In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.
Abstract:The recent RFID-based logistics environment enables significant improvement of business efficiency. However, to support an efficient logistics processing service in the RFID-based international logistics service platform, it is required security risk analysis and security control model. In this paper, we have analyzed and figured out requirements of the security for the efficient international RFID-based logistics service. It is possible to construct own security policy for each enterprise using RBAC. The security policy includes definition of subjects, objects, permissions, roles, role hierarchy and constraints of the enterprise. And we proposed an RBAC-based security control model, reflecting security requirements in an international logistics process and constraints of the access control model have been represented as UML. We presented example scenario and implemented the prototype system for the verification of the proposed security model for international logistics. The proposed security control model is useful to reduce business risk in international logistics.Keywords: RFID, International Logistics, RBAC, Security Control, Access Control Constraints.Framework) for each enterprise to construct its own security policy such as roles, permissions, sessions and constraints of the organization. Existing RFID-based international logistics platforms could become exposed to threats and security risks. Therefore we need flexible security control model for the protection of not only RFID threats but also enterprise level risks. RBAC is a powerful and flexible security access control model. So it can be applied to solve these problems.The rest of the paper is organized as follows. Section 2 describes the security guideline of the RFID system. We explain requirements of security in the EPC network application service based on RFID in section 3 and figure out security analysis in section 4. In section 5, we propose an RBAC-based security control model for the international logistics process and represent constraints of access control using UML. And section 6 contains example scenario and implementation of the proposed security model. Lastly a brief conclusion is presented in section 7. Related WorksThe EPCglobal architecture framework is to be serviced for a mutual goal that intensifies the distribution/supply network by using EPC. EPCglobal network is a system that grants an identification number on a product based on RFID technology and EPC code, and conveys information related to the product for suppliers and consumers, by connecting a storage space of information into the network. In other words, EPCglobal network serves as a standard that makes it feasible to collect more than one EPC data from multiple-data resources, such as RFID reader, and report them in diverse form, by filtering and grouping them according to customized order from consumers, and to store data processed on the EPC IS (Information Services). EPCglobal network provides independence between application business logics and infrastructure...
In this paper, we propose a new detection method for cache poisoning attack on the recursive DNS. The proposed method overcomes the weak-points of the previous researches such as DNSSEC and DoX system which are hierarchical or vertical additional deployments of several DNS servers, accordingly overall performance of the system is decreased and additional traffic cost is needed. That is to say, the proposed method sets forth independent cache poisoning detection method with the similar security level of DNSSEC, notwithstanding the improvement, there is little influence on DNS performance and additional traffic.
These days, the size of the Internet market, the use of parcels increases every year. Currently, in local delivery centers, the sorting of parcels has been processed manually. The manual process requires much time and high cost. Also it causes occupational injury and musculoskeletal diseases. Therefore it is necessary that the current method should be replaced with automatic smart robot manipulators. In this paper, we propose a robot control system with a context aware mechanism for generating information to control the movement of a robot, which automatically sorts parcels. The context aware mechanism generates intelligent information to control a robot using context data such as the parcel shape, weight, location and barcodes. Our robot control system collects context data of the parcel and carries out the reasoning of robot control data to pick up and drop parcels according to contexts. It also generates optimal delivery path using GIS engine. Then a robot manipulator, which receives control data of picking-up and dropping, processes the automated sorting of parcels according to delivery persons and delivery routes. It will be useful to save much time and cost by automating the parcel delivery sorting process, thus reducing frequency of industrial accidents.
This paper is written for intelligent CCTV (Closed-Circuit Television) which has been important in the aspect of industrial value and social security these days. Because the intelligent CCTV can identify behavior and object automatically, and it has been used extensively. With spread use, the performance of the intelligent CCTV has been important. But a standard method to measure the performance of the intelligent CCTV is absence, therefore this paper is described about methods for implementing and measuring of the intelligent CCTV performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.