18 results with keyword: 'securing electronic medical records attribute encryption mobile devices'
When stored locally, the provider may continue to use any existing ac- cess control for the record; however, access to the sensitive records is now implicitly restricted to
N/A
User Plaintext CCR Policy Encryption Engine Hospital SSL Web Server Offline Key Server Encrypted CCR ABE Private Key Plaintext CCR ABE decryption Partially or fully encrypted
N/A
Keywords: HVDC, HVAC, Renewable energy source, Load centers, Bulk capacity, Long distance bulk power transmission, quasi-autonomous corona-based, Magnetohydrodynamic,
N/A
18 PR.PT-4: Communications and control networks are protected SC-7 Mobile Device (wireless client) is hardened in general. Mobile Device has a firewall, antivirus
N/A
implement standards-based cybersecurity technologies; mobile device security standards; HIPAA; electronic health record system; risk management; electronic health record security;
N/A
If any record node matches an access control rule, that node is first tagged with content-specific attributes, then encrypted using dual-policy ABE under an appropriate
N/A
Correct implementation of the study protocol and consistency of data across sites may be achieved by ensuring that sites and personnel are trained to a high standard and
N/A
The five principles associated with cooperative learning (Johnson and Johnson 1998) enables an explicit focus to be identified – the group’s common goal; but include processes
N/A
A comparison of the average response to all unsuccessful (from the perspective of the union) elections on the left side of figures 5 and 6 with successful elections on the right
N/A
Rul 76-83 involved a partition of community property incident to divorce, the division referred to in this private ruling was apparently not divorce-related (the
N/A
The number of attendees and audience reported reflects somewhat how well the Louisiana State Museum is fulfilling its mission to present exhibits and programming in an educational
N/A
– Application Server: WebLogic and APEX Listener handle requests for RESTful Web Services and APEX applications – Data Upload: Data Pump files can contain data and database.
N/A
The function of the Committee is to establish and review the terms and conditions of employment of the executive Directors, and to make recommendations to the Board on the
N/A
Many of these limitations imposed by unimodal biometric systems can be either overcome or reduced by using multiple biometric traits. Multimodal systems have demonstrated
N/A
Common problems that may occur in unimodal biometric systems are noise in sensed data, intra-class variations, inherent distinctiveness, and spoof attacks. Many of these
N/A
We are using attribute-based encryption (ABE) as the main encryption primitive. Using ABE, access policies are expressed based on the attributes of users or data,
N/A
Based on the results of tests of in-sample and out-of-sample predictability of stock returns, we found evidence of a strong positive (negative) link between international equity
N/A