Secure SMS messaging using Quasigroup encryption and Java SMS API
|
|
- Roderick Glenn
- 6 years ago
- Views:
Transcription
1 Secure SMS messaging using Quasigroup encryption and Java SMS API Marko Hassinen, Smile Markovski University of Kuopio, Finland SS Cyril and Methodius University, Republic of Macedonia SPLST 2003 Kuopio, Finland p.1/18
2 Contents Motivation Definition of the encryption method Application structure Performance figures Conclusions and Future Work SPLST 2003 Kuopio, Finland p.2/18
3 Motivation SMS message can go to a wrong number SPLST 2003 Kuopio, Finland p.3/18
4 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted SPLST 2003 Kuopio, Finland p.3/18
5 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost SPLST 2003 Kuopio, Finland p.3/18
6 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost The operator can have malicious employees SPLST 2003 Kuopio, Finland p.3/18
7 Motivation SMS message can go to a wrong number Traffic is sometimes not encrypted The device with messages in it may get lost The operator can have malicious employees Authentication of receiver SPLST 2003 Kuopio, Finland p.3/18
8 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect SPLST 2003 Kuopio, Finland p.4/18
9 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. SPLST 2003 Kuopio, Finland p.4/18
10 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. A quasigroup can be characterised with a that is an matrix where each row and column is a permutation of elements of a set SPLST 2003 Kuopio, Finland p.4/18
11 Quasigroup encryption A groupoid is a finite set to an operator that is closed with respect A quasigroup is a groupoid with unique left and right inverses. A quasigroup can be characterised with a that is an matrix where each row and column is a permutation of elements of a set The encryption primitive defined as on sequence where is SPLST 2003 Kuopio, Finland p.4/18
12 Decryption SPLST 2003 Kuopio, Finland p.5/18 is defined as,where Decryption
13 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18
14 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18
15 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18
16 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18
17 Decryption Decryption is defined as,where As an example encrypting a bitsequence with a quasigroup of order 4 ( = 01): SPLST 2003 Kuopio, Finland p.5/18
18 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. SPLST 2003 Kuopio, Finland p.6/18
19 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is SPLST 2003 Kuopio, Finland p.6/18
20 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is There are at least 288 latin squares of order 4, but more than of order 16. SPLST 2003 Kuopio, Finland p.6/18
21 Some words about security Encryption is a composition of primitives and which are characterised by a variable length passprhase. The amount of different latin squares of order is There are at least 288 latin squares of order 4, but more than of order 16. A Latin square of order 16 has 256 entries that can be stored in 128 bytes. SPLST 2003 Kuopio, Finland p.6/18
22 J2ME as an application environment J2ME (Java 2 Micro Edition) is a runtime environment designed for devices with limited resources MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18
23 J2ME as an application environment Basic language features and libraries are in the CLDC (Connected Limited Device Configuration). MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18
24 J2ME as an application environment Mobile Information Device Profile (MIDP) provides additional functionality for a specific type of device. MIDP APPLICATIONS MIDP OEM SPECIFIC APPLICATIONS OEM SPECIFIC CLASSES NATIVE APPLICATIONS CLDC NATIVE SOFTWARE DEVICE SPLST 2003 Kuopio, Finland p.7/18
25 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it SPLST 2003 Kuopio, Finland p.8/18
26 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them SPLST 2003 Kuopio, Finland p.8/18
27 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them 3. Operate fast enough to provide acceptable service in an environment with very limited processing power like a mobile phone SPLST 2003 Kuopio, Finland p.8/18
28 Application requirements The requirements for the application were to 1. Encrypt an SMS message using quasigroup encryption and send it 2. Receive encrypted messages and decrypt them 3. Operate fast enough to provide acceptable service in an environment with very limited processing power like a mobile phone 4. Be compact enough for use in mobile phone memory space SPLST 2003 Kuopio, Finland p.8/18
29 Architecture of CryptSMS software QX.java NokiaSMSHandler.java OutgoingTextMessage.java NokiaDebugLog.java WMA Nokia WMASMSHandler.java SMSHandler.java NUMScreen.java CryptSMS.java PASScreen.java SMSScreen.java DebugLog.java WriteSMS.java CommonLog.java Siemens SiemensSMSHandler.java QX.java Receiver.java OutgoingTextMessage.java SiemensDebugLog.java SPLST 2003 Kuopio, Finland p.9/18
30 Storage memory and JAR size MIDP application (MIDlets) are stored in the device as JAR (Java archive) files JAR sizes for our application are: Nokia: bytes Siemens: bytes WTK: bytes, WTK is the Wireless Toolkit provided by Sun MicroSystems. Through obfuscation the JAR size can be reduced by approximately 10. SPLST 2003 Kuopio, Finland p.10/18
31 Runtime memory Runtime memory usage for each object was measured as follows: int iamount = 100; Object[] objects; long lfree = 0; long lused = 0; objects = new SMSScreen[iAmount]; Runtime.getRuntime().gc(); lfree = Runtime.getRuntime().freeMemory(); for(int i = 0; i < iamount; i++) objects[i] = new SMSScreen(this, TEST,1); Runtime.getRuntime().gc(); lused = lfree - Runtime.getRuntime().freeMemory(); DebugLog.makeEntry(iAmount+ SMSScreen) used: +lused); for(int i = 0; i < iamount; i++) objects[i] = null; SPLST 2003 Kuopio, Finland p.11/18
32 Name of the class Siemens Nokia WTK WTK* Remarks CommonLog.java N/A N/A N/A Abstract super class CryptSms.java DebugLog.java N/A N/A N/A N/A Static class NokiaDebugLog.java N/A 41 N/A N/A NokiaSmsHandler.java N/A 264 N/A N/A NUMScreen.java OutgoingTextMessage.java PASScreen.java QX.java Receiver.java 20 N/A N/A N/A SiemensDebugLog 16 N/A N/A N/A SiemensSmsHandler 284 N/A N/A N/A SmsHandler.java N/A N/A N/A N/A Abstract super class SmsScreen.java WmaDebugLog.java N/A N/A WmaSmsHandler.java N/A N/A WriteSmsScreen.java SPLST 2003 Kuopio, Finland p.12/18
33 Encryption processing power Time needed for encrypting or decrypting a message of a certain length was measured with following way: long lmillis = System.currentTimeMillis(); // Operation that needs to be measured... long ltimespent = System.currentTimeMillis() - lmillis; DebugLog.makeEntry( Encryption time + ltimespent); A bit string with time bits can be encrypted in linear An optimization can be achieved by sorting the latin square. SPLST 2003 Kuopio, Finland p.13/18
34 Encryption processing power (cont.) As a result encryption takes time length of the passphrase. Sorting the latin square takes time order of the group. where is the where is the SPLST 2003 Kuopio, Finland p.14/18
35 Some experiment results 800 Encryption and decryption times with 4 and 16 rounds *Encryption 4*Decryption 16*Encryption 16*Decryption 500 Time (msec) Number of characters SPLST 2003 Kuopio, Finland p.15/18
36 Conclusions Quasigroup encryption is compact and fast enough to be used on a restricted mobile platform. Cryptocraphic security of quasigroup encryption needs to be studied more extensively Latencies, such as encryption can be easily hidden from the user with careful application design Device vendors have their own specific API:s in addition to MIDP and WMA. Not all of them implement WMA. For our purposes Siemens Java API proved to offer the best functionality. SPLST 2003 Kuopio, Finland p.16/18
37 Future work Other cryptocraphic algorithms Public key encryption Authentication Signatures Data integrity Non repudation X.509 certificates Phonebook for keys and numbers Compression SPLST 2003 Kuopio, Finland p.17/18
38 Thank you Questions? SPLST 2003 Kuopio, Finland p.18/18
Siebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2017 July 2017
Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2017 July 2017 Copyright 2005, 2017 Oracle and/or its affiliates. All rights reserved. This software and related documentation are
More informationSecurity Risk Analysis
Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.
More informationGoogle Cloud Technical Brief
Google Cloud Technical Brief As data and applications move to GCP so does the increased threat of web attacks like SQL injections, cross site scripting (XSS), hacking attempts, bad bots and application
More informationComputer Science Undergraduate Scholarship
Computer Science Undergraduate Scholarship Regulations The Computer Science Department at the University of Waikato runs an annual Scholarship examination. Up to 10 Scholarships are awarded on the basis
More informationUsing E-Procurement data to measure the transparency and performance of public spending
Using E-Procurement data to measure the transparency and performance of public spending M.Sc. Marija Jovanoska Head of department Monitoring and -Procurement Department USERS OF THE SYSTEM Public Procurement
More informationSiemens Business Services E-Government Strategy. How to build it for a whole country the Austrian E-Government Experience
Siemens Business Services E-Government Strategy How to build it for a whole country the Austrian E-Government Experience Copyright Siemens Business 2006 Services Siemens GmbHBusiness 2006. All Services
More informationWorking with Parameter Effectivity
Working with Parameter Effectivity HELP.LOECH Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any
More informationVMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM
VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.2 Have documentation feedback? Submit a Documentation
More informationChapter 9 Legal Aspects of Health Information Management
Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.
More informationAdvanced Clinical Workflow for Connecting Clinic
Advanced Clinical Workflow for Connecting Clinic Sagar Ravindra Patil, Mahadev Sudhakar Garad, Nikhil Goraksh Pawar, Supriya DadabhauTambe Abstract -This system is designed to improve clinical workflow,
More informationNURSE CALLING SYSTEM
NURSE CALLING SYSTEM Patients' care is undoubtedly the main aim of all hospitals and Nursing Homes. Hence there is a need to provide one dedicated line of communication to every patient so that the patient
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Defense Information Systems Agency DATE: February 2012 COST ($ in Millions) FY 2014 FY 2015 FY 2016 FY 2017 To Complete Element - 5.500 - - - - - -
More informationCOMPANY CONSULTING Terms of Reference Development of an Open Innovation Portal for UTFSM FSM1402 Science-Based Innovation FSM1402AT8 I.
COMPANY CONSULTING Terms of Reference Development of an Open Innovation Portal for UTFSM FSM1402 Science-Based Innovation FSM1402AT8 I. BACKGROUND 1.1 General overview of the project in which the Consulting
More informationCAHPS Hospital Survey Podcast Series Transcript
CAHPS Hospital Survey Podcast Series Transcript HCAHPS Score Calculations Part II: Patient-Mix Adjustment Slide 1-HCAHPS Score Calculations Part II: Patient-Mix Adjustment (PMA) Welcome to the CAHPS Hospital
More informationGeneral Pathways Education Workshop (click t o to g o go t o to t he the desired section)
General Pathways Education Workshop (click to go to the desired section) Introduction to Workshop/Instructions Why Care Pathways? Components of the Care Pathway Care Pathway Simulation Implementing Care
More informationSubj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)
BUPERS-07 BUPERS INSTRUCTION 2060.1 From: Chief of Naval Personnel Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) Ref: (a) CNO WASHINGTON DC 211645Z Apr 15 (NAVADMIN
More informationDWA Standard APEX Key Glencoe
CA Standard 1.0 DWA Standard APEX Key Glencoe 1.0 Students solve equations and inequalities involving absolute value. Introductory Algebra Core Unit 03: Lesson 01: Activity 01: Study: Solving x = b Unit
More informationOnboard. Design Specifications v1.0. Team Members. Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea
Onboard Design Specifications v1.0 Team Members Liam Yafuso Robert Waite Diane Cordero Jacqueline Avis Daniel Tea 1 1 Introduction 1.1 Product Overview 1.2 Definitions, Acronyms, and Abbreviations 2 Components
More informationTeam 3: Communication Aspects In Urban Operations
Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2007-03 Team 3: Communication Aspects In Urban Operations Doll, T. http://hdl.handle.net/10945/35617
More informationSystem of Records Notice (SORN) Checklist
System of Records Notice (SORN) Checklist Do not use any tabs, bolding, underscoring, or italicization in the system of records notice submissions to the Defense Privacy Office. Use this as a checklist
More informationPunjab & Sind Bank (A Government of India undertaking)
Punjab & Sind Bank (A Government of India undertaking) Addendum No. 1 Dated: 01.06.2018 RFP No. PSB/HOIT/RFP/113/2018-19, Date: 15-05-2018 Request for Proposal For Supply, Customization, Deployment, Maintenance
More informationCAMPUS CONSORTIUM SINGLE SIGN-ON AND IDENTITY GRANT
CAMPUS CONSORTIUM SINGLE SIGN-ON AND IDENTITY GRANT Overview Campus Consortium offers Grant Programs for a variety of solutions, products and services. Campus Consortium Grants are funded by Campus Consortium
More informationEPSRC-KETEP Call for Collaborative Research between the UK and Korea in Smart Grids
EPSRC-KETEP Call for Collaborative between the UK and Korea in Smart Grids Summary Call type: Collaborative research Closing date: 16.00 on 16 December 2015 Related themes: Energy The Engineering and Physical
More informationRaiser s Edge: How To Query Constituent Giving With A Cumulative Total Including Soft Credits
Raiser s Edge: How To Query Constituent Giving With A Cumulative Total Including Soft Credits The Problem: Your development team is planning a strategic ask for donors who have given a total of $2,500
More informationNursys e-notify. Nursys e-notify File and API Specifications Version 2.1.5
Nursys e-notify Nursys e-notify File and API Specifications Version 2.1.5 2018 National Council of State Boards of Nursing, Page 1 of 49 0.1 Disclaimer The information contained in this document is the
More informationAn Efficient Mode of Communication for Blood Donor
An Efficient Mode of Communication for Blood Donor, Assistant Professor, Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore,
More informationRESEARCH METHODOLOGY
Research Methodology 86 RESEARCH METHODOLOGY This chapter contains the detail of methodology selected by the researcher in order to assess the impact of health care provider participation in management
More information2017 Annual Missile Defense Small Business Programs Conference
2017 Annual Missile Defense Small Business Programs Conference DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DISTRIBUTION STATEMENT A. Approved for public release; distribution
More informationOracle Talent Acquisition Cloud
Oracle Talent Acquisition Cloud Release 15B Release Content Document August 2016 Revised: August 2017 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 5 ORACLE TALENT ACQUISITION CLOUD... 6 ORACLE TALEO
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 15 R-1 Line #32
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Air Force Date: March 2014 3600: Research, Development, Test & Evaluation, Air Force / BA 4: Advanced Component Development & Prototypes (ACD&P) COST
More informationLOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR)
LOS ANGELES COUNTY SHERIFF S DEPARTMENT REQUEST FOR INFORMATION RFI NUMBER 652 SH ONLINE TRAFFIC REPORTS (OLTR) May 2018 Prepared By These guidelines are intended to provide general information only and
More informationRemote Patient Tracking and Monitoring System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,
More informationINSIGHT INTO THE MIND OF TODAY S JOB SEEKERS
INSIGHT INTO THE MIND OF TODAY S JOB SEEKERS What HR professionals need to know to stay ahead of the competition in the war for top talent JOB a Research ebook by: HIRING INSIGHTS GETTING TO KNOW THE JOB
More informationThe 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER
The 8 Mistakes People Make When Selecting an Image Exchange Provider WHITEPAPER The 8 Mistakes An effective image exchange solution can have significant positive impact on your ability to provide effective
More informationUNCLASSIFIED. UNCLASSIFIED Army Page 1 of 10 R-1 Line #10
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2013 FY 2014
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior
More informationFrom SAS Programming with Medicare Administrative Data. Full book available for purchase here.
From SAS Programming with Medicare Administrative Data. Full book available for purchase here. Contents About This Book... ix About The Author... xiii Acknowledgments...xv Chapter 1: Introduction... 1
More informationGeofencing in ehealth
Gefencing in ehealth Mbile Services Prject by Fatimah Zahra (7515) Faculty f Cmputer Science Free University f Bzen-Blzan Italy, 2009 Cntents Cntents...2 Figures...2 1. Intrductin...3 2. System Functins...3
More informationPDMS to S3D Plant Migration
PDMS to S3D Plant Migration Webinar on April 6 th, 2016 Session 1: Europe / Asia Pacific starts at 3pm Singapore Session 2: Americas / Europe starts at 11pm Singapore Your presenters Raghu Krishnamoorthy
More informationSecure your video conferences.
ONLINE MEETINGS Secure your video conferences. Skype for Business as a part of Office 365 doesn t just keep you connected it keeps you more secure as well. Save with stronger security. CONSIDER THE SENSITIVE
More informationOptimization Problems in Machine Learning
Optimization Problems in Machine Learning Katya Scheinberg Lehigh University 2/15/12 EWO Seminar 1 Binary classification problem Two sets of labeled points - + 2/15/12 EWO Seminar 2 Binary classification
More informationJuly 1, June 30, 2019
July 1, 2018 - June 30, 2019 2308 Killearn Center Blvd., Suite 101 Tallahassee, FL 32309 Phone: (850) 692-6887 careersourceflorida.com Table of Contents Program Overview... 3 Available Funding & Maximum
More informationDEP Documentation RSA Key Import In Keytable User Manual
Haachtsesteenweg 1442 1130 Brussels Belgium DEP Documentation RSA Key Import In Keytable User Manual Version: 04.00 Atos Worldline - Technology & Products / Engineering / DEP Page: 2/16 Version Management
More informationTELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL
TELECOMMUNICATION SERVICES CSHCN SERVICES PROGRAM PROVIDER MANUAL NOVEMBER 2017 CSHCN PROVIDER PROCEDURES MANUAL NOVEMBER 2017 TELECOMMUNICATION SERVICES Table of Contents 38.1 Enrollment......................................................................
More informationVMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM
VMware AirWatch Guide for the Apple Device Enrollment Program (DEP) Using Apple's DEP to automatically enroll new devices with AirWatch MDM AirWatch v9.3 Have documentation feedback? Submit a Documentation
More informationGetting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER
Getting the Most out of Business Process Outsourcing and Offshoring Initiatives with Desktop Virtualization WHITE PAPER Table of Contents Outsourcing Market Trends.... 3 Key Drivers for Outsourcing and
More informationMoving from HASP HL to Sentinel HASP. Migration Guide
Moving from HASP HL to Sentinel HASP Migration Guide Migration Guide: Moving from HASP HL to Sentinel HASP Copyrights and Trademarks Copyright 2010 SafeNet, Inc. All rights reserved. Cross-Locking, Hardlock,
More informationWISHIN Statement on Privacy, Security, and HIPAA Compliance - for WISHIN Pulse
Contents Patient Choice... 2 Security Protections... 2 Participation Agreement... 2 Controls... 3 Break the Glass... 3 Auditing... 3 Privacy Protections... 4 HIPAA Compliance... 4 State Law Compliance...
More informationLotusLive. Working together just got easier Online collaboration solutions for the working world
LotusLive Working together just got easier Online collaboration solutions for the working world LotusLive Software as a Service & Cloud Computing Lotus Collaboration Strategy LotusLive family Click to
More informationBIOMETRICS IN HEALTH CARE : A VALUE PROPOSITION FROM HEALTH CARE SECTOR
UMANICK TECHNOLOGIES, S.L. www.umanick.com info@umanick.com 1 / 7 Introduction In any country s health care system, many challenges have yet to be resolved. And patient identification is perhaps the greatest
More informationTOUM: The Official Noticeboard of the University of Murcia
TOUM: The Official Noticeboard of the University of Murcia Outline Motivation TOUM Procedure TOUM Service Management application Electronic signature issues Official Website TOUM Project FundeWeb framework
More informationTexas Medicaid. Provider Procedures Manual. Provider Handbooks. Telecommunication Services Handbook
Texas Medicaid Provider Procedures Manual Provider Handbooks December 2017 Telecommunication Services Handbook The Texas Medicaid & Healthcare Partnership (TMHP) is the claims administrator for Texas Medicaid
More informationYour Guide to Writing a Grant Management Software RFP
Your Guide to Writing a Grant Management Software RFP Background The AmpliFund team has reviewed and responded to hundreds of grant management software request for proposals (RFPs) for organizations of
More informationThe Journey of Commercialization
The Journey of Commercialization, Partner, Sell Mike Broeker April, 2018 The Intelligent Workplace The Robert L. Preger Intelligent Workplace, built in 1997, is a 7000 square foot living laboratory of
More informationTraining and Evaluation Outline Report
Training and Evaluation Outline Report Status: Approved 19 Jun 2017 Effective Date: 02 Jan 2018 Task Number: 14-EAC-8027 Task Title: Conduct Paying Agent Operations (Financial Management Support Detachment
More informationRequest for Information (RFI) For Network Monitoring & Management (NMC/OMC) Services
Request for Information (RFI) For Network Monitoring & Management (NMC/OMC) Services 1 Background In February 2012, Congress enacted The Middle Class Tax Relief and Job Creation Act of 2012, containing
More information[MC-DTCXA]: MSDTC Connection Manager: OleTx XA Protocol
[MC-DTCXA]: MSDTC Connection Manager: OleTx XA Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation
More informationMoving from HASP4 to Sentinel HASP. Migration Guide
Moving from HASP4 to Sentinel HASP Migration Guide Migration Guide: Moving from HASP4 to Sentinel HASP Copyrights and Trademarks Copyright 2010 SafeNet, Inc. All rights reserved. Cross-Locking, Hardlock,
More informationSiebel Installation Guide for Microsoft Windows. Siebel Innovation Pack 2015, Rev. D November 2015
Siebel Installation Guide for Microsoft Windows Siebel Innovation Pack 2015, Rev. D November 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationThe future of patient care. 6 ways workflow automation will transform the healthcare experience
The future of patient care 6 ways workflow automation will transform the healthcare experience Workflow automation: The foundation for improved patient care The patient lifecycle goes through many phases.
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO. Quantity of RDT&E Articles
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 COST ($ in Millions) Years FY 2017 FY 2018 FY 2019 FY 2020 To Program Element - 6.021 8.312 7.963-7.963 8.046 8.146 8.194
More informationThe Evolution of the Conference Room and the Technology Behind it
WHITEPAPER The Evolution of the Conference Room and the Technology Behind it How a Shift in Demand Will Impact Technology, Support, and Users Bill Haskins Andy Nilssen Andrew Davis October 2013 Paper sponsored
More informationActive biosurveillance in an urban metropolitan area
Active biosurveillance in an urban metropolitan area Sheryl L. Happel Lewis, MPH 1 Kathy Hurt-Mullen, MPH 2 Wayne Loschen, MS 1 Richard A. Wojcik, MS 1 Joseph S. Lombardo, MS 1 November 18, 2003 1 The
More informationCDIP SCHOLAR & MENTOR
CDIP SCHOLAR & MENTOR EXPENSE REPORT FOR CDIP MINI GRANT AND TRAVEL GRANT PROGRAMS 2017/2018 ACADEMIC YEAR www.calstate.edu/hr/cdip FINAL REPORTS FOR CDIP SCHOLAR AND MENTOR A Final Activity Report and
More informationReporting a Privacy Breach to the Commissioner
SEPTEMBER 2017 Reporting a Privacy Breach to the Commissioner GUIDELINES FOR THE HEALTH SECTOR To strengthen the privacy protection of personal health information, the Ontario government has amended the
More informationMISSISISSIPPI STATE UNIVERSITY Request for Proposals (RFP) MSU #18 03 Communications as a Service Solution
MISSISISSIPPI STATE UNIVERSITY Request for Proposals (RFP) MSU #18 03 Communications as a Service Solution Issue Date: [12 5 17] Issuing Agency: Office of Procurement and Contracts Mississippi State University
More informationPamela Duncan, Ph.D PI COMPASS Trial Scott Rushing, Director Research Information Systems
ecompass for Health: Precision health at its best Pamela Duncan, Ph.D PI COMPASS Trial Scott Rushing, Director Research Information Systems 1 Clinical Informatics Solutions Require Clinical Vetting Value
More informationCSE255 Introduction to Databases - Fall 2007 Semester Project Overview and Phase I
SEMESTER PROJECT OVERVIEW In this term project, you are asked to design a small database system, create and populate this database by using MYSQL, and write a web-based application (with associated GUIs)
More informationProject Overview for the Technical Compliance Monitoring System
Project Overview for the Technical Compliance Monitoring System Request for Proposal 6 November 2017 ICANN Project Overview for the Technical Compliance Monitoring System November 2017 1 1 Introduction
More informationLifecycle Models for Survivable Systems
Lifecycle Models for Survivable s Rick Linger Carnegie Mellon University Pittsburgh, PA 15213-3890 Sponsored by the U.S. Department of Defense 2000 by Carnegie Mellon University Version 2 SNA Tutorial
More informationMaximizing the Return on a Telepresence Investment
Maximizing the Return on a Telepresence Investment With its real-time capability and high definition screens, telepresence elevates video communication to the personal level of face-to-face interaction,
More informationRESOLUTION NO WHEREAS, adoption of this resolution will repeal and replace City of Cheyenne Resolution No
RESOLUTION NO. 4758 ENTITLED: A RESOLUTION REPEALING AND REPLACING RESOLUTION NO. 4180 FOR ESTABLISHING THE CHEYENNE/LARAMIE COUNTY COOPERATIVE GIS PROGRAM, EXECUTIVE COMMITTEE, TECHNICAL AND USER GROUPS,
More informationBernhard Steffen, Falk Howar, Malte Isberner TU Dortmund /CMU. B. Steffen Summer School CPS
Active Automata Learning: From DFA to Interface Programs and Beyond or From Languages to Program Executions or (more technically) The Power of Counterexample Analysis Bernhard Steffen, Falk Howar, Malte
More informationMoving from Sentinel SuperPro to Sentinel LDK Migration Guide
Moving from Sentinel SuperPro to Sentinel LDK Migration Guide Copyrights and Trademarks Copyright 2013 SafeNet, Inc. All rights reserved. HARDLOCK, HASP, SENTINEL, SUPERPRO and ULTRAPRO are registered
More informationSentinel LDK. Migration Guide Sentinel SuperPro to Sentinel LDK
Sentinel LDK Migration Guide Sentinel SuperPro to Sentinel LDK All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
More informationVacancy Announcement
Vacancy Announcement ***When applying for this position, refer to "POSITION # 5345" on your application package.*** POSITION: Cybersecurity Senior Specialist (#5345) DEPARTMENT: Cybersecurity / Systems
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Marine Sierra Hotel Aviation Readiness Program (M-SHARP) Department of the Navy - United States Marine Corps (USMC) SECTION 1: IS A PIA REQUIRED? a. Will this Department
More informationSubj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 2221.5D N2N6 OPNAV INSTRUCTION 2221.5D From: Chief of Naval Operations Subj: RELEASE
More informationProvider Handbooks. Telecommunication Services Handbook
Provider Handbooks December 2016 Telecommunication Services Handbook The Texas Medicaid & Healthcare Partnership (TMHP) is the claims administrator for Texas Medicaid under contract with the Texas Health
More informationHealthMatics ED Emergency Department Information System
HealthMatics ED Emergency Department Information System Used in over 3 million emergency department visits a year at the most well respected hospitals nationwide. The right choice for your emergency department.
More informationServer, Desktop, Mobile Platforms Working Group (SDMPWG) Dated
Server, Desktop, Mobile Platforms Working Group (SDMPWG) Dated 2011-04-25 The information provided below is subject to change and reflects the current knowledge of the Working Group. 1. Management Problem(s)
More informationFF-ASVAB Ability Measures, from the U.S. Department of Defense ASVAB Tests, 1997
The Harris School NLSY97 Flat Files June 2007 FF-ASVAB-Codebook.607 FF-ASVAB Ability Measures, from the U.S. Department of Defense ASVAB Tests, 1997 Total of 149 variables . des Contains data from FF-ASVAB.dta
More informationThe Cost of a Misfiled Medical Document
: The Cost of a Misfiled Medical Document INTRODUCTION Misfiling of medical documents is a common problem in all types of medical practices. A document may be misfiled for a number of reasons, and each
More informationThe Nomad Digital Pen
The Nomad Digital Pen ENSC 440/305 School of Engineering Science Simon Fraser University 2009.05.15 Copyright 2009 - TechStyles Inc. 1 Outline The TechStyles Team Roles in the Project Team Dynamic Motivation
More information2018 NASS IDEAS Award Application State of Colorado
2018 NASS IDEAS Award Application State of Colorado Nominating State Office: Secretary of State Wayne W. Williams 1700 Broadway, Suite 200 Denver, CO 80290 303-894-2200 Project Lead and Staff Contact for
More information1. When will physicians who are not "meaningful" EHR users start to see a reduction in payments?
CPPM Chapter 7 Review Questions 1. When will physicians who are not "meaningful" EHR users start to see a reduction in payments? a. January 1, 2013 b. January 1, 2015 c. January 1, 2016 d. January 1, 2017
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Missile Defense Agency Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 3: Advanced Development (ATD) COST ($
More informationTraining and Evaluation Outline Report
Training and Evaluation Outline Report Status: Approved 20 Mar 2015 Effective Date: 15 Sep 2016 Task Number: 71-8-5715 Task Title: Control Tactical Airspace (Brigade - Corps) Distribution Restriction:
More information2017 Transition Year Flexibility Advancing Care Information (ACI) Category Options
The Physicians Advocacy Institute s Medicare Quality Payment Program (QPP) Physician Education Initiative 2017 Transition Year Flexibility Advancing Care Information (ACI) Category Options Ad 1 P a g e
More informationTechnical Notes for HCAHPS Star Ratings (Revised for October 2017 Public Reporting)
Technical Notes for HCAHPS Star Ratings (Revised for October 2017 Public Reporting) Overview of HCAHPS Star Ratings As part of the initiative to add five-star quality ratings to its Compare Web sites,
More informationOnline Application Guideline - Non-Business Organizations -
Online Application Guideline - Non-Business Organizations - To participate in the Global Compact, a non-business organization: Prepares a Letter of Commitment (Fig. 1 below) signed by the Chief Executive
More informationRuss Kuhn Scott Moore Esri
Russ Kuhn Scott Moore Esri ESRI Open Data Discussion OD is here to stay but - Review of why it s here - How is it performing Current WA OD Situation OD Moving Forward - OD Best practices - OD future capabilities
More informationRural Health Care Services of PHC and Its Impact on Marginalized and Minority Communities
Rural Health Care Services of PHC and Its Impact on Marginalized and Minority Communities L. Dinesh Ph.D., Research Scholar, Research Department of Commerce, V.O.C. College, Thoothukudi, India Dr. S. Ramesh
More informationDon t Whisper My Chips
Don t Whisper My Chips Colin O Flynn Dalhousie University Halifax, NS. Canada. ColinOFlynn.com DEFCON 2015. 1 Objective: Learn about a type of physical attack. Critical Difference: Everything I m showing
More informationOnline Scheduling of Outpatient Procedure Centers
Online Scheduling of Outpatient Procedure Centers Department of Industrial and Operations Engineering, University of Michigan September 25, 2014 Online Scheduling of Outpatient Procedure Centers 1/32 Outpatient
More informationErasmus+ Programme. Key Action 1 Mobility for learners and staff Higher Education Student and Staff Mobility. between programme countries
Erasmus+ Programme Key Action 1 Mobility for learners and staff Higher Education Student and Staff Mobility Inter-institutional 1 agreement 2014-20[21] 2 between programme countries [Minimum requirements]
More informationSentinel LDK. Migration Guide HASP HL to Sentinel LDK
Sentinel LDK Migration Guide HASP HL to Sentinel LDK All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationJoint Distributed Engineering Plant (JDEP)
Joint Distributed Engineering Plant (JDEP) JDEP Strategy Final Report Dr. Judith S. Dahmann John Tindall The MITRE Corporation March 2001 March 2001 Table of Contents page Executive Summary 1 Introduction
More informationAscom MEDSTAR FRANKLIN SQUARE MEDICAL CENTER ASCOM COMMUNICATIONS STREAMLINE WORKFLOW THROUGH CLINICAL INTEGRATION. Introduction
Customer: Medstar Franklin Square Medical Center Solution: Ascom Unite, IP-DECT handsets and clinical integrations MEDSTAR FRANKLIN SQUARE MEDICAL CENTER ASCOM COMMUNICATIONS STREAMLINE WORKFLOW THROUGH
More informationVisitor Information - Surveys and Countings
Visitor Information - Surveys and Countings in Finland Joel Erkkonen, Metsähallitus,, Natural Heritage Services Tuija Sievänen Tuija Sievänen Finnish Forest Research Institute National Outdoor Recreation
More information