The Extended Authentication Process in the Environment of the Laboratory Information and Management System

Laboratory information systems have evolved from applications designed to simplify or eliminate routine processes. Their further development follows the trend of interconnection with intelligent laboratory equipment. Laboratories of primary research are specific in many ways and commonly available information systems cannot be deployed there. Development of a new lab information and management system should be designed in order to ensure not only safe and secured operation but also modular requirements. Elements of data security can be successfully implemented on the basis of studies and standards which deal with this issue on a general level. The area of security should be viewed in the context of the lab as the whole. The mentioned type of laboratories processes a sensitive material, creates compounds of nonresearched properties, which are studied and results are subsequently published. It is obvious that the environment has to be secured at all levels. The following article describes a possible solution.

[1]  Sean Ekins Computer Applications in Pharmaceutical Research and Development: Ekins/Computer Applications in Pharmaceutical Research and Development , 2006 .

[2]  Yu Hu Development of Information Management System Used in Laboratory , 2012 .

[3]  Jianfeng Ma,et al.  A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.

[4]  Y. Sreenivasa Rao,et al.  Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption , 2015, ICISS.

[5]  Leonard Steinborn,et al.  International Organization for Standardization ISO/IEC 17025 General Requirements for the Competence of Testing and Calibration Laboratories , 2004 .

[6]  Ondrej Krejcar,et al.  Development of information and management system for laboratory based on open source licensed software with security logs extension , 2017, J. Intell. Fuzzy Syst..

[7]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[8]  Ondrej Krejcar,et al.  Development of Information and Management System for Laboratory Based on Open Source Licensed Software , 2015, ICCCI.

[9]  Ondrej Krejcar,et al.  Increasing of Data Security and Workflow Optimization in Information and Management System for Laboratory , 2017, IWBBIO.

[10]  Poonam J. Prasad,et al.  Trends in laboratory information management system , 2012 .

[11]  Tong Liu,et al.  Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data , 2015, IWSEC.

[12]  Sean Ekins,et al.  Computer Applications in Pharmaceutical Research and Development , 2008 .

[13]  M.D. Wang,et al.  Development of a Laboratory Information System for Cancer Collaboration Projects , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[14]  B. Shneiderman,et al.  Improving the accuracy of touch screens: an experimental evaluation of three strategies , 1988, CHI '88.

[15]  Svenja Polst,et al.  Why Users Ignore Privacy Policies - A Survey and Intention Model for Explaining User Privacy Behavior , 2018, HCI.

[16]  Vladimir Sobeslav,et al.  Security information and event management in the cloud computing infrastructure , 2014, 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI).

[17]  Viktor Taneski,et al.  Moore's curse on textual passwords , 2015, 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[18]  Alawi A. Al-saggaf Key binding biometrics-based remote user authentication scheme using smart cards , 2017, IET Biom..

[19]  Joseph K. Liu,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing , 2015, Future Gener. Comput. Syst..

[20]  Stanislav Mamonov,et al.  The impact of information security threat awareness on privacy-protective behaviors , 2018, Comput. Hum. Behav..

[21]  Ondrej Krejcar,et al.  Concept of a Module for Physical Security of Material Secured by LIMS , 2018, IWBBIO.

[22]  Miloslav Hub,et al.  Usability versus security of authentication , 2010 .

[23]  Jürgen Durner,et al.  The future of the laboratory information system – what are the requirements for a powerful system for a laboratory data management? , 2014, Clinical chemistry and laboratory medicine.

[24]  E. Lucile White,et al.  A Successful LIMS Implementation: Case Study at Southern Research Institute , 2007 .

[25]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.