Pub. online:17 Jun 2022Type:Research ArticleOpen Access
Volume 33, Issue 2 (2022), pp. 365–397
Blockchain is gaining traction for improving the security of healthcare applications, however, it does not become a silver bullet as various security threats are observed in blockchain-based applications. Moreover, when performing the security risk management (SRM) of blockchain-based applications, there are conceptual ambiguities and semantic gaps that hinder from treating the security threats effectively. To address these issues, we present a blockchain-based healthcare security ontology (HealthOnt) that offers coherent and formal information models to treat security threats of traditional and blockchain-based applications. We evaluate the ontology by performing the SRM of a back-pain patient’s healthcare application case. The results show that HealthOnt can support the iterative process of SRM and can be continually updated when new security threats, vulnerabilities, or countermeasures emerge. In addition, the HealthOnt may assist in the modelling and analysis of real-world situations while addressing important security concerns from the perspective of stakeholders. This work can help blockchain developers, practitioners, and other associated stakeholders to develop secure blockchain-based healthcare applications in the early stages.
Volume 13, Issue 1 (2002), pp. 73–88
Two examples of open-loop differential games are considered in the paper. Starting with simplified dynamic Duel, further it was developed to differential economic Duel modelling problem.
The first example regards a “military” duel of two objects, the second one is about economic duel and presents the economic competition situation. In both cases Monte Carlo models are used. The search for equilibrium is performed by global optimization.
The military model is a convenient illustration of differential game theory. It is interesting for its dynamics, it can be used for teaching purposes. The economic model shows some important features of dynamic competition. In this case objects try to maximize their final profits at the end of the period. The destruction of competitor is a feasible option to achieve this purpose.
New numerical methods and software system for the Internet environment are developed to implement this theory.