This site uses cookies.
Some of these cookies are essential to the operation of the site,
while others help to improve your experience by providing insights into how the site is being used.
For more information, please see the ProZ.com privacy policy.
Jun 26, 2020 (posted viaProZ.com): Proofreading the paper - From the Fault Characterization to Exploitation How a fault model helps to secure your application...more, + 1 other entry »
This person has a SecurePRO™ card. Because this person is not a ProZ.com Plus subscriber, to view his or her SecurePRO™ card you must be a ProZ.com Business member or Plus subscriber.
Afiliações
This person is not affiliated with any business or Blue Board record at ProZ.com.
Serviços
Editing/proofreading, Interpreting, Translation
Especialização
Especializado em:
Antropologia
Contabilidade
Finanças (geral)
Negócios/comércio (geral)
Certificados, diplomas, licenças, currículos
Computadores (geral)
Direito: Contrato(s)
Computadores: sistemas, redes
Medicina (geral)
Direito (geral)
Também trabalha com:
Governo/política
Química; ciência e engenharia química
Medicina: Assistência médica
Educação/pedagogia
TI (Tecnologia da Informação)
Economia
Medicina: cardiologia
Medicina: farmacêutica
Filosofia
Psicologia
Religião
Ciências sociais, sociologia, ética etc.
Turismo e viagem
Direito: Tributação e alfândega
More
Less
Taxas
português para inglês - Taxa padrão: 0.10 GBP por palavra/ 60 GBP por hora inglês para português - Taxa padrão: 0.10 GBP por palavra/ 60 GBP por hora francês para inglês - Taxa padrão: 0.10 GBP por palavra/ 60 GBP por hora
francês para inglês: Article 0220 General field: Direito/Patentes Detailed field: Direito (geral)
Texto de origem - francês L’habeas data à l’ère de la e-santé
Aurélie Bayle, Février 2020
5 litres de sang, 40 litres d’eau, 206 os, 640 muscles, une moyenne de 100 000 battements cardiaques par jour, environ 160 000 kilomètres de vaisseaux sanguins, 86 à 100 milliards de neurones dans le cerveau, forment ensemble un objet et sujet de droit en perpétuelle évolution : l’être humain.
Peuplant la Terre avec quelques 7.53 milliards d’individus en 2018 selon la Banque Mondiale, ces derniers, dont 3.8 milliards utilisent Internet selon les estimations, produisent environ 212 500 giga-octets en ligne à chaque seconde .
Moyennant un calcul rapide, cela représente environ 765 millions de gigas par heure, ou encore 18.3 milliards de gigas par jour, soit presque 5 Gigas par individu « connecté ».
Une nouvelle ère débute, et smartphones, objets connectés (IoT), réseaux sociaux, plateformes, capteurs, ou encore bien d’autres modes de collecte, ont tous concouru à la multiplication massive des sources de données à caractère personnel. Innervant tous les secteurs, cette « ère de la donnée » n’a pas épargné le secteur de la santé.
L’innovation en santé, regroupée sous le terme e-santé, recouvre un ensemble d’applications des technologies de l’information de la télécommunication mis au service de la santé . L’Organisation Mondiale de la Santé la définit aussi comme étant au service du bien-être des personnes, visant à améliorer leur qualité de vie . Cette santé numérique ou connectée s’étend à des pans divers et variés : logiciels, techniques d’amélioration de la pratique des professionnels de santé, outils numériques de suivi et d’amélioration du parcours de soin, applications d’accompagnement, médecine à distance ou télémédecine, prévention en ligne, soins mobiles (ou m-santé), télésurveillance, applications de contrôle et/ou suivi sportif, etc.
Tradução - inglês Habeas data in the age of e-health
Aurélie Bayle, February 2020
5 litres of blood, 40 litres of water, 206 bones, 640 muscles, an average of 100,000 heartbeats per day, about 160,000 kilometres of blood vessels, 86 to 100 billion neurons in the brain, together form an object and subject of law in perpetual evolution: the human being.
Populating the Earth with about 7.53 billion people in 2018 according to the World Bank, these people, of whom an estimated 3.8 billion use the Internet, produce about 212,500 gigabytes online every second.1
Based on a quick calculation, this represents about 765 million gigabytes per hour, or 18.3 billion gigabytes per day, or almost 5 gigabytes per person "connected".
A new era is beginning, and smartphones, connected objects (IoTs), social networks, platforms, sensors, and many other modes of collection have all contributed to the massive multiplication of sources of personal data. Innovating all sectors, this "data age" has not spared the health sector.
Health innovation, known as e-health, covers a range of applications of information and telecommunications technologies in the healthcare sector. The World Health Organization also defines it as being dedicated to the well-being of people, aiming to improve their quality of life. This digital or connected health extends to various and diverse areas: software, techniques for improving the practice of health professionals, digital tools for monitoring and improving the pathways of care, support applications, remote medicine or telemedicine, online prevention, mobile care (or m-health), remote surveillance, applications for monitoring and/or follow-up of sports, etc.
Digital health, whatever its nature, innervates and amplifies the changes in its beneficiaries' pace of life, as the spectrum of "patients" eventually broadens to include users and citizens. It is the source of new professions, new logics, components of the new health ecosystem. These major changes not only give rise to expectations of health system modernization but also concerns and issues that deserve an in-depth analysis. Among them, the inevitable questions about health data (I) and their protection (II) are a reminder of the challenges of this digitalization of health care.
português para inglês: Protecting lattice-based signatures against timing attacks General field: Outra Detailed field: Computadores (geral)
Texto de origem - português Gaussian distributions and implementation vulnerabilities. Despite their attractive theoretical properties, lattice-based constructions present novel challenges in terms of implementation security, particularly concerning to side-channel attacks. Taking signatures as an example, possibly one of the most efficient constructions is the BLISS signature scheme of Ducas et al. [Duc+13], which features excellent performance and has seen real-world deployment via the
VPN software suite strongSwan.Later implementations of BLISS show good hardware performance as well [PDG14]. However, existing implementations of BLISS suffer from significant
leakage through timing side-channels, which have led to several devastating attacks against the implementations [Bru+16a; PBY17; Esp+17; Boo+18a; TW19]. The main feature of BLISS exploited in these attacks is the use of discrete Gaussian distributions, either as part of the Gaussian sampling used to generate the random nonces in signatures or as part of the crucial rejection sampling step that forms the core of the Fiat–Shamir with aborts framework that supports BLISS security.
Generally speaking, Gaussian distributions are ubiquitous in theoretical lattice-based cryptography, thanks to their convenient behaviour with respect to proofs of security and parameter choices. However, their role in practical implementations is less clear, mainly because of the concerns surrounding implementation attacks. For this reason, some schemes limit or proscribe the use of Gaussians [Bin+19; Lyu+19]. For example, BLISS was not submitted to the NIST post-quantum standardization effort partly due to those concerns. Besides, the second round candidate Dilithium [Duc+18], which can be seen as a direct successor of BLISS, replaces Gaussian distributions by uniform ones, at the cost of larger parameters and less efficient implementation, specifically citing implementation issues as their justification.
Tradução - inglês Distribuições Gaussianas e vulnerabilidades de implementação. Apesar das atrativas propriedades teóricas, as construções baseadas em redes apresentam novos desafios em termos de implementação
segurança, particularmente no que diz respeito aos ataques de canal lateral. Usando as assinaturas como exemplo, possivelmente uma das construções mais eficientes é o esquema de assinatura BLISS de Ducas et al. [Duc+13], que apresenta um excelente desempenho e demonstrou uma implantação no mundo real através do Conjunto de software VPN strongSwan. As implementações posteriores de BLISS mostram um bom desempenho do hardware bem como do [PDG14]. Contudo, as implementações existentes de BLISS sofrem de vazamentos através de canais laterais temporizados, que levam a vários ataques devastadores contra as implementações [Bru+16a; PBY17; Esp+17; Boo+18a; TW19]. A característica principal de BLISS explorada nestes ataques é a utilização de distribuições Gaussianas discretas, seja como parte de amostra Gaussiana utilizada para gerar as não conformidades aleatórias nas assinaturas, ou como parte da crucial etapa de amostras rejeitadas que formam o núcleo da Fiat-Shamir com uma estrutura de abortos que apoia a segurança BLISS.
Em geral, as distribuições Gaussianas são omnipresentes na criptografia teórica baseada na treliça, isso graças ao seu comportamento conveniente no que diz respeito as provas de segurança e escolhas de parâmetros. No entanto, o seu papel nas implementações práticas tem um papel menos claro, principalmente por causa das preocupações em torno dos ataques de implementação. Por esta razão, alguns esquemas limitam ou proscrevem a utilização de Gaussianos [Bin+19; Lyu+19]. Por exemplo, o BLISS não foi submetido ao esforço de padronização pós-quântica do NIST, devido parcialmente a essas preocupações. Além disso, o candidato à segunda volta Dilithium [Duc+18], que pode ser visto como um sucessor direto de BLISS, substitui as distribuições Gaussianas por outras uniformes, ao custo de parâmetros maiores e de uma implementação menos eficiente, citando especificamente questões de implementação como a sua justificação.
More
Less
Formação educacional em tradução
Bachelor's degree - Faculdade Ibero Americana
Experiência
Anos de experiência em tradução: 25 Registrado no ProZ.com: Mar 2017.
português para inglês (Centro Universitário Anhanguera) inglês para português (Centro Universitário Anhanguera) francês para inglês (Institute of Linguists Educational Trust (Chartered Institute of Linguists)) português para inglês (Institute of Linguists Educational Trust (Chartered Institute of Linguists)) inglês para português (Institute of Linguists Educational Trust (Chartered Institute of Linguists))
Associações
N/A
Software
Adobe Acrobat, Microsoft Excel, Microsoft Office Pro, Microsoft Word, Powerpoint
Over 21 years of experience working as a translator and interpreter. A job that I do with passion. I work fast and reliably. I have a lot of experience as a proofreader as well.I began working as a translator in Brazil and after coming to the UK I began working as an interpreter and then translations came consequently. I have been an English teacher since the age of 17 and have worked in several schools in the UK as well. In 2010 I began lecturing at The Sorbonne and perfected my business skills by teaching several different business subjects. In 2015 I joined the Ecole Normale Superieure where I work with all PhD departments from Anthropology to Cryptography/Blockchain/Cryptocurrencies, proofreading all their work and also translating their papers into English as well as their Thesis. By working in different PhD departments, I learnt a lot about many new areas and perfected my translation and interpreting skills. In 2019 I finished a Coaching course and this taught me many new skills that I now apply when working with my clients. If you are looking for someone to cater for all your translation and interpreting skills, I am sure I can fulfil all your needs.
I am qualified in English/French and Portuguese
Palavras-chave Medical, Legal, Scientific, Anthropology, Accountancy, Immigration, Health and social care, Business, Cryptography, Internet Security. See more.Medical, Legal, Scientific, Anthropology, Accountancy, Immigration, Health and social care, Business, Cryptography, Internet Security, . See less.