Hospital security and safety management最新文献

筛选
英文 中文
Digital Identity, Privacy Security and their Legal Safeguards in the Metaverse 虚拟世界中的数字身份、隐私安全及其法律保障
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023011
Wenxiang Zhang, Hong Wu
{"title":"Digital Identity, Privacy Security and their Legal Safeguards in the Metaverse","authors":"Wenxiang Zhang, Hong Wu","doi":"10.1051/sands/2023011","DOIUrl":"https://doi.org/10.1051/sands/2023011","url":null,"abstract":"The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine and other technologies that interact with human behaviour and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioural regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"159 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74301775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Security Challenges of The "Metaverse" “虚拟世界”的安全挑战
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023010
Shiya Liu
{"title":"The Security Challenges of The \"Metaverse\"","authors":"Shiya Liu","doi":"10.1051/sands/2023010","DOIUrl":"https://doi.org/10.1051/sands/2023010","url":null,"abstract":"This work take a comprehensive look at the security issues that may be faced in an emerging field, \"Metaverse\". Starting from the physical construction basis of “Metaverse”, I firstly give a general introduction to the possible security issues faced by “Metaverse” in the areas of hardware, software, system, platform, etc., then discuss the specific security issues in terms of endogenous and technical support, and finally conclude from the perspectives of technology, regulation and discourse.\u0000","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing China’s Independent Knowledge System in the Digital Era 构建数字时代中国自主知识体系
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023008
Hong Zou
{"title":"Constructing China’s Independent Knowledge System in the Digital Era","authors":"Hong Zou","doi":"10.1051/sands/2023008","DOIUrl":"https://doi.org/10.1051/sands/2023008","url":null,"abstract":"Since last year, the Metaverse concept has incredibly become a hot topic from both industrial and societal perspectives pushed by various parties and factors. Meanwhile, the phenomenal growth of information technologies such as Web3.0, DAO, StarLink, AIGC, etc. has also attracted great attention from both industry and academia. Although worth exploring, they are somewhat exacerbated by the hype of speculative capital. If we break free from the switching hot topics and calm our mind down, we will find a problem that China often lacks its own discourse system in spite of its arrival as a major tech power. We tend to “follow the crowd”. As a latecomer in information technology, the key to harnessing China’s “latecomer’s advantage” lies in getting rid of “path dependence” which is all about establishing an independent knowledge system and discourse system as well as setting up a “Chinese school” in the information field.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73659378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of the application of digital identity in the metaverse 数字身份在虚拟世界中的应用综述
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023009
Siwen Wang, Wei Wang
{"title":"A review of the application of digital identity in the metaverse","authors":"Siwen Wang, Wei Wang","doi":"10.1051/sands/2023009","DOIUrl":"https://doi.org/10.1051/sands/2023009","url":null,"abstract":"The development of Internet has further expanded people's social scope. Digital identity has been widely used. In social networks, the use of anonumity or pseudonym heightens the charm of the network. Nevertherless, when online payments, online transactions and online assets began to enter the Internet, the negative impact of virtualization ahas gradually emerged. As an individual's maker in Metaverse, digital identity may become a key factor to balance the association between anonymity and pseudonym. To sort out the current situation and possibility of the use of digital identity, this paper takes the appliction of digital identity in metaverse, and uses the \"Enterprise IA\" miniature model of Morey et al. . We analyzed the focus of the current debate on digital identity, hoping to reflect on the new problems on the basis of exploring the application rules of digital identity. The article belived that the nature of the metaverse is the digitalization of the physical word. Futhermore, the fundamental issue of digital identity is still the issue of power ownership. With the help of blockchain, privacy filter and other technologies, we can not only change the governance logic and methods, but also balance the correlation between private rights and public interests. We can explore new governance approaches to deal with the growing identity trust crisis, individual competition for identity authorization rights, and privacy problems in Metaverse.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86864510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Challenges of AI to Cognitive Security and Safety 论人工智能对认知安全的挑战
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023012
Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue
{"title":"On Challenges of AI to Cognitive Security and Safety","authors":"Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue","doi":"10.1051/sands/2023012","DOIUrl":"https://doi.org/10.1051/sands/2023012","url":null,"abstract":"Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85866469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copyright Protection on NFT Digital Works in the Metaverse 虚拟世界中NFT数字作品的版权保护
Hospital security and safety management Pub Date : 2023-05-15 DOI: 10.1051/sands/2023013
Yupeng Dong, Chunhui Wang
{"title":"Copyright Protection on NFT Digital Works in the Metaverse","authors":"Yupeng Dong, Chunhui Wang","doi":"10.1051/sands/2023013","DOIUrl":"https://doi.org/10.1051/sands/2023013","url":null,"abstract":"Non fungible token (NFT) emerges with the marvelous explosion of the Metaverse. NFT digital products are profoundly impacting the existing copyright system, which needs to be amended and responded in time. There is a possibility that it would completely change the distribution pattern of rights and interests in the field of copyright law. Currently, the legal nature of the casting and trading of NFT digital products still remains controversial. The liability of NFT digital product creators as well as service platforms is required to be further identified accordingly. this article starts with the analysis of the right attributes of NFT digital products based on intellectual property law. Subsequently, the related legal issues and countermeasures are discussed, including the exhaustion of the right-holders, the duty of care of the platform, and the assumption of tort liability arising from the transaction. It is suggested that the NFT digital products should be treated with considerable caution and the legal system of NFT digital products should be constructed in the near future.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86106003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards building a firm metaverse security base 朝着建立稳固的虚拟世界安全基础迈进
Hospital security and safety management Pub Date : 2023-04-19 DOI: 10.1051/sands/2023005
Anmin Li, Xiaohui Yao, Haiying Gu, Yungeng Zhang, Yuan Chang
{"title":"Towards building a firm metaverse security base","authors":"Anmin Li, Xiaohui Yao, Haiying Gu, Yungeng Zhang, Yuan Chang","doi":"10.1051/sands/2023005","DOIUrl":"https://doi.org/10.1051/sands/2023005","url":null,"abstract":"Metaverse is a significant field that is currently receiving considerable attention from both industry and academia. The transformation of the metaverse from science fiction to reality is actively promoted by technology, industry, and capital. However, metaverse development is still in its early stages. The system architecture and theoretical technology of the metaverse are not yet mature. This paper provides a comprehensive analysis of the metaverse and summarizes its holographic, omnipotent, multidimensional, and multifaceted characteristics. Development of the metaverse is founded on the pertinent infrastructure.\u0000We elaborate on the primary components of the metaverse infrastructure and summarize the security risks inherent in the metaverse infrastructure in a systematic manner. On this basis, we propose to utilize the system security technology concept as a guide to build a metaverse security protection system from various perspectives at each level of computing,cloud, network, digital assets, and terminals in order to construct a secure foundation for addressing the metaverse security risks and challenges.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72568932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Perfect Secrecy to Perfect Safety & Security: Cryptography-Based Analysis of Endogenous Security 从完全保密到完全安全:基于密码学的内生安全分析
Hospital security and safety management Pub Date : 2023-04-17 DOI: 10.1051/sands/2023004
Liang Jin, Xiaoyan Hu, Jiangxing Wu
{"title":"From Perfect Secrecy to Perfect Safety & Security: Cryptography-Based Analysis of Endogenous Security","authors":"Liang Jin, Xiaoyan Hu, Jiangxing Wu","doi":"10.1051/sands/2023004","DOIUrl":"https://doi.org/10.1051/sands/2023004","url":null,"abstract":"In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84855480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Communications "N + 1 dimensionality" Endogenous Anti-Jamming: Theory and Techniques 无线通信“N + 1维”内生抗干扰:理论与技术
Hospital security and safety management Pub Date : 2023-04-02 DOI: 10.1051/sands/2023003
Yonggang Zhu, F. Yao, Yifu Sun, Wenlong Guo
{"title":"Wireless Communications \"N + 1 dimensionality\" Endogenous Anti-Jamming: Theory and Techniques","authors":"Yonggang Zhu, F. Yao, Yifu Sun, Wenlong Guo","doi":"10.1051/sands/2023003","DOIUrl":"https://doi.org/10.1051/sands/2023003","url":null,"abstract":"The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security, this paper investigates the core issues of endogenous security in the electromagnetic space, namely, endogenous anti-jamming (EAJ), which can defend against the unknown electromagnetic attacks effectively. Specifically, the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum, intelligent, and endogenous anti-jamming, in which both the intrinsic development law of each technique and the internal logic between them are revealed. Then, the fundamental concept, key techniques, and development suggestions of wireless communication \"N+1 dimensionality\" endogenous anti-jamming are proposed to seek a disruptive breakthrough.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4007 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86696685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An accurate identification method for network devices based on spatial attention mechanism 基于空间注意机制的网络设备准确识别方法
Hospital security and safety management Pub Date : 2023-03-23 DOI: 10.1051/sands/2023002
Xiuting Wang, Ruixiang Li, Shaoyong Du, X. Luo
{"title":"An accurate identification method for network devices based on spatial attention mechanism","authors":"Xiuting Wang, Ruixiang Li, Shaoyong Du, X. Luo","doi":"10.1051/sands/2023002","DOIUrl":"https://doi.org/10.1051/sands/2023002","url":null,"abstract":"With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which poses a major threat to the management and security protection of network equipment. At present, the mainstream method of network equipment identification in the metaverse is to obtain the network traffic data generated in the process of device communication, extract the device features through analysis and processing, and identify the device based on a variety of learning algorithms. Such methods often require manual participation, and it is difficult to capture the small differences between similar devices, leading to identification errors. Therefore, we propose a deep learning device recognition method based on spatial attention mechanism. Firstly, we extract the required feature fields from the acquired network traffic data. Then, Then, we normalize the data and convert it into grayscale images. After that, we add spatial attention mechanism to CNN and MLP respectively to increase the difference between similar network devices and further improve the recognition accuracy. Finally, we identify device based on the deep learning model. A large number of experiments were carried out on 31 types of network devices such as web cameras, wireless routers and smartwatches. The results show that the accuracy of the proposed recognition method based on spatial attention mechanism is increased by 0.8% and 2.0%, respectively, compared with the recognition method based only on deep learning model under the CNN and MLP models. The method proposed in this paper is significantly superior to the existing method of device type recognition based only on deep learning model.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86237774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信