سیر گری اور ترمینل نمبر1
قاہرہ سے شرم الشیخ جانے کے لیے نیل نامی ہوائی کمپنی کے جہاز میں محمد علی نے میرے ساتھ سفر کرنا تھا جلد ہی ہم دونوں میں ذہنی ہم آہنگی پیدا ہوئی اور مصریوں کے بارے میں میری رائے اچھی بننے لگی ۔قاہرہ کے ائیر پورٹ کے ترمینل نمبر 1پر عجیب چہل پہل تھی ، بھانت بھانت کے لوگ ،بھانت بھانت کی بولیاں بولتے عجیب و غریب لباس زیب تن کیے جوق در جوق اس ترمینل کی انتظار میں ٹولیوں کی شکل میں بیٹھے تھے۔سرخ،کالے ،بھورے ،زرد جتنے انسانوں کے رنگ اس سے زیادہ بولیاں ۔مسافر نے کرنسی تبادلے کی دکان پر موجود ایک خوش گفتار مصری سے پوچھا کہ یہ لوگ کن کن علاقوں سے یہاں آتے ہیں اور اس ترمینل سے کس منزل کی طرف جا رہے ہیں؟۔جواب ملا کہ دنیا بھر سے آتے ہیں؟مگر زیادہ تر لوگ روس سے آتے ہیں ۔میرے استفسار پر کہ اس ترمینل میں رقوم کے تبادلے کی کتنی دکانیں ہیں،اس نے کہا چار ۔پوچھنے پر پتہ چلا کہ صرف ایک دکان پر روزانہ تقریباََایک لاکھ امریکی ڈالر مصری پائونڈ میں تبدیل ہوتے ہیں چار دکانوں پر یہ تبادلہ ماہانہ ایک کڑو ر بیس لاکھ تک ہوتا ہو گا یہ آمدنی صرف سیر گری سے حاصل ہو رہی ہے ۔اس ترمینل سے اسکندریہ اور شرم الشیخ کی طرف صرف ان جہازوں کو اڑان بھرنے کی اجازت تھی جو مصری عوام و حکومت کی ملکیت میں تھے اور جہازوں کے کرائے بھی ان سیاحوں نے ڈالر وں میں بھرنے ہوتے ہیں ۔
مسافر نے سال پہلے عصرِ حاضر کے ’’مہا گرو‘‘اور ’’استاذالاساتذہ ‘‘ Googleجس کے شاگرد قریہ قریہ ،کوچہ کوچہ ا ور یم بہ یم پائے جاتے ہیں ،سے پوچھا کہ انسان سیر گری پر سالانہ کتنا خرچ کرتا...
Islam recognizes the right of individual ownership of material things in this world. A person can hold all kinds of Halal material things in his individual possession. However, Islamic Shari'a doesn't allow such a concept of individual ownership which is given in Capitalism and as adopted by Western world. The Western world's concept about individual ownership is very liberal and without any restrictions. While, Islam doesn't give full liberty to any individual but rather instructs them to own and possess Halal material things via legitimate sources, and also instructs the right usage of these material things in the light of Qur'an and Sunnah. The benefit of this Islamic law is that disqualified individuals, such as an insane person or children, have no right on disposing his or her individual property. Similarly, in the eyes of Islam, an individual person is not allowed to dispose his or her property in such a way which causes trouble and inconvenience to others, for example a person cannot dig a well on his own land which causes trouble and inconvenience to others. Islam prohibits such disposing of an individual's property.
Health of patient is important in every aspect of life. Technology has played a vital role in providing the solutions for health. Many of E-Health software have been designed to provide benefit in the field of E-Health technology. E-Health is considered to be the critical and confidential domain because the record might be misused. E-Health technologies can be considered as the effective, reasonable and result oriented framework. The designed E-Health software are mostly focusing on the areas like record keeping, diagnostic, treatment, and medication. The mentioned areas are important too but the security and privacy of the patient record is the core significant aspect. Authentication schemes are specifically designed to give user access privileges and secure patient`s confidential medical records. Many authentication schemes have been used with embedded E-Health software to give access to trained operators for the purpose of providing better cure against diseases. A large number of single and multi-factor authentication schemes are functioning but multi-factor authentication schemes are more secure than the single factor, which are unfortunately rare in use. The main objective is to propose an appropriate solution for the scheme in E-Health systems, for its formal use. The beauty of this scheme is the combination of most frequently used factors like Identity, password, smart card, mobile device and biometric characteristics of the user. The user has all these security and privacy measures along with strongly integrated factors which are contributing for the better availability and usage of the given scheme. It also takes care against different attacks like online or offline password guessing attack, stolen verifier attack, man-in-the-middle attack. Proposed scheme tested and verified by one of the trust worthy software engineering tools and techniques called formal methods and high level protocol specification language using AVISPA tool. Results guarantee the security, reliability, efficacy and effectiveness of proposed authentication scheme. For this purpose, system accessibility, user privileges would be flexible, feasible and controllable according to the prospective of application users. End users of E-Health systems could be patients, doctors, para-medical staff and administration. Due to its variety of login credentials on the basis of criticality of different users, organizations include government, semi-government and private healthcare centres develop their information security and accessibility policies according to context of socio-economic benefit. Joint authentication model for situation variant is the best choice for E-Health software.