Browsing by Author "Kapis, Kosmas"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Cryptographic Approach to Patient Records Privacy Protection in Emergency Situations(2004-06) Kapis, Kosmas; Van Der Lubbe, Jan C.; Cartrysse, KathyThis paper presents cryptographic mechanisms for securing electronic medical patient records, EPRs in emergency situations. The mechanism maintains the EPR confidentiality during an emergency when a patient is unconscious and located outside any health provider, HP. In such situations any authorized health care practitioner, HCP can access all relevant medical records when needed. However, after such an emergency, it is impossible for anyone to access the patient’s EPR without the patient’s consent. This can be achieved by using a modified forward-secure signature and encryption algorithm used in two directions. After an emergency treatment, the patient’s consent is restored.Item Enhanced Authentication on Targeted Online Surveys: A Case of Online Course Evaluation System(Springer, 2011) Kapis, Kosmas; Korojelo, Sijali P.Online survey offers cheapest data collection and processing cost, efficient service, easy data processing and wide coverage over traditional paper-and-pencil surveys; due to this its adoption recently has been inevitable. However, despite the number of advantages an online questionnaire can offer, there are still a number of problems and challenges related to authentication that need to be closely addressed. Multiple submissions, respondent authenticity/validity, and respondent’s anonymity are among the issues that hinder the proliferation of online surveys. This paper addresses the aforementioned challenges and fills the left gap by improving previous works and later presents an online survey system which behaves well. The system considers also the problem of identity theft.Item Enhancing the Security of Electronic Medical Records Using Forward Secure Secret Key Encryption Scheme(2016) Kapis, Kosmas; Kambo, EdwinElectronic Medical Records (EMRs) pose a number of security challenges. Conventional cryptographic solutions have been used to protect the patients EMRs but with one major weakness; in an event where there is an exposure of a secret key, the secrecy of past and future encrypted data is void. This work concentrated on integrating the concept of forward secrecy in the protection of EMRs. In order to come up with the right integration, an experimental simulation has been carried out to evaluate the performance of forward secure and non-forward secure secret key encryption schemes. The study shows that only few cryptographic schemes that have implemented forward secrecy are used in the protection of EMRs, and very few of them use the forward secure secret key encryption scheme (FSSKES). The experiment also shows that the cost of running forward secure symmetric encryption is closely related to that of running non-forward secure symmetric encryption scheme (NFSSKES).Item A Framework for Deployment of Easy to Use Wireless Sensor Networks for Farm Soil Monitoring and Control: A case Study of Horticulture Farms in Pwani Region Tanzania(IJNCAA, 2015) Kapis, Kosmas; Ombeni, MathiasMonitoring and control of soil parameters such as temperature, moisture and micronutrients play an important role in producing quality horticulture crops. The farms at Pwani Region needed close monitoring and control of soil parameters because the type of soil in this place is alluvial which can drain water and loose macronutrients easily. Recently Wireless Sensor Network (WSN) has been used to monitors soil parameters, however many systems developed from existing frameworks were unable to meet requirements for small and medium scale horticulture farmers. This paper addresses the challenges mentioned above and provides solution that fits the left gap by improving previous frameworks. The gap was identified after comparing different WSN related technologies and requirements obtained from experts and farmers. The framework designed from this information was used to develop WSN system which can be easily used by farmers of different levels of education.Item Online Surveys System with Enhanced Authentication Intelligence: A Case of Online Course Evaluation System(The Society of Digital Information and Wireless Communication, 2012) Kapis, Kosmas; Korojelo, Sijali P.Online survey offers cheapest data collection and processing cost, efficient service, easy data processing and wide coverage over traditional paper-and-pencil surveys, due to this its adoption recently has been inevitable. However, despite the number of advantages an online questionnaire can offer, there are still a number of problems and challenges related to authentication that need to be closely addressed. Multiple submissions, respondent authenticity/validity, and respondent’s anonymity are among the issues that hinder the proliferation of online surveys. Many recent online survey systems are critically vulnerable to the challenges aforementioned. Foe example, Zhang and Hussein [11] and [2] respectively presented systems which tried to tackle the above addressed problems, but they were not successfully in tackling respondent validity problem of which still the intended respondent were able to access, fill and submit the survey. This paper addresses the aforementioned challenges and gives a solution that fills the left gap by improving previous named works and later presents an intelligent online survey system which behaves well in all aforementioned situations including an additional problem of identity theft.Item Security Mechanisms For Electronic Patient Records In Mobile Intelligent Services(MEDINF, 2003) Kapis, Kosmas; Van Der Lubbe, Jan C.The deficiencies found in conventional paper-based patient records, practiced in healthcare service provision, have resulted in the emerging development of electronic patient record (EPR) systems. This paper proposes a cryptographybased EPR security model guaranteeing the patient’s record integrity, accountability, confidentiality and patient record access consent. For this model several possible cryptographic security mechanisms are studied. The advantages and disadvantages of each scheme are considered, and based on the EPR requirements the mechanism with best results is suggested.Item Security Scheme for Electronic Patient’s Records Incorporating Full Privacy(2010) Kapis, Kosmas; Van Der Lubbe, Jan C.; Cartrysse, Kathy; Gedrojc, BartekThis paper presents an electronic patient record (EPR) security scheme that covers the privacy of patients and health care practitioners (HCPs). The scheme is designed such that it provides HCP’s privacy towards another HCP but revealable in disputes. Forward signature and encryption schemes are used to provide EPR integrity and confidentiality respectively. Furthermore, forward group signatures are used to provide privacy between HCPs.