Search or add a thesis

Advanced Search (Beta)
Home > Joint Key Authentication Model for Situation Variant in E-Health Systems

Joint Key Authentication Model for Situation Variant in E-Health Systems

Thesis Info

Access Option

External Link

Author

Muhammad Sajjad

Institute

Virtual University of Pakistan

Institute Type

Public

City

Lahore

Province

Punjab

Country

Pakistan

Thesis Completing Year

2019

Thesis Completion Status

Completed

Subject

Software Engineering

Language

English

Link

http://vspace.vu.edu.pk/detail.aspx?id=284

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676721014311

Similar


Health of patient is important in every aspect of life. Technology has played a vital role in providing the solutions for health. Many of E-Health software have been designed to provide benefit in the field of E-Health technology. E-Health is considered to be the critical and confidential domain because the record might be misused. E-Health technologies can be considered as the effective, reasonable and result oriented framework. The designed E-Health software are mostly focusing on the areas like record keeping, diagnostic, treatment, and medication. The mentioned areas are important too but the security and privacy of the patient record is the core significant aspect. Authentication schemes are specifically designed to give user access privileges and secure patient`s confidential medical records. Many authentication schemes have been used with embedded E-Health software to give access to trained operators for the purpose of providing better cure against diseases. A large number of single and multi-factor authentication schemes are functioning but multi-factor authentication schemes are more secure than the single factor, which are unfortunately rare in use. The main objective is to propose an appropriate solution for the scheme in E-Health systems, for its formal use. The beauty of this scheme is the combination of most frequently used factors like Identity, password, smart card, mobile device and biometric characteristics of the user. The user has all these security and privacy measures along with strongly integrated factors which are contributing for the better availability and usage of the given scheme. It also takes care against different attacks like online or offline password guessing attack, stolen verifier attack, man-in-the-middle attack. Proposed scheme tested and verified by one of the trust worthy software engineering tools and techniques called formal methods and high level protocol specification language using AVISPA tool. Results guarantee the security, reliability, efficacy and effectiveness of proposed authentication scheme. For this purpose, system accessibility, user privileges would be flexible, feasible and controllable according to the prospective of application users. End users of E-Health systems could be patients, doctors, para-medical staff and administration. Due to its variety of login credentials on the basis of criticality of different users, organizations include government, semi-government and private healthcare centres develop their information security and accessibility policies according to context of socio-economic benefit. Joint authentication model for situation variant is the best choice for E-Health software.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

المبحث الثالث: هل الشعر الحر نوعٌ من النثر؟

المبحث الثالث:هل الشعر الحر نوعٌ من النثر؟
وھناک بعض الأدباء والشعراء اعتبروا الشعر الحر نوعاً من النثر وقالوا بأن معانیہ تافھۃ لا معنی لھا، والبعض قالوا بأن جذورھا وُجدَت في الموشحات الأندلسیۃ، وأن البند کان معروفاً ولکن أسلوبہ کان مجھولاً، ولم ینظمہ إلا شعراء العراق، ولکن نازک الملائکۃ استنکرت ھذا الشيء، وقالت أنھا لم تسمع بالبند قبل سنۃ 1953م۔ وقالت نازک الملائکۃ في موضع آخر عن الشعر الحر: "ولعل أبرز الأدلۃ علی أن الحرکۃ کانت ولیدۃ عصرنا ھذا، وأن أغلبیۃ قرائنا ما زالوا یستنکرونھا ویرفضونھا، وبینھم کثرۃ لا یستھان بھا تظن أن الشعر الحر لا یملک من الشعر إلا الإسم فھو نثر عادي لا وزن له" .
هل کانت حركة الشعر الحر قوية أ م لا ؟
ھذہ الحرکۃ الجدیدۃ(حرکۃ الشعر الحر) کانت قویۃ راسخۃ ثابتۃ متحمسۃ ولکن في بدایۃ الأمر کأي حرکۃ جدیدۃ زلّت وتخبطت ولکن بعد فترۃ من الزمن استکملت أسباب نضجھا فأصبحت حرکۃ مشھورۃ مستسلمۃ. وأخذت ھذہ الدعوۃ الشعریۃ الجدیدۃ تنتشر حتی کونت لنفسھا مکانۃ قویۃ، وبدأ بعض الشعراء الأفاضل یھجرون أسلوب الشطرین ویستعملون أسلوب الشطر.
أما نازک الملائکۃ فقد کانت ذکیۃ جداً، فبذکاءھا استطاعت أن تأخذ الریادۃ والمیزۃ المنفردۃ من بین الشعراء الأفاضل۔ فقد کانت واعیۃ وذات طموحات عالیۃ، قدمت نازک الملائکۃ الأدلۃ والبراھین حتی جعلت الشعراء والأدباء والنقاد والقراء أن یستسلموا لھذا الأمر۔

Kipling’s Depiction of the Great Game Between British India and Czarist Russia

This article provides valuable information about the living conditions of Muslims of the Pak-Afghan Region in the context of revisiting Rudyard Kipling’s view of the Great Game of the 19th century between Great Britain and Russia that roughly continued for about a century beginning in the second decade of the 19th century to the signing of the Anglo Russian convention in 1907. In this respect his famous novel, Kim (1901) has been critically examined to establish the political content of his creative work. Coupled with the appreciation of the novel as a great work of art with its many facets and themes, views of Edward Said have been juxtaposed to arrive at a conclusion that the novel is also a celebration of imperialism. In today’s scenario in Central Asia particularly Afghanistan, a revisit of Kipling is an interesting revelation. The discussion also reveals the similarities of the tussle of two centuries back to the realities in the region today. This insight as we appreciate Kipling’s masterpiece novel proves even more eye-catching and real. This paper also examines Peter Hopkirk’s works on the Great Game to historically asses the dialectics of the imperial struggle between the two super powers of the time. In this connection, a brief discussion is available on the three Anglo-Afghan Wars as well as the conflict in Kashgharia. This article presents an overview of the view head by Russians on the conflict which they call Tournament of Shadows or Bolshya Igra involving spies and military personnel. A fresh look at Kipling’s works in general and his novel Kim, in particular, helps explore the very essentials of the working of Imperialism and empire-building, which is the main stay of this paper. A deeper look would understandably unfurl big powers rivalry in general, and the present day security situation in Asia in particular, by going through the works of a great writer; the first Englishman and the youngest recipient for Nobel Prize in Literature (1907).  

Synthesis and Characterization of Single Source Precursors for the Aerosol-Assisted Chemical Vapour Deposition of Transition Metal Sulphide Nanoparticles

A series of crystalline nickel, cadmium, mixed metal nickel/cadmium and manganese O-n- butylxanthate bis(pyridine) complexes , [Ni(S2COnBu)2.(C5H5N)2] (1), [Ni(S2COnBu)2.(3-Br- C5H4N)2] (2), [Ni(S2COnBu)2.(4-CN-C5H4N)2] (3), [Ni(S2COnBu)2.(3-Me-C5H4N)2] (4) [Ni(S2COnBu)2.(3-Cl-C5H4N)2 (5) [Cd(S2COnBu)2.(C5H5N)2] (6), [Cd(S2COnBu)2.(3-Cl- C5H4N)2 (7) [Mn(S2COnBu)2.(C5H5N)2] (8) and [Ni/Cd(S2COnBu)2.(C5H5N)2] (9), have been synthesized by simple chemical reaction. All the complexes were characterized by their melting points, elemental analyses, proton NMR, thermo gravimetric analyses and their structures were determined by single crystal X-ray analyses. Thermogravimetric analyses show that all precursors undergo facile thermal decomposition at moderate temperature to give NiS, CdS, Ni-CdS and MnS. These precursors were used for deposition of thin films of metal sulphides by Aerosole Assisted Chemical Vapour Deposition (AACVD). All the films deposited from these precursors were crystalline in nature and displayed substrate dependent morphology. Phase purity, particle size, thickness and elemental composition of thin films were determined by X-ray powder diffraction (XRPD), scanning electron microscopy (SEM), energy dispersive X-ray (EDX) and atomic force microscopy (AFM). The size of the nanoparticles deposited from these precursors was in the range of 43-58 nm2 which was dependent on thermal behaviour of each of the complex. Thin films of MnS could not be deposited from precursor (8) as it was non volatile and unsuitable for AACVD. High purity Ni-Cd mixed metal sulphide thin films were successfully grown from single source precursor (9) for various technological applications.