assigns an IPv6 prefix instead of an IPv6 address to the main service module. The entrance module generates a legitimate IPv6 address under this prefix by encrypting the client address, so that the client can access the main server on a destination address that is different in each connection. In this way, the model provides isolation to the main server, prevents network scanning, and minimizes exposure. Moreover it provides a novel framework that supports flexible load balancing, high-availability, and other desirable features. The model is simple and does not require any modification to the client or the network. We implement a prototype and experiments show that our model can prevent the main server from being scanned at a slight performance cost.


Asunto(s)
Seguridad Computacional/tendencias , Almacenamiento y Recuperación de la Información/métodos , Algoritmos , Computadores , Humanos , Internet , Programas Informáticos
14.
Am J Nurs ; 121(2): 18, 2021 02 01.
Artículo en Inglés | MEDLINE | ID: mdl-33497116
16.
Accid Anal Prev ; 148: 105837, 2020 Dec.
Artículo en Inglés | MEDLINE | ID: mdl-33120180

RESUMEN

Modern-day Connected and Autonomous Vehicles (CAVs) with more than 100 million code lines, running up-to a hundred Electronic Control Units (ECUs) will create and exchange digital information with other vehicles and intelligent transport networks. Consequently, ubiquitous internal and external communication (controls, commands, and data) within all CAV-related nodes is inevitably the gatekeeper for the smooth operation. Therefore, it is a primary vulnerable area for cyber-attacks that entails stringent and efficient measures in the form of "cybersecurity". There is a lack of systematic and comprehensive review of the literature on cyber-attacks on the CAVs, respective mitigation strategies, anticipated readiness, and research directions for the future. This study aims to analyse, synthesise, and interpret critical areas for the roll-out and progression of CAVs in combating cyber-attacks. Specifically, we described in a structured way a holistic view of potentially critical avenues, which lies at the heart of CAV cybersecurity research. We synthesise their scope with a particular focus on ensuring effective CAVs deployment and reducing the probability of cyber-attack failures. We present the CAVs communication framework in an integrated form, i.e., from In-Vehicle (IV) communication to Vehicle-to-Vehicle (V2X) communication with a visual flowchart to provide a transparent picture of all the interfaces for potential cyber-attacks. The vulnerability of CAVs by proximity (or physical) access to cyber-attacks is outlined with future recommendations. There is a detailed description of why the orthodox cybersecurity approaches in Cyber-Physical System (CPS) are not adequate to counter cyber-attacks on the CAVs. Further, we synthesised a table with consolidated details of the cyber-attacks on the CAVs, the respective CAV communication system, its impact, and the corresponding mitigation strategies. It is believed that the literature discussed, and the findings reached in this paper are of great value to CAV researchers, technology developers, and decision-makers in shaping and developing a robust CAV-cybersecurity framework.


Asunto(s)
Accidentes de Tránsito/prevención & control , Accidentes de Tránsito/estadística & datos numéricos , Conducción de Automóvil/psicología , Conducción de Automóvil/normas , Automóviles/normas , Seguridad Computacional/normas , Seguridad Computacional/tendencias , Adulto , Anciano , Anciano de 80 o más Años , Conducción de Automóvil/estadística & datos numéricos , Automóviles/estadística & datos numéricos , Seguridad Computacional/estadística & datos numéricos , Femenino , Predicción , Guías como Asunto , Humanos , Masculino , Persona de Mediana Edad , Adulto Joven
17.
PLoS One ; 15(9): e0239043, 2020.
Artículo en Inglés | MEDLINE | ID: mdl-32986720

RESUMEN

The popularity of Internet of Vehicles (IoV) has made people's driving environment more comfortable and convenient. However, with the integration of external networks and the vehicle networks, the vulnerabilities of the Controller Area Network (CAN) are exposed, allowing attackers to remotely invade vehicle networks through external devices. Based on the remote attack model for vulnerabilities of the in-vehicle CAN, we designed an efficient and safe identity authentication scheme based on Feige-Fiat-Shamir (FFS) zero-knowledge identification scheme with extremely high soundness. We used the method of zero-one reversal and two-to-one verification to solve the problem that FFS cannot effectively resist guessing attacks. Then, we carried out a theoretical analysis of the scheme's security and evaluated it on the software and hardware platform. Finally, regarding time overhead, under the same parameters, compared with the existing scheme, the scheme can complete the authentication within 6.1ms without having to go through multiple rounds of interaction, which reduces the additional authentication delay and enables all private keys to participate in one round of authentication, thereby eliminating the possibility that a private key may not be involved in the original protocol. Regarding security and soundness, as long as private keys are not cracked, the scheme can resist guessing attacks, which is more secure than the existing scheme.


Asunto(s)
Automatización/métodos , Seguridad Computacional/instrumentación , Seguridad Computacional/tendencias , Algoritmos , Conducción de Automóvil , Automóviles , China , Confidencialidad , Víctimas de Crimen , Excipientes , Humanos , Sistemas de Información/instrumentación , Sistemas de Información/tendencias , Internet , Conocimiento , Proyectos de Investigación , Programas Informáticos
18.
PLoS One ; 15(9): e0239053, 2020.
Artículo en Inglés | MEDLINE | ID: mdl-32946491

RESUMEN

To deal with dynamically changing user's credentials in identity-based encryption (IBE), providing an efficient key revocation method is a very important issue. Recently, Ma and Lin proposed a generic method of designing a revocable IBE (RIBE) scheme that uses the complete subtree (CS) method by combining IBE and hierarchical IBE (HIBE) schemes. In this paper, we propose a new generic method for designing an RIBE scheme that uses the subset difference (SD) method instead of using the CS method. In order to use the SD method, we generically design an RIBE scheme by combining IBE, identity-based revocation (IBR), and two-level HIBE schemes. If the underlying IBE, IBR, and HIBE schemes are adaptively (or selectively) secure, then our RIBE scheme is also adaptively (or selectively) secure. In addition, we show that the layered SD (LSD) method can be applied to our RIBE scheme and a chosen-ciphertext secure RIBE scheme also can be designed generically.


Asunto(s)
Seguridad Computacional/tendencias , Robo de Identidad/prevención & control , Algoritmos , Nube Computacional/tendencias , Modelos Estadísticos , Modelos Teóricos , Programas Informáticos
19.
Health Secur ; 18(3): 228-231, 2020.
Artículo en Inglés | MEDLINE | ID: mdl-32559153

RESUMEN

As a result of the extensive integration of technology into the healthcare system, cybersecurity incidents have become an increasing challenge for the healthcare industry. Recent examples include WannaCry, a nontargeted ransomware attack on more than 150 countries worldwide that temporarily crippled parts of the National Health Service in the United Kingdom, and the 2016 ransomware attack on Los Angeles's Hollywood Presbyterian Medical Center. The attacks cost millions of dollars in lost revenue and fines, as well as significant reputational damage. Efforts are needed to devise tools that allow experts to more accurately quantify the actual impact of such events on both individual patients and healthcare systems as a whole. While the United States has robust disaster preparedness and response systems integrated throughout the healthcare and government sectors, the rapidly evolving cybersecurity threat against healthcare entities is outpacing existing countermeasures and challenges in the "all-hazards" disaster preparedness paradigm. Further epidemiologic research of clinical cybersecurity attacks and their effects on patient care and clinical outcomes is necessary to prevent and mitigate future attacks.


Asunto(s)
Defensa Civil , Seguridad Computacional/economía , Atención a la Salud/organización & administración , Registros Electrónicos de Salud , Seguridad Computacional/tendencias , Atención a la Salud/normas , Hospitales , Humanos , Estados Unidos
20.
Trends Biotechnol ; 38(8): 825-828, 2020 08.
Artículo en Inglés | MEDLINE | ID: mdl-32441258

RESUMEN

Technology offers opportunities to revolutionize medicine and research but can threaten privacy and patient confidentiality. As the scale of patient data explodes, the safety and integrity of medical information are increasingly at stake. We highlight security and privacy issues associated with genomic research, medical devices, and wearable technology.


Asunto(s)
Seguridad Computacional/tendencias , Confidencialidad , Medicina/tendencias , Ciencia/tendencias , Genómica/tendencias , Intercambio de Información en Salud/tendencias , Humanos , Privacidad
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA