Towards Securing Medical Documents from Insider Attacks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 8
Abstract
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can’t be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.
Authors and Affiliations
Maaz Ahmad, Muhammad Fahad, Abdul Khan
An Adaptive Hybrid Controller for DBMS Performance Tuning
Performance tuning process of database management system (DBMS) is an expensive, complex and time consuming process to be handled by human experts. A proposed adaptive controller is developed that utilizes a hybrid model...
E-exam Cheating Detection System
With the expansion of Internet and technology over the past decade, E-learning has grown exponentially day by day. Cheating in exams has been a widespread phenomenon all over the world regardless of the levels of develop...
Factors Influencing Cloud Computing Adoption in Saudi Arabia’s Private and Public Organizations: A Qualitative Evaluation
Cloud Computing is becoming an important tool for improving productivity, efficiency and cost reduction. Hence, the advantages and potential benefits of cloud computing are no longer possible to be ignored by organizatio...
Prediction of Poor Inhabitant Number Using Least Square and Moving Average Method
The number of poor inhabitant in South Kalimantan decreased within the last three years compared with the previous years. The numbers of poor inhabitant differs from time to time. This scaled dynamical number has been a...
Image Compression of MRI Image using Planar Coding
In this paper a hierarchical coding technique for variable bit rate service is developed using embedded zero block coding approach. The suggested approach enhances the variable rate coding by zero tree based block-coding...