This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objectiv...This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices.展开更多
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our...Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.展开更多
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a...Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.展开更多
基金Funding for this study was granted by the Deanship of Scientific Research at King Faisal University,Kingdom of Saudi Arabia under grant no.206063.
文摘This article evaluates the security techniques that are used to maintainthe healthcare devices, and proposes a mathematical model to list these in theorder of priority and preference. To accomplish the stated objective, the articleuses the Fuzzy Analytic Network Process (ANP) integrated with Technical forOrder Preference by Similarities to Ideal Solution (TOPSIS) to find the suitablealternatives of the security techniques for securing the healthcare devices fromtrespassing. The methodology is enlisted to rank the alternatives/ techniquesbased on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques used in healthcare security.The findings of our analysis cite that Machine Learning (ML) based healthcaredevices obtained the highest priority among all the other security techniques.Hence the developers, manufacturers and researchers should focus on the MLtechniques for securing the healthcare devices. The results drawn through theaid of the suggested mathematical model would be a corroborative referencefor the developers and the manufacturers in assessing the security techniques ofthe healthcare devices.
文摘Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated.
基金Project (No. 60402019/F0102) supported by the National NaturalScience Foundation of China
文摘Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al.(2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.