The UK National Health Service (NHS) is faced with problems of managing patient discharge and preventing the problems that result from it such as frequent readmissions, delayed discharge, long waiting lists, bed block...The UK National Health Service (NHS) is faced with problems of managing patient discharge and preventing the problems that result from it such as frequent readmissions, delayed discharge, long waiting lists, bed blocking and other such consequences. The problem is exacerbated by the growth in size, complexity and the number of chronic diseases in the NHS. In addition, there is an increase in demand for high quality care, processes and planning. Effective Discharge Planning (DP) requires practitioners to have appropriate, patient personalised and updated knowledge in order to be able to make informed and holistic decisions about a patients’ discharge. This paper examines the role of Knowledge Management (KM) in both sharing knowledge and using tacit knowledge to create appropriate patient discharge pathways. The paper details the factors resulting in inadequate DP, and demonstrates the use of Internet of Things (IoT) and Machine2Machine (M2M) as candidate technologies and possible solutions which can help reduce the problem. The use of devices that a patient can take home and devices which are perused in the hospital generate information, which can serve useful when presented to the right person at the right time, thus harvesting knowledge. The knowledge when fed back can support practitioners in making holistic decisions with regards to a patients’ discharge.展开更多
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus...In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.展开更多
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A ...Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme,展开更多
文摘The UK National Health Service (NHS) is faced with problems of managing patient discharge and preventing the problems that result from it such as frequent readmissions, delayed discharge, long waiting lists, bed blocking and other such consequences. The problem is exacerbated by the growth in size, complexity and the number of chronic diseases in the NHS. In addition, there is an increase in demand for high quality care, processes and planning. Effective Discharge Planning (DP) requires practitioners to have appropriate, patient personalised and updated knowledge in order to be able to make informed and holistic decisions about a patients’ discharge. This paper examines the role of Knowledge Management (KM) in both sharing knowledge and using tacit knowledge to create appropriate patient discharge pathways. The paper details the factors resulting in inadequate DP, and demonstrates the use of Internet of Things (IoT) and Machine2Machine (M2M) as candidate technologies and possible solutions which can help reduce the problem. The use of devices that a patient can take home and devices which are perused in the hospital generate information, which can serve useful when presented to the right person at the right time, thus harvesting knowledge. The knowledge when fed back can support practitioners in making holistic decisions with regards to a patients’ discharge.
文摘In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.
基金supported by the National Natural Science Foundation of China(No.61170217)the Open Research Fund from the Shandong Provincial Key Laboratory of Computer Network(No.SDKLCN-2011-01)Fundamental Research Funds for the Central Universities,China University of Geosciences(Wuhan)(No.110109)
文摘Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme,