Oveeyen Moonian
University of Mauritius
Information flow (information theory)Internet privacyVolume (computing)Web applicationDistributed computingInformation technologyPhysical accessBusinessHealth careData managementSelfWork (electrical)Information systemData scienceDiabetes managementListing (computer)Self-managementCompression (functional analysis)SoftwareWhite paperDecompressionContext (language use)Service (business)InstitutionMultimedia informationHealthcare serviceeMixService (systems architecture)Computer scienceComputer access controlRole-based access controlData accessSocial mediaAccess controlKnowledge managementInformation and Communications TechnologyConfidentialityMedicineDatabaseCloud computingDeveloping countryCategorization
6Publications
3H-index
12Citations
Publications 6
Newest
#1Oveeyen Moonian (UoM: University of Mauritius)H-Index: 3
#2Abha Jodheea-Jutton (UoM: University of Mauritius)H-Index: 1
Last. Sudha Cheerkoot-Jalim (UoM: University of Mauritius)H-Index: 2
view all 8 authors...
ABSTRACTBackground: While healthcare systems are investing resources on type 2 diabetes patients, self-management is becoming the new trend for these patients. Due to the pervasiveness of computing devices, a number of computerized systems are emerging to support the self-management of patients.Objective: The primary objective of this review is to identify and categorize the computational tools that exist for the self-management of type 2 diabetes, and to identify challenges that need to be addr...
Source
#1Oveeyen Moonian (UoM: University of Mauritius)H-Index: 3
#2Kavi Kumar Khedo (UoM: University of Mauritius)H-Index: 9
Last. Bibi Rubeena Doomun (UoM: University of Mauritius)H-Index: 1
view all 9 authors...
The volume of the data involved in healthcare systems and the sensitivity of the data call for strict, non-obtrusive and efficient access control. This paper presents the design and implementation of a software prototype to demonstrate how Role-Based Access Control (RBAC), supported by context-awareness, can be applied in the Mauritian healthcare service for providing efficient and effective access control to patient's data. The work has consisted of studying different models of Role-Based and C...
2 CitationsSource
Role-Based access control provides an efficient technique for managing data access in systems that involve large organizations. Roles can be directly mapped to positions in the organization and role hierarchies can be defined. Data access rights are thus allocated to roles and users are mapped onto these roles. In organizations where the data is particularly sensitive, such as in healthcare institutions, role-based access-control needs to be further enhanced by using information based on context...
Developed and developing countries have recognized the importance of ICT in healthcare services and most developed countries are investing important amounts in nation-wide healthcare information systems. At the heart of a nation-wide healthcare information system is the national Electronic Patient Record System. As per the white paper published by the Ministry of Health in December 2002, Mauritius wishes to have a modern healthcare service of international standards. For such aspirations, Maurit...
2 Citations
Healthcare is an area dealing with an enormous amount of highly sensitive data being handled by a number of users. As a first step towards an e-health service, Mauritius requires the electronic management of patients’ data at its different healthcare institutions. Such data management should allow easy non-obtrusive, but secure, access to data by in house personnel of each healthcare institution, while also providing secure remote access to other institutions within the healthcare service as wel...
9 Citations
#1Oveeyen Moonian (UoM: University of Mauritius)H-Index: 3
#2Chawdhurry Bhurtun (UoM: University of Mauritius)H-Index: 1
Performing real-time multimedia transmissions through existing telecommunications infrastructures can prove to be economical. Such transmissions can be achieved by compression and decompression of multimedia information at a higher rate than that at which the information is generated. This paper describes a method of improving decompression time through distributed computing.
Source