Скачать книгу

the organization questions the user, when appropriate, to allow user information that has been through the registration process, or how to go on related to the confirmation of the previous transaction wants to do.

       2.2.1.9 Machine Authentication

      Authentication of a machine is the authorization of automated communication from person-to-machine (M2M) by verification of digital certificates or digital credentials.

      Digital certificates used in machine permits are like a digital passport that provides a trustworthy identification for secure information exchange on the Web. Digital credentials are similar to types of ID and password issued by the machine.

       2.2.1.10 One-Time Password (OTP)

      A password is generated dynamically and is valid only once. The advantage of a one-time password is that if an intruder does not hack it, then he cannot use it anymore. There are two types of OTP generator traces: synchronous and asynchronous. One-time password (OTP) systems provide a mechanism for logging on to a network or service using a unique password that can only be used once, as the name suggests. The static password is the most common authentication method and the least secure.

       2.2.1.11 Authority

      The integrity of cloud computing needs an important information security to maintain relevant authority. It follows the following controls and privileges in the process stream in cloud computing. The rights management system should ensure that each role (including metadata) can see the need to obtain the data function. Access control should be based and the established role goes on and officers should be reviewed regularly. In general, the model of least privilege should be used, and the user and administrator only have the necessary rights for the CSP to enable them to achieve their functions [14].

       2.2.1.12 Global Authorization

      Subscribing to global organizations (as many as access control decisions) and rules and regulations (such as a limited user) must be lost locally. The decision should be two pieces of information provided. Subscribed virtual organizations are using the grid. In the early version of Globus software, subscription information will be found on the local network. The network [12] is mapped to the DN Mapfail account in that they require an account on all of the resources they wish to use. The authorization process performed on the Grid DAS side exploiting Community Authorization extensions (VO-based) present into the user's credentials (e.g., proxy).

      In this section, we propose a model system HERDescribes blurred system architecture keyword search.

      2.3.1 Role and Purpose of Design

       2.3.1.1 Patients

      They are institutions that you and your HERPlace it on the cloud server.

       2.3.1.2 Cloud Server

      A cloud server is a virtual server (rather than a physical server) running in a cloud computing environment.

       2.3.1.3 Doctor

      Accessing a patient‘s chart, a doctor gets summarized data including patient demographics, immunization dates, allergies, medical history, lab and test results, radiology images, vital signs, prescribed medications, and current health problems along with the health insurance plan and billing details.

Schematic illustration of the architecture for PHR system.

      2.4.1 Access Control

      The aim of the access control is to provide access only to those who are authorized to be in a building or workplace. Together with the matching metal key, the deadbolt lock was the gold standard of access control for many years, but modern enterprises want more. Yes, you want to check who is passing through your doors, but you also want to monitor and manage access. Keys now have passed the baton to computer based electronic access control systems that give authorized users fast and comfortable access and prohibit access to unauthorized persons.

      Today, we carry access cards or ID badges to secure places instead of keys. Access control systems may also be utilized in order to restrict access to workstations and file rooms containing sensitive information, printers, and portals. In bigger buildings, entrance to the external door is typically managed by a tenant or managing agency, but access to the internal office door is controlled by the tenant.

      Frequency of access: Frequency of Access control is a fundamental component of data security that dictates who‘s allowed to access and use

Schematic illustration of the data classification in cloud computing.

      Frequency of update: Update will update the data to be duplicated. Is it a low, medium, or result?

      Visibility and accessibility: The ability of one entity to “see” (i.e., have direct access to) another.

      A related concept: The lexical scope of a name binding is the part of the source code in which the name can refer to the entity

      Retention: Data retention, or record retention, is exactly what it sounds like—the practice of storing and managing data and records for a designated period of time. There are many reasons why a business might need to retain data: to maintain accurate financial records; to abide by local, state, and federal laws; to comply with industry regulations; to ensure that information is easily accessible for eDiscovery and litigation purposes; and so on. To fulfill these and other business requirements, it is imperative that every organization develops and implements data retention policies.

      2.4.2 Content

      These are data related to quality content modification. There are many properties that can make data content and can be classified into the following:

      Accuracy: Use high data accuracy can be classified as low or poor. High-content precision and accuracy, on the other hand, are required for some data elements.

      Reliability/Validity:

Скачать книгу