8,027 Hits in 4.9 sec

Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper) [chapter]

Joonwoong Kim, Alastair R. Beresford, Frank Stajano
Ubiquitous Convergence Technology  
We take a few initial steps towards a U-Healthcare security policy and propose a system architecture designed to help enforce the policy's goals.  ...  In this position paper we highlight some potential threats and open the discussion about the security requirements of this new scenario.  ...  The first contribution of this position paper is to point out such new threats and to open up the debate about security for U-Healthcare.  ... 
doi:10.1007/978-3-540-71789-8_27 dblp:conf/icuct/KimBS06 fatcat:gbpxtnocjzgxbdwetg7gqn5qr4

Unified Model for Data Security - A Position Paper

Raja Naeem Akram, Ryan K.L. Ko
2014 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications  
In this paper, we study the evolution of data security from the perspective of past proposed frameworks, and present a novel Unified Model for Data Security (UMDS).  ...  There is a much needed push for a holistic approach to data security instead of the current bespoke approaches.  ...  *This work is a position paper that discusses notion of Data Security from various aspects.  ... 
doi:10.1109/trustcom.2014.110 dblp:conf/trustcom/AkramK14 fatcat:ejqanvmff5b23jcoiddxpchdia

Digital Trust - Trusted Computing and Beyond: A Position Paper

Raja Naeem Akram, Ryan K.L. Ko
2014 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications  
This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing.  ...  We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems.  ...  *This work is a position paper that discusses notion of trust in different computing fields. It also analyses our proposals for emerging fields.  ... 
doi:10.1109/trustcom.2014.116 dblp:conf/trustcom/AkramK14a fatcat:xjmm6svm2zbkzmdewmgemha33u

Ubiquitous Healthcare Information System: Assessment of its Impacts to Patient's Information

Zanifa Omary, Fredrick Mtenzi Mtenzi, Bing Wu, Ciaran O'Driscoll
2011 International Journal for Information Security Research  
Once a ubiquitous healthcare service is in place, then the ubiquitous healthcare information system will "always be on" and hence promising better health and well-being for the general population.  ...  With advancement in technology, healthcare organisations are now moving towards Ubiquitous healthcare, which is an emerging field of technology that uses a large number of environmental and patients' sensors  ...  In section 5, positive impacts brought by the adoption and use of ubiquitous systems in healthcare will be discussed.  ... 
doi:10.20533/ijisr.2042.4639.2011.0009 fatcat:z5fowliwavbcvoljfqdnbnx2sa

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

Jung Tae Kim
2012 Journal of information and communication convergence engineering  
Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.  ...  For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure.  ...  This may result in a security problem such as information leakage. Fig. 1 describes a topology of ubiquitous healthcare systems.  ... 
doi:10.6109/jicce.2012.10.4.337 fatcat:drajrrvbjjhvxe2cpgkgopfd5u

Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment

Jong-Hyuk Park, Yi Pan, Han-Chieh Chao, Neil Y. Yen
2015 The Scientific World Journal  
on a strict and rigorous review policy.  ...  After a two-round review process, only 22 papers were accepted for being included in this issue.  ...  on a strict and rigorous review policy.  ... 
doi:10.1155/2015/281921 pmid:25874242 pmcid:PMC4383471 fatcat:2wdwh3sbszhindv2vrqmurf4by

Using online social media platforms for ubiquitous, personal health monitoring

Chonlatee Khorakhun, Saleem N. Bhatti
2014 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom)  
Remote monitoring is an essential part of future mHealth systems for the delivery of personal healthcare allowing the collection of personal bio-data outside clinical environments.  ...  We propose the use of an open and publicly accessible online social media platform (OSMP) as a key component for ubiquitous and personal remote health monitoring.  ...  Priorities in global healthcare are shifting towards goals such as: prevention and early detection; routine monitoring for diagnosis; and treatment of chronic conditions.  ... 
doi:10.1109/healthcom.2014.7001856 dblp:conf/healthcom/KhorakhunB14 fatcat:yxjmnrtcj5hspb3tsz4sgb227u

Internet of Things Architectures, Technologies, Applications, Challenges, and Future Directions for Enhanced Living Environments and Healthcare Systems: A Review

Gonçalo Marques, Rui Pitarma, Nuno M. Garcia, Nuno Pombo
2019 Electronics  
This paper reviews the current state of the art on IoT architectures for ELEs and healthcare systems, with a focus on the technologies, applications, challenges, opportunities, open-source platforms, and  ...  , particularly healthcare systems.  ...  For that, healthcare systems based in IoT should incorporate hardware and software encryption methods and support privacy policies.  ... 
doi:10.3390/electronics8101081 fatcat:hhvkh6elbfghbm3aadddodhipq

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security.  ...  Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  According to 15 , the ubiquitous/pervasive computing includes a complex socio-technical system that needs beyond traditional system-centric approaches for designing security with a well-approached analysis  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Towards the security and privacy analysis of patient portals

Janos L. Mathe, Sean Duncavage, Jan Werner, Bradley A. Malin, Akos Ledeczi, Janos Sztipanovits
2007 ACM SIGBED Review  
Given the sensitivity of patient data, federal regulations require healthcare providers to adopt policy, as well as technology, protections for patient data.  ...  This work introduces the Modelbased Design Environment for Clinical Information Systems (MODECIS) -a graphical design environment that assists CIS architects in formalizing CIS systems as well-defined  ...  for access control and security policy modeling.  ... 
doi:10.1145/1295464.1295467 fatcat:qdvfjuv4z5dtznu2zp2yuuiqqa

Challenges and Possibilities for the Household Medicine Lease (HML) System Viewed in light of CRM — HML-based Everyday Self-medication in Ubiquitous Network Society

Masaru Furukawa
2020 Zenodo  
We will then clarify the following: 1) the usefulness of the business model for ensuring primary healthcare for people in developing countries, 2) the usefulness in our ubiquitous network society of applying  ...  ICT to the HML system, 3) what contributions the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society, and we will also  ...  The white paper"s analysis does not indicate the need for a healthcare system focused on traditional medicine, but it does suggest that self-medication and everyday healthcare need to be made much of in  ... 
doi:10.5281/zenodo.3679116 fatcat:i4yguyo3lfamff2ghpxu6hqe4y

Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare

Antti Evesti, Jani Suomalainen, Reijo Savola
2014 International Journal of Intelligent Computing Research  
Healthcare systems based on them hold a remarkable promise for the costly treatment of chronic diseases.  ...  In this paper, we study Bluetooth, ZigBee, NFC, and Wi-Fi from the security point of view in ubiquitous health applications.  ...  Acknowledgements The work presented here has been carried out in three research projects: PHYLAWS -PHYsical Layer Wireless Security FP7 project, ASSET -Adaptive Security for Smart Internet of Things in  ... 
doi:10.20533/ijicr.2042.4655.2014.0056 fatcat:3oy7ktwvubeuvdtthlnjlf7k2q

Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study

Leonardo Horn Iwaya, Aakash Ahmad, M. Ali Babar
2020 IEEE Access  
Asangi Jayatilaka for her early reviews and insightful comments that helped to greatly improve this article.  ...  ACKNOWLEDGMENT The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme.  ...  Today, m/uHealth technologies carry Weiser's vision towards a pervasive and ubiquitous healthcare, promising access to health services anywhere and anytime.  ... 
doi:10.1109/access.2020.3015962 fatcat:huin3edwzfaoljhbgfjaagmuge

Engineering Policy-Based Ubiquitous Systems

M. Sloman, E. Lupu
2009 Computer journal  
We present an architectural model based on policy-based Self Managed Cells for engineering ubiquitous computing systems and discuss issues of security and fault management.  ...  The advent of miniaturised sensors that can be carried on the body or embedded in the environment, together with ubiquitous 'smart-phones' with various sensors means ubiquitous computing systems already  ...  This paper presents Self-Managed Cells (SMCs) as an engineering paradigm for structuring ubiquitous systems.  ... 
doi:10.1093/comjnl/bxp102 fatcat:zvawvfd75zgbbl4jysu3j3pkey

Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study [article]

Leonardo Horn Iwaya, Aakash Ahmad, M. Ali Babar
2020 arXiv   pre-print
An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services.  ...  This SMS facilitates knowledge transfer, enabling researchers and practitioners to engineer security and privacy for emerging and next generation of m/uHealth systems.  ...  Today, m/uHealth technologies carry Weiser's vision towards a pervasive and ubiquitous healthcare, promising access to health services anywhere and anytime.  ... 
arXiv:2006.12069v1 fatcat:e7b5fe4yvfggnenlgxixopzlbq
« Previous Showing results 1 — 15 out of 8,027 results