dc.contributor.author |
Boukhari, Bahia |
|
dc.date.accessioned |
2022-08-31T08:03:43Z |
|
dc.date.available |
2022-08-31T08:03:43Z |
|
dc.date.copyright |
2019 |
en_US |
dc.date.issued |
2019-12-03 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/13974 |
|
dc.description.abstract |
The immense improvements in the latest internet inventions encouraged the adaptation of technology within the healthcare sector. The healthcare systems storing highly sensitive information can be targeted by attackers aiming to insert, delete, or modify the data stored. These malicious activities may cause serious harm to the database accessibility and lead to catastrophic long-term harm to the patients' health. Since the adaptation of the most advanced security paradigm does not guarantee a full protection. Also, it is possible that the attack is not directly detected. Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent
medical database. Within the scope of the damage assessment and recovery, several matrix based, cluster based, and graph based models were introduced. We propose a new hash based technique that is capable of correctly assessing the damage and recovering the database within a suitable time frame and efficient utilization of memory. Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models. |
en_US |
dc.language.iso |
en |
en_US |
dc.subject |
Data recovery (Computer science) |
en_US |
dc.subject |
Information warfare |
en_US |
dc.subject |
Computer algorithms |
en_US |
dc.subject |
Database security |
en_US |
dc.subject |
Lebanese American University -- Dissertations |
en_US |
dc.subject |
Dissertations, Academic |
en_US |
dc.title |
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems |
en_US |
dc.type |
Thesis |
en_US |
dc.term.submitted |
Fall |
en_US |
dc.author.degree |
MS in Computer Science |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
201604173 |
en_US |
dc.author.commembers |
Habre, Samer |
|
dc.author.commembers |
Mourad, Azzam |
|
dc.author.department |
Computer Science And Mathematics |
en_US |
dc.description.physdesc |
ix, 85 leaves: ill. |
en_US |
dc.author.advisor |
Haraty, Ramzi |
|
dc.keywords |
Damage Assessment |
en_US |
dc.keywords |
Database Recovery |
en_US |
dc.keywords |
Information Warfare |
en_US |
dc.keywords |
Malicious Transactions |
en_US |
dc.keywords |
Transactions Dependency |
en_US |
dc.description.bibliographiccitations |
Bibliography: leaves 80-85. |
en_US |
dc.identifier.doi |
https://doi.org/10.26756/th.2022.436 |
|
dc.author.email |
bahia.boukhari@lau.edu |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/thesis.php |
en_US |
dc.publisher.institution |
Lebanese American University |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |