首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
电子病历等医疗数据是宝贵资源,其共享和使用为开展科研和制定决策提供支持,但在这过程中可能会侵犯患者隐私权。为了共享电子病历和保护患者隐私,利用区块链技术研究了电子病历的访问控制方法。分析了区块链的基本结构,设计了电子病历访问控制模型,采用区块链和密码技术,防止电子病历数据被篡改和泄露。实验结果表明,本访问控制方法能够抵抗身份伪装攻击,防止隐私泄露,实现医疗数据的安全共享和高效访问。  相似文献   

2.
针对目前互联网上虚假信息盛行,患者在互联网上交流时无法保证共享信息真实性的问题,提出了一种基于区块链的患者在线交流模型,患者可以匿名与其他患者共享真实的医疗数据并进行交流.首先,使用患者的数字身份保护隐私,将患者交流所需要的医疗摘要数据上传至区块链,并且公开全部数据以供检索,可以使患者检索到需要的病例而不会定位到具体的患者;其次,为了避免授权人员的恶意上传行为,设定智能合约对数据上传进行多重身份认证,医生和患者相互制约,保证链上数据全部真实可靠;最后,改进的RAFT共识算法可以快速识别拜占庭节点从而更好地使区块链达成共识.通过实验对模型性能进行评估,结果表明该模型在保证患者隐私的前提下,可以进行医疗数据的共享,满足患者在线交流需求.  相似文献   

3.
医院正在逐渐采用电子健康记录(EHR)的方式去记录患者的医疗信息。然而,医疗数据的隐私性和EHR标准的差异化阻碍了医疗数据在病人和医院之间的共享。因此,针对隐私信息泄露和难于共享的问题,提出了一个基于联盟链的隐私保护数据共享模型。此外,基于匿名算法提出了(p,α,k)匿名隐私算法,能够解决EHR隐私信息泄露的问题。通过理论分析和实验证明,提出的基于联盟链和(p,α,k)隐私匿名算法模型能够在保护数据隐私的前提下,实现病人和医院之间的数据安全共享。对比前人的模型,该模型具有所需节点少、减少主链压力、容错性强和病人对EHR完全控制等优势。  相似文献   

4.
医疗健康数据的共享对国家医保资金监管、解决医疗纠纷以及医学研究具有重大意义。医疗健康数据共享平台应保证相关数据的真实性和隐私性,以免数据受到泄露、篡改,同时患者对自身医疗健康数据的所有权应得到足够重视。本文设计一种基于以太坊区块链的医疗健康数据共享系统,利用区块链技术来保证相关信息的透明度和不可篡改,同时还使用IPFS来弥补区块链存储压力大的短板以提高系统性能,并使用CP-ABE加密和环签名等技术来保证数据的安全性和用户身份信息的隐私性。经测试表明,该系统针对不同用户角色提供了完善的相关功能,患者具有自身数据的掌控权,同时能够提供较好的数据安全性以及用户身份信息隐私性。  相似文献   

5.
为解决医疗数据流场景存在的数据共享不灵活和医患关系泄漏问题,提出一种基于区块链的医疗数据流共享方案。提出基于密钥生成树的密钥管理策略和密钥搜索策略,用户可根据自身需求使用密钥流加密医疗数据且灵活地共享数据。此外,基于密码学原语提出有效的协议保护区块链上医生和患者的身份信息,实现医患关系隐私保护。安全分析和实验结果分析表明,所提方案可以实现医疗数据流安全和灵活的共享,以及医患关系的隐私保护。  相似文献   

6.
基于双区块链的医疗记录安全存储与共享方案   总被引:1,自引:0,他引:1  
在当前的医疗信息化建设中,电子医疗记录的存储与共享给病人带来了隐私泄露的风险,从而造成名誉损害和财产损失。现有的多数保护隐私的医疗记录存储与共享方案使用了中心化的管理节点,容易遭受集中攻击导致单点失效和恶意篡改的威胁。针对这些问题,设计了一个双区块链结构的医疗记录安全存储与共享方案 EMRSBC,其中使用2条联盟链分别用于医疗记录存储与共享。该方案解决了传统单链应用中拓展性差、吞吐量低的问题,将医疗记录的共享与存储分开,利用区块链的去中心化特性以及智能合约的链上代码实现在不可信环境中的访问控制,有效地保护了病人的隐私数据在存储与共享过程中的安全性。  相似文献   

7.
针对车联网环境下,车辆节点快速移动造成的中心服务器认证效率低、车辆隐私保护差等问题,提出了一种基于区块链的车联网安全认证协议。该协议利用Fabric联盟链存储车辆临时公钥与临时假名,通过调用智能合约,完成车辆身份认证,同时协商出会话密钥,保证通信过程中数据的完整性与机密性;利用假名机制有效避免了车辆在数据传输过程中身份隐私泄露的风险;使用RAFT共识算法高效达成数据共识。经安全性分析与实验结果表明,所提协议具有抵抗多种网络攻击的能力,且计算开销低、区块链存储性能好,能够满足车联网通信的实时要求。  相似文献   

8.
为解决医疗数据的泄露或恶意被窜改以及医疗纠纷问题,提出一种基于区块链的医疗数据隐私保护方法。利用哈希算法加密患者的身份信息,治疗结果通过AES(advanced encryption standard)算法加密,而AES的密钥使用ECC(ellipse curve ctyptography)算法加密,所有的加密密钥、治疗结果、患者身份信息存储到联盟链上。采用群签名技术追溯签名医院,群管理员可以解密医疗数据,将其作为重要依据协助第三方解决医疗纠纷。效率分析表明,在安全性相同情况下,该方法较的加/解密效率比对比方案分别提高了14%和46%,同时分析了群签名各类算法的时间开销。通过与同类方法对比,该方法既可实现患者身份、医疗数据的分类隐私保护,又可保证交易存储开销是合理的,在医疗数据隐私保护领域具有一定的应用价值。  相似文献   

9.
针对当前各医疗相关机构间数据共享困难、数据隐私易泄露等问题,提出了一个基于区块链的电子医疗病历(EHR)共享方案。首先,基于区块链不可篡改、去中心化、分布式存储的特点,设计了基于区块链的EHR数据共享模型,采用区块链网络和分布式数据库共同存储加密的EHR及相关访问控制策略,防止EHR数据被篡改和泄露;其次,将分布式密钥生成(DKG)技术与基于身份的代理重加密(IBPRE)技术相结合,设计了数据安全共享协议,协议使用委托权益证明(DPOS)算法选取代理节点,重加密EHR,实现单对用户间的数据共享。安全性分析表明,所提方案能够抵抗身份伪装和重放攻击。仿真实验与对比分析表明,DPOS算法的效率高于工作量证明(POW)算法,略低于实用拜占庭容错(PBFT)算法,但所提方案去中心化程度更高,耗费算力较小。  相似文献   

10.
隐私保护已经成为区块链技术真正从理论到现实应用必须解决的关键问题。实际应用中存在一种按需披露的隐私保护需求,受组播安全通信机制的启发,提出一种按需披露的区块链隐私保护机制(PPM-ODB,privacy protection mechanism of on-demand disclosure on blockchain)。该机制通过改进基于RSA的匿名多接收者加密方案来实现隐私信息一对多的加解密、知情者的匿名性保护和隐私泄露的可追溯,通过采用Quorum链隐私保护机制来实现密钥在隐私信息拥有者和知情者间的安全高效分发。实验证明了PPM-ODB机制可保证隐私数据的保密性,及其在时间和存储开销上的优越性,并建议知情者的个数少于100,以获得良好的用户体验。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号