Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 5 , 2022
Detection of Unspecified Emergencies Using Controlled Information Sharing

Author : Karan Balasubramanian 1 Jefferd Jerald 2

Date of Publication :7th March 2016

Abstract: During Emergency situations in the Health care Domain, one of the main work is to manage the situation effectively the most essential requirement for handling the situation is sharing information. In this work, I present a flexible access Control Framework exploiting the complex event processing (CEP) technology which will constraint the controlled information sharing in the health care domain emergency situations. The main aim of this idea is to detect the emergencies that cannot be predicted by anomaly detection techniques, denied access request analysis and analysis of the history of permitted access requests.

Reference :

    1. LorenaCazorla, Cristina Alcaraz, and Javier Lopez. Towards automatic critical infrastructure protection through machine learning. In Eric Luiijf and Pieter Hartel, editors, Critical Information Infrastructures Security, volume 8328 of Lecture Notes in Computer Science.
    2. JanaBauckmann, Ulf Leser, Felix Naumann, and Veronique Tietz. Efficiently detecting inclusion dependencies. In In Int. Conf. on Data Engineering (ICDE 07). Poster, 2007.
    3. Alexandra Rostin, Oliver Albrecht, Jana Bauckmannr. A machine learning approach to foreign key discovery
    4. Eamonn Keogh, Jessica Lin, and Ada Fu. Hot sax: Efficiently finding the most unusual time series subsequence. USA, 2005.IEEE Computer Society
    5. M. S. Beigi, S.-F.Chang, S. Ebadollahi, and D. C. Verma. Anomaly detection in information streams without prior domain knowledge. IBM J. Res. Dev., 55(5):550– 560, September 2011.
    6. Ma’ayanGafny, AsafShabtai, LiorRokach, and Yuval Elovici. Detecting data misuse by applying context-based data linkageThreats ’10, pages 3–12, New York, NY, USA, 2010.
    7. M. A. C. Dekker and S. Etalle.Audit-based access control for electronic health records.Electron. Notes Theor. Comput. Sci., 168:221–236, February 2007.
    8. Nabil R. Adam, Vijay Atluri, Soon Ae Chun,. Secure information sharing and analysis for effective emergency management. dg.o ’08, pages 407–408, 2008
    9. Claudio A. Ardagna, Sabrina De Capitani Di Vimer. Access control for smarter healthcare using policy spaces.Comput.Secur., 29(8):848–858, November 2010
    10. A Ferreira, R Cruz-Correia, ,”. How to break access control in a controlled manner.” Washington, DC, USA, 2006. IEEE Computer Society

Recent Article