期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Improving the Patient Discharge Planning Process through Knowledge Management by Using the Internet of Things
1
作者 Nitya Ahilandam Kamalanathan Alan Eardley +1 位作者 Caroline Chibelushi Tim Collins 《Advances in Internet of Things》 2013年第2期16-26,共11页
The UK National Health Service (NHS) is faced with problems of managing patient discharge and preventing the problems that result from it such as frequent readmissions, delayed discharge, long waiting lists, bed block... The UK National Health Service (NHS) is faced with problems of managing patient discharge and preventing the problems that result from it such as frequent readmissions, delayed discharge, long waiting lists, bed blocking and other such consequences. The problem is exacerbated by the growth in size, complexity and the number of chronic diseases in the NHS. In addition, there is an increase in demand for high quality care, processes and planning. Effective Discharge Planning (DP) requires practitioners to have appropriate, patient personalised and updated knowledge in order to be able to make informed and holistic decisions about a patients’ discharge. This paper examines the role of Knowledge Management (KM) in both sharing knowledge and using tacit knowledge to create appropriate patient discharge pathways. The paper details the factors resulting in inadequate DP, and demonstrates the use of Internet of Things (IoT) and Machine2Machine (M2M) as candidate technologies and possible solutions which can help reduce the problem. The use of devices that a patient can take home and devices which are perused in the hospital generate information, which can serve useful when presented to the right person at the right time, thus harvesting knowledge. The knowledge when fed back can support practitioners in making holistic decisions with regards to a patients’ discharge. 展开更多
关键词 National Health Service (NHS) Knowledge Management (KM) DISCHARGE Planning (DP) Internet of THINGS (IoT) machine2machine (M2M)
暂未订购
Fortifying the Digital Bastion: Pioneering Cybersecurity with Dynamic Secrets Management and CMDB Fusion in the Enterprise
2
作者 Gyani Pillala 《Journal of Information Security》 2024年第4期411-418,共8页
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus... In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity. 展开更多
关键词 Dynamic Secrets Management Logical Environments Configuration Management Database (CMDB) Secrets Orchestration M2M (Machine to Machine) Authentication/Authorization Developer Productivity
在线阅读 下载PDF
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications 被引量:1
3
作者 Wei Ren Linchen Yu +1 位作者 Liangli Ma Yi Ren 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期100-107,共8页
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A ... Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M's failure. This paper presents a Reliable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme, 展开更多
关键词 Machine to Machine (M2M) reliability security target distinguishing attack
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部