Saturday, August 31, 2013

Cryptography and Modern Cryptography

The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes. This definition may be historically accurate, but it does not capture the essence of modern cryptography. First, it focuses solely on the problem of secret communication. This is evidenced by the fact that the definition specifies “codes”, elsewhere defined as “a system of prearranged signals, especially used to ensure secrecy in transmitting messages”. Second, the definition refers to cryptography as an art form. Indeed, until the 20th century (and arguably until late in that century), cryptography was an art. 

Constructing good codes, or breaking existing ones, relied on creativity and personal skill. There was very little theory that could be relied upon and there was not even a well-defined notion of what constitutes a good code. In the late 20th century, this picture of cryptography radically changed. A rich theory emerged, enabling the rigorous study of cryptography as a sci- ence. Furthermore, the field of cryptography now encompasses much more than secret communication. For example, it deals with the problems of mes- sage authentication, digital signatures, protocols for exchanging secret keys, authentication protocols, electronic auctions and elections, digital cash and more. 

In fact, modern cryptography can be said to be concerned with problems that may arise in any distributed computation that may come under internal or external attack. Without attempting to provide a perfect definition of modern cryptography, we would say that it is the scientific study of techniques for securing digital information, transactions, and distributed computations. Another very important difference between classical cryptography (say, be- fore the 1980s) and modern cryptography relates to who uses it. Historically, the major consumers of cryptography were military and intelligence organizations. Today, however, cryptography is everywhere! Security mechanisms that rely on cryptography are an integral part of almost any computer system. 

Users (often unknowingly) rely on cryptography every time they access a secured website. Cryptographic methods are used to enforce access control in multi user operating systems, and to prevent thieves from extracting trade secrets from stolen laptops. Software protection methods employ encryption, authentication, and other tools to prevent copying. The list goes on and on. In short, cryptography has gone from an art form that dealt with secret communication for the military to a science that helps to secure systems for ordinary people all across the globe. This also means that cryptography is becoming a more and more central topic within computer science.

Nasha (2013) Screenshots

Nasha
2013 Film
Nasha is 2013 Indian coming of age erotic thriller film directed by Amit Saxena. The film marks the bollywood debut of model Poonam Pandey and Shivam.
Initial release: July 26, 2013 (India)
Director: Amit Saxena
Genres: Erotica, Thriller















Continuity of Care Document (CCD)

Continuity of Care Document (CCD) describes constraints on the HL7 Clinical Document Architecture, Release 2 (CDA) specification in accordance with requirements set forward in ASTM E2369-05 Standard Specification for Continuity of Care Record (CCR). It is intended as an alternate implementation to the one specified in ASTM ADJE2369 for those institutions or organizations committed to implementation of the HL7 Clinical Document Architecture. The Continuity of Care Record (CCR) is a core data set of the most relevant administrative, demographic, and clinical information facts about a patient’s healthcare, covering one or more healthcare encounters.2 It provides a means for one healthcare practitioner, system, or setting to aggregate all of the pertinent data about a patient and forward it to another practitioner, system, or setting to support the continuity of care. CCD is just one type of CDA document. Other types of CDA documents can contain some of the same CCD sections, but different sections as well.

Clinical Document Architecture (CDA)



Clinical Document Architecture (CDA) is an HL7 document markup standard that specifies the structure and semantics of "clinical documents" for the purpose of exchange. CDA documents derive their machine processable meaning from the HL7 Reference Information Model (RIM) and use the HL7 Version 3 Data Types. CDA is a flexible XML-based clinical document architecture. CDA itself is not a specific document, but can be used to express many types of documents. A CDA document can contain many data sections, all of which contain narrative text, and some of which contain structured data elements, some of which are coded. There are many types of CDA documents, including CCD, XDS-MS Discharge Summary (HITSP C48), History and Physical (HITSP C84), Lab Report (HITSP C37), etc.

Top 20 EMR Vendors of 2012

PRIMARY CARE PHYSICIANS

FAMILY PRACTCE*GENERAL PRACTICE*PEDIATRICS*GERIATRICS
2012 TOP EMR VENDORS RANKED BY CLIENT SATISFACTION

Rank - EMR Vendor -Mean Score [0 (Lowest) To 10 (Highest)] - Total KPIs ranked #1

1 PRACTICE FUSION 9.42 9
2 GREENWAY MEDICAL 9.26 5
3 CARE360 QUEST 9.03 3
4 NEXTGEN 8.62
5 ADP ADVANCEDMD 8.55
6 CERNER 8.47
7 APRIMA 8.40
8 ENCOUNTER PRO 8.36
9 MCKESSON 8.32
10 AMAZINGCHARTS 8.29
11 SRS SOFT 7.85
12 SEVOCITY 7.83
13 ATHENAHEALTH 7.80
14 PRAXIS 7.77
15 ALLSCRIPTS 7.50
16 EPIC SYSTEMS 7.42
17 MICRO MD 7.34
18 ECLINICALWORKS 7.19
19 VITERA (SAGE) 7.08
20 BIZMATICS PROGNOCIS 7.02

Sample HL7 File

Sample Result file from CCHIT

MSH|^~\&|^CCHITLabs^L-CL|^CCHIT^L-CL|^^|^^|20100407121000||ORU^R01^ORU_R01|20100407121000|P|2.5.1|0001||AL||||MT-ORU-2_R1

PID|1|12|00000333^^^^AN||Grayson^Jim^^^^^L||19430309|M|||834 Ocean Vista Avenue^Apt. 202^Santa Monica^CA^90401||3105552233
ORC|RE|||3^EHR-System
OBR|1|3^EHR-System|LAB003^^CCHIT^L-CL|087-0714^Lipid Panel, Serum^99Lab^80061^Lipid Panel, Serum^C4|||20100407151000||||L|||||PRO1000#^Butler^Internist^E^^Dr^MD^^^^^^EI||||RO||20100407121000|||F
OBX|1|NM|13457-7^LDL Cholesterol^LN||90|mg/dL|< 99||||F|||||^DOE^JOHN|||||||AccuLabs^^^^^CLIA^^^^10D987432|432 Administration Ave.^^St. Louis^MO^63146|^Smith^John^^^Dr.^MD
NTE|0|L|
OBX|2|NM|14646-4^HDL Cholesterol^LN||60|mg/dL|40-59|H|||F|||||^DOE^JOHN|||||||AccuLabs^^^^^CLIA^^^^10D987432|432 Administration Ave.^^St. Louis^MO^63146|^Smith^John^^^Dr.^MD
NTE|0|L|
OBX|3|NM|14647-2^Total Cholesterol^LN||120|mg/dL|< 199||||F|||||^DOE^JOHN|||||||AccuLabs^^^^^CLIA^^^^10D987432|432 Administration Ave.^^St. Louis^MO^63146|^Smith^John^^^Dr.^MD
NTE|0|L|
OBX|4|NM|14927-8^Triglycerides^LN||100|mg/dL|< 149||||F|||||^DOE^JOHN|||||||AccuLabs^^^^^CLIA^^^^10D987432|432 Administration Ave.^^St. Louis^MO^63146|^Smith^John^^^Dr.^MD
NTE|0|L|


Example HL7 Message


HL7 messages are in human-readable (ASCII) format, though they may require some effort to interpret.


Each HL7 message consists of one or more segments. A carriage return character (\r, which is 0D in hexadecimal) separates one segment from another. Each segment is displayed on a different line of text. (as seen in the sample HL7 message below)


Each HL7 segment consists of one or more composites (also known as fields). A pipe (|) character is used to separate one composite from another.


If a composite contains other composites, these sub-composites (or sub-fields) are normally separated by ^ characters.



Sample HL7 message:


MSH|^~\&|EPIC|EPICADT|SMS|SMSADT|199912271408|CHARRIS|ADT^A04|1817457|D|2.5|

PID||0493575^^^2^ID 1|454721||DOE^JOHN^^^^|DOE^JOHN^^^^|19480203|M||B|254 MYSTREET AVE^^MYTOWN^OH^44123^USA||(216)123-4567|||M|NON|400003403~1129086|
NK1||ROE^MARIE^^^^|SPO||(216)123-4567||EC|||||||||||||||||||||||||||
PV1||O|168 ~219~C~PMA^^^^^^^^^||||277^ALLEN MYLASTNAME^BONNIE^^^^|||||||||| ||2688684|||||||||||||||||||||||||199912271408||||||002376853