.

An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems

LAUR Repository

Show simple item record

dc.contributor.author Boukhari, Bahia
dc.date.accessioned 2022-08-31T08:03:43Z
dc.date.available 2022-08-31T08:03:43Z
dc.date.copyright 2019 en_US
dc.date.issued 2019-12-03
dc.identifier.uri http://hdl.handle.net/10725/13974
dc.description.abstract The immense improvements in the latest internet inventions encouraged the adaptation of technology within the healthcare sector. The healthcare systems storing highly sensitive information can be targeted by attackers aiming to insert, delete, or modify the data stored. These malicious activities may cause serious harm to the database accessibility and lead to catastrophic long-term harm to the patients' health. Since the adaptation of the most advanced security paradigm does not guarantee a full protection. Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. Within the scope of the damage assessment and recovery, several matrix based, cluster based, and graph based models were introduced. We propose a new hash based technique that is capable of correctly assessing the damage and recovering the database within a suitable time frame and efficient utilization of memory. Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models. en_US
dc.language.iso en en_US
dc.subject Data recovery (Computer science) en_US
dc.subject Information warfare en_US
dc.subject Computer algorithms en_US
dc.subject Database security en_US
dc.subject Lebanese American University -- Dissertations en_US
dc.subject Dissertations, Academic en_US
dc.title An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems en_US
dc.type Thesis en_US
dc.term.submitted Fall en_US
dc.author.degree MS in Computer Science en_US
dc.author.school SAS en_US
dc.author.idnumber 201604173 en_US
dc.author.commembers Habre, Samer
dc.author.commembers Mourad, Azzam
dc.author.department Computer Science And Mathematics en_US
dc.description.physdesc ix, 85 leaves: ill. en_US
dc.author.advisor Haraty, Ramzi
dc.keywords Damage Assessment en_US
dc.keywords Database Recovery en_US
dc.keywords Information Warfare en_US
dc.keywords Malicious Transactions en_US
dc.keywords Transactions Dependency en_US
dc.description.bibliographiccitations Bibliography: leaves 80-85. en_US
dc.identifier.doi https://doi.org/10.26756/th.2022.436
dc.author.email bahia.boukhari@lau.edu en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php en_US
dc.publisher.institution Lebanese American University en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account