Privacy And Security Management
Mostrando 1-6 de 6 artigos, teses e dissertações.
-
1. Implementação e análise de desempenho dos protocolos de criptografia neural e Diffie-Hellman em sistemas RFID utilizando uma plataforma embarcada
RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID sy
Publicado em: 2009
-
2. A model of security management for middleware based on tuple in diffuse and nomadic environments. / Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades.
Este trabalho explora a gerência de segurança e cooperação de aplicações em sistemas distribuídos móveis. Neste contexto, é feito um estudo sobre os diferentes middlewares para ambientes móveis (mobile middleware): suas capacidades de enfrentar os desafios da mobilidade e da segurança. As análises do estudo mostram que esses middlewares devem pos
Publicado em: 2009
-
3. Integrated services in heterogeneous environments: using semantic for communication between entities in context changes / Integração de serviços em ambientes heterogêneos: uso de semântica para comunicação entre entidades em mudanças de contexto
Fourth Generation Networks (4G) introduce the capability of ubiquitous access to services in heterogeneous networks. In these environments, the distribution of the management would require semantics for common sharing vocabulary, an ability which is not yet provided. For that reason, service providers from different management domains are facing the challeng
Publicado em: 2009
-
4. O ensino-assistência nas disciplinas Semiologia I Módulo Adultos, Medicina Geral de Adultos I e Doenças Infecciosas e Parasitárias da Faculdade de Medicina da UFMG, praticado nos Ambulatórios do Hospital das Clínicas da UFMG: o olhar do cliente.
A series of requests about the rights of the patient concerning the access to health and in health rises after the approval of the Brazilian Constitution in 1988, whose article 196 defines that health is everybodys right and it is an obligation of the State Since the publication of the decree number 675 in 2006 by the Ministry of Health, the implementation o
Publicado em: 2008
-
5. AUTENTICAÇÃO E CONTROLE DE ACESSO INTERINSTITUCIONAL / INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replic
Publicado em: 2005
-
6. Safe Teleradiology: Information Assurance as Project Planning Methodology
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVESM, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addres
American Medical Informatics Association.