Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 24.570
Filtrar
1.
Multimedia | Recursos Multimedia | ID: multimedia-9484

RESUMEN

A implementação da Rede Nacional de Dados em Saúde (RNDS) iniciou-se em junho de 2019 com os objetivos de oferecer benefícios de melhoria da assistência à saúde, a partir do acesso às informações e continuidade do cuidado nos níveis de atenção, de permitir eficiência na gestão dos recursos públicos e de impulsionar a Inovação na Saúde. Em março de 2020, a abrangência e o escopo do projeto da RNDS foram direcionados ao enfrentamento da COVID-19, para o fortalecimento da resposta do sistema de saúde, monitoramento e gestão da saúde populacional, oferta de soluções para engajamento ativo do usuário no controle da epidemia e processamento do esperado número de casos da doença. Desde as primeiras ações de planejamento, governança, definição de arquitetura e de regras negociais, o DATASUS se prepara para manter a RNDS em conformidade com a Lei Geral de Proteção de Dados (LGPD), com previsão de entrada em vigor para 3 de maio de 2021, conforme Medida Provisória n° 959, de 29 de abril de 2020.


Asunto(s)
Sistemas de Información en Salud/normas , Informática en Salud Pública/organización & administración , Confidencialidad/legislación & jurisprudencia , Datos de Salud Generados por el Paciente/legislación & jurisprudencia , Informática en Salud Pública/normas
3.
Multimedia | Recursos Multimedia | ID: multimedia-9458

RESUMEN

O Conasems em parceria com Departamento de Informática do SUS (DATASUS) e Secretaria de Atenção Primária à Saúde (SAPS/MS), promove uma live nesta sexta-feira (16) às 14h30. O objetivo é apresentar orientações técnicas a respeito da habilitação de acesso PEC e-SUS APS à RNDS via portal Conecte SUS Profissional. Todo material que será apresentado estará disponível no portal do Conasems, DATASUS e SAPS. O acesso dos profissionais de saúde as informações do paciente registrados ao longo da Rede de Atenção à Saúde (RAS) possibilitará consulta do histórico clínico, o histórico de vacina, resultado de exame laboratorial para o Covid-19, medicações dispensadas, os atendimentos e as internações hospitalares e alergias registradas pelo cidadão, otimizando, dessa forma, a continuidade do cuidado neste nível de atenção. O público-alvo do encontro virtual são gestores e técnicos que são responsáveis pela gestão da Estratégia e-SUS Atenção Primária à Saúde (e-SUS APS) nos municípios e estados. O chat da live será aberto para perguntas que serão respondidas pelos convidados no decorrer da transmissão. Participe enviando sua dúvida! A live será mediada pelo assessor técnico do Conasems, Diogo Demarchi, e vai contar com a participação dos convidados: Juliana Zinader (Coordenadora – Coordenação-Geral de Inovação em Sistemas Digitais – CGISD/DATASUS) Marcello Carrijo (Gerente de Desenvolvimento de Sistemas – Coordenação-Geral de Informação da Atenção Primária/ CGIAP/DESF) Nubia Moreira Dos Santos (Coordenadora - Coordenação de Interoperabilidade – COINP/CGSIO/DATASUS) João Geraldo Junior (Tecnologista - Coordenação-Geral de Informação da Atenção Primária/ CGIAP/DESF) Ana Claudia Cielo (Técnica - Coordenação-Geral de Informação da Atenção Primária/ CGIAP/DESF) Josélio Emar de Araújo - Assessor Técnico - Coordenação-Geral de Inovação em Sistemas Digitais - CGISD/DATASUS)


Asunto(s)
Telemedicina , Registros Electrónicos de Salud , Intercambio de Información en Salud , Informática en Salud Pública , Sistemas de Información en Salud , Confidencialidad , Aplicaciones Móviles , Portales del Paciente
4.
Multimedia | Recursos Multimedia | ID: multimedia-9460

RESUMEN

O Ministério da Saúde, através do Departamento de Informático SUS (DATASUS) integrou o app Conecte SUS cidadão à Rede Nacional de Dados em Saúde (RNDS), possibilitando o acesso ao resultado dos exames de Covid-19 pelo cidadão através do smartphone. O diretor do DATASUS, Jacson Barros, apresentou o Conecte SUS Cidadão no dia 03/08 em coletiva no Ministério da Saúde juntamente com o Secretário-Executivo Élcio Franco


Asunto(s)
Estrategias de eSalud , Intercambio de Información en Salud , Informática en Salud Pública , Datos de Salud Generados por el Paciente , Registros Electrónicos de Salud , Acceso a la Información , Aplicaciones Móviles , Confidencialidad , COVID-19/diagnóstico , Atención Primaria de Salud
7.
Sensors (Basel) ; 21(21)2021 Oct 23.
Artículo en Inglés | MEDLINE | ID: mdl-34770346

RESUMEN

Signcryption schemes leveraging chaotic constructions have garnered significant research interest in recent years. These schemes have proffered practical solutions towards addressing the vast security vulnerabilities in Electronic Cash Systems (ECS). The schemes can seamlessly perform message confidentiality and authentication simultaneously. Still, their applications in emerging electronic cash platforms require a higher degree of complexity in design and robustness, especially as billions of online transactions are conducted globally. Consequently, several security issues arise from using open wireless channels for online business transactions. In order to guarantee the security of user information over these safety-limited channels, sophisticated security schemes are solely desired. However, the existing signcryption schemes cannot provide the required confidentiality and authentication for user information on these online platforms. Therefore, the need for certificateless group signcryption schemes (CGSS) becomes imperative. This paper presents an efficient electronic cash system based on CGSS using conformable chaotic maps (CCM). In our design, any group signcrypter would encrypt information/data with the group manager (GM) and send it to the verifier, who confirms the authenticity of the signcrypted information/data using the public criteria of the group. Additionally, the traceability, unforgeability, unlinkability, and robust security of the proposed CGSS-CCM ECS scheme have been built leveraging computationally difficult problems. Performance evaluation of the proposed CGSS-CCM ECS scheme shows that it is secure from the Indistinguishably Chosen Ciphertext Attack. Finally, the security analysis of the proposed technique shows high efficiency in security-vulnerable applications. Overall, the scheme gave superior security features compared to the existing methods in the preliminaries.


Asunto(s)
Seguridad Computacional , Telemedicina , Algoritmos , Confidencialidad , Electrónica
8.
Sensors (Basel) ; 21(21)2021 Oct 25.
Artículo en Inglés | MEDLINE | ID: mdl-34770372

RESUMEN

The design of the Controller Area Network (CAN bus) did not account for security issues and, consequently, attacks often use external mobile communication interfaces to conduct eavesdropping, replay, spoofing, and denial-of-service attacks on a CAN bus, posing a risk to driving safety. Numerous studies have proposed CAN bus safety improvement techniques that emphasize modifying the original CAN bus method of transmitting frames. These changes place additional computational burdens on electronic control units cause the CAN bus to lose the delay guarantee feature. Consequently, we proposed a method that solves these compatibility and security issues. Simple and efficient frame authentication algorithms were used to prevent spoofing and replay attacks. This method is compatible with both CAN bus and CAN-FD protocols and has a lower operand when compared with other methods.


Asunto(s)
Seguridad Computacional , Telemedicina , Algoritmos , Comunicación , Confidencialidad , Electrónica
9.
Sensors (Basel) ; 21(21)2021 Oct 28.
Artículo en Inglés | MEDLINE | ID: mdl-34770462

RESUMEN

The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and data. Without accurate and verified management, they could become severe back-doors for security and privacy. In this paper, we propose a smart city infrastructure able to integrate a distributed privacy-preserving identity management solution based on attribute-based credentials (p-ABC), a user-centric Consent Manager, and a GDPR-based Access Control mechanism so as to guarantee the enforcement of the GDPR's provisions. Thus, the infrastructure supports the definition of specific purpose, collection of data, regulation of access to personal data, and users' consents, while ensuring selective and minimal disclosure of personal information as well as user's unlinkability across service and identity providers. The proposal has been implemented, integrated, and evaluated in a fully-fledged environment consisting of MiMurcia, the Smart City project for the city of Murcia, CaPe, an industrial consent management system, and GENERAL_D, an academic GDPR-based access control system, showing the feasibility.


Asunto(s)
Seguridad Computacional , Privacidad , Ciudades , Confidencialidad , Consentimiento Informado
10.
Sensors (Basel) ; 21(21)2021 Oct 28.
Artículo en Inglés | MEDLINE | ID: mdl-34770467

RESUMEN

Vehicular communication has been envisioned to support a myriad of essential fifth-generation and beyond use-cases. However, the increasing proliferation of smart and intelligent vehicles has generated a lot of design and infrastructure challenges. Of particular interest are the problems of spectrum scarcity and communication security. Consequently, we considered a cognitive radio-enabled vehicular network framework for accessing additional radio spectrum and exploit physical layer security for secure communications. In particular, we investigated the secrecy performance of a cognitive radio vehicular network, where all the nodes in the network are moving vehicles and the channels between them are modeled as double-Rayleigh fading. Furthermore, adopting an underlay approach, the communication between secondary nodes can be performed by employing two interference constraint strategies at the primary receiver; (1) Strategy I: the secondary transmitter power is constrained by the interference threshold of the primary receiver, and (2) Strategy II: the secondary transmitter power is constrained by both the interference threshold of the primary receiver and the maximum transmit power of the secondary network. Under the considered strategies, we derive the exact secrecy outage probability (SOP) and ergodic secrecy capacity (ESC) expressions over double-Rayleigh fading. Moreover, by analyzing the asymptotic SOP behavior, we show that a full secrecy diversity of 1 can be achieved, when the average channel gain of the main link goes to infinity with a fixed average wiretap channel gain. From the ESC analysis, it is revealed that the ESC follows a scaling law of ΘlnΩm2Ωe2 for large Ωm and Ωe, where Ωm and Ωe are the average channel gains of the main link and wiretap link. The numerical and simulation results verify our analytical findings.


Asunto(s)
Redes de Comunicación de Computadores , Confidencialidad , Cognición , Simulación por Computador , Probabilidad
11.
Sensors (Basel) ; 21(21)2021 Oct 29.
Artículo en Inglés | MEDLINE | ID: mdl-34770505

RESUMEN

With the recent development of video compression methods, video transmission on traditional devices and video distribution using networks has increased in various devices such as drones, IP cameras, and small IoT devices. As a result, the demand for encryption techniques such as MPEG-DASH for transmitting streams over networks is increasing. These video stream security methods guarantee stream confidentiality. However, they do not hide the fact that the encrypted stream is being transmitted over the network. Considering that sniffing attacks can analyze the entropy of the stream and scan huge amounts of traffic on the network, to solve this problem, the deception method is required, which appears unencrypted but a confidential stream. In this paper, we propose the new deception method that utilizes standard NAL unit rules of video codec, where the unpromised device shows the cover video and the promised device shows the secret video for deceptive security. This method allows a low encryption cost and the stream to dodge entropy-based sniffing scan attacks. The proposed stream shows that successful decoding using five standard decoders and processing performance was 61% faster than the conventional encryption method in the test signal conformance set. In addition, a network encrypted stream scan method the HEDGE showed classification results that our stream is similar to a compressed video.


Asunto(s)
Seguridad Computacional , Compresión de Datos , Algoritmos , Confidencialidad
12.
Sensors (Basel) ; 21(21)2021 Oct 30.
Artículo en Inglés | MEDLINE | ID: mdl-34770535

RESUMEN

The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.


Asunto(s)
Seguridad Computacional , Confidencialidad , Algoritmos , Computadores , Humanos
13.
Sensors (Basel) ; 21(21)2021 Oct 31.
Artículo en Inglés | MEDLINE | ID: mdl-34770571

RESUMEN

The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little time as possible, and each time allow for a successful authentication of the authorised account. In recent years, however, online users have been experiencing more and more issues with recalling their own passwords on the spot. According to research done in 2017 by LastPass on its employees, the number of personal accounts assigned to one business user currently exceeds 191 profiles and keeps growing. Remembering these many passwords, especially to applications which are not used every week, seems to be impossible without storing them either on paper, in a password manager, or saved in a file somewhere on a PC. In this article a new verification model using a Google Street View image as well as the user's personal experience and knowledge will be presented. The purpose of this scheme is to assure secure verification by creating longer passwords as well as delivering a 'password reminder' already embedded into the login scheme.


Asunto(s)
Seguridad Computacional , Telemedicina , Cognición , Confidencialidad
14.
Sensors (Basel) ; 21(21)2021 Nov 03.
Artículo en Inglés | MEDLINE | ID: mdl-34770631

RESUMEN

Physical activity contributes to the maintenance of health conditions and functioning. However, the percentage of older adults who comply with the recommendations for physical activity levels is low when compared to the same percentages on younger groups. The SmartWalk system aims to encourage older adults to perform physical activity (i.e., walking in the city), which is monitored and adjusted by healthcare providers for best results. The study reported in this article focused on the implementation of SmartWalk security services to keep personal data safe during communications and while at rest, which were validated considering a comprehensive use case. The security framework offers various mechanisms, including an authentication system that was designed to complement the pairs of usernames and passwords with trusted execution environments and token-based features, authorization with different access levels, symmetric and asymmetric key cryptography, critical transactions review, and logging supported by blockchain technology. The resulting implementation contributes for a common understanding of the security features of trustful smart cities' applications, which conforms with existing legislation and regulations.


Asunto(s)
Cadena de Bloques , Aplicaciones Móviles , Telemedicina , Seguridad Computacional , Confidencialidad , Ejercicio Físico
15.
J Med Internet Res ; 23(11): e24460, 2021 11 15.
Artículo en Inglés | MEDLINE | ID: mdl-34779788

RESUMEN

BACKGROUND: Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. OBJECTIVE: This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. METHODS: A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. RESULTS: Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. CONCLUSIONS: Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients' intention to use PHSs on P2P networks by making them safe to use.


Asunto(s)
COVID-19 , Sistemas de Información en Salud , Confidencialidad , Humanos , Atención Dirigida al Paciente , SARS-CoV-2
16.
Comput Intell Neurosci ; 2021: 6509982, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34745250

RESUMEN

Families, physicians, and hospital environments use remote patient monitoring (RPM) technologies to remotely monitor a patient's vital signs, reduce visit time, reduce hospital costs, and improve the quality of care. The Internet of Medical Things (IoMT) is provided by applications that provide remote access to patient's physiological data. The Internet of Medical Things (IoMT) tools basically have a user interface, biosensor, and Internet connectivity. Accordingly, it is possible to record, transfer, store, and process medical data in a short time by integrating IoMT with the data communication infrastructure in edge computing. (Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This is expected to improve response times and save bandwidth. A common misconception is that edge and IoT are synonymous.) But, this approach faces problems with security and intrusion into users' medical data that are confidential. Accordingly, this study presents a secure solution in order to be used in the IoT infrastructure in edge computing. In the proposed method, first the clustering process is performed effectively using information about the characteristics and interests of users. Then, the people in each cluster evaluated by using edge computing and people with higher scores are considered as influential people in their cluster, and since users with high user interaction can publish information on a large scale, it can be concluded that, by increasing user interaction, information can be disseminated on a larger scale without any intrusion and thus in a safe way in the network. In the proposed method, the average of user interactions and user scores are used as a criterion for identifying influential people in each cluster. If there is a desired number of people who are considered to start disseminating information, it is possible to select people in each cluster with a higher degree of influence to start disseminating information. According to the research results, the accuracy has increased by 0.2 and more information is published in the proposed method than the previous methods.


Asunto(s)
Confidencialidad , Atención a la Salud , Análisis por Conglomerados , Humanos , Internet
17.
Stud Health Technol Inform ; 285: 253-258, 2021 Oct 27.
Artículo en Inglés | MEDLINE | ID: mdl-34734882

RESUMEN

Genomic information is key for the implementation of real personalized medicine. Nevertheless, access to this kind of information must be controlled because of its high privacy and security requirements. Several genomic information formats exist, although we have started from MPEG-G as it includes metadata and protection mechanisms since its inception and provides a hierarchical structure to organize the information contained. The proposed GIPAMS modular architecture provides a secure and controlled access to genomic information, which may help on improving personalized medicine as described in this paper.


Asunto(s)
Seguridad Computacional , Privacidad , Confidencialidad , Genómica , Sistemas de Información
20.
Stud Health Technol Inform ; 287: 50-54, 2021 Nov 18.
Artículo en Inglés | MEDLINE | ID: mdl-34795078

RESUMEN

To handle genomic information while supporting FAIR principles, we present GIPAMS, a modular architecture. GIPAMS provides security and privacy to manage genomic information by means of several independent services and modules that interact among them in an orchestrated way. The paper analyzes how some security and privacy aspects of the FAIRification process are covered by the GIPAMS platform.


Asunto(s)
Seguridad Computacional , Privacidad , Confidencialidad , Genómica
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...