A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards a Security Policy for Ubiquitous Healthcare Systems (Position Paper)
[chapter]
Ubiquitous Convergence Technology
We take a few initial steps towards a U-Healthcare security policy and propose a system architecture designed to help enforce the policy's goals. ...
In this position paper we highlight some potential threats and open the discussion about the security requirements of this new scenario. ...
The first contribution of this position paper is to point out such new threats and to open up the debate about security for U-Healthcare. ...
doi:10.1007/978-3-540-71789-8_27
dblp:conf/icuct/KimBS06
fatcat:gbpxtnocjzgxbdwetg7gqn5qr4
Unified Model for Data Security - A Position Paper
2014
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
In this paper, we study the evolution of data security from the perspective of past proposed frameworks, and present a novel Unified Model for Data Security (UMDS). ...
There is a much needed push for a holistic approach to data security instead of the current bespoke approaches. ...
*This work is a position paper that discusses notion of Data Security from various aspects. ...
doi:10.1109/trustcom.2014.110
dblp:conf/trustcom/AkramK14
fatcat:ejqanvmff5b23jcoiddxpchdia
Digital Trust - Trusted Computing and Beyond: A Position Paper
2014
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
This paper looks at digital trust from the point of view of security and examines how valid trust approaches from other domains are now making their way into secure computing. ...
We especially focus on the domains of cloud computing, mobile computing and cyber-physical systems. ...
*This work is a position paper that discusses notion of trust in different computing fields. It also analyses our proposals for emerging fields. ...
doi:10.1109/trustcom.2014.116
dblp:conf/trustcom/AkramK14a
fatcat:xjmm6svm2zbkzmdewmgemha33u
Ubiquitous Healthcare Information System: Assessment of its Impacts to Patient's Information
2011
International Journal for Information Security Research
Once a ubiquitous healthcare service is in place, then the ubiquitous healthcare information system will "always be on" and hence promising better health and well-being for the general population. ...
With advancement in technology, healthcare organisations are now moving towards Ubiquitous healthcare, which is an emerging field of technology that uses a large number of environmental and patients' sensors ...
In section 5, positive impacts brought by the adoption and use of ubiquitous systems in healthcare will be discussed. ...
doi:10.20533/ijisr.2042.4639.2011.0009
fatcat:z5fowliwavbcvoljfqdnbnx2sa
Analyses of Characteristics of U-Healthcare System Based on Wireless Communication
2012
Journal of information and communication convergence engineering
Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper. ...
For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. ...
This may result in a security problem such as information leakage. Fig. 1 describes a topology of ubiquitous healthcare systems. ...
doi:10.6109/jicce.2012.10.4.337
fatcat:drajrrvbjjhvxe2cpgkgopfd5u
Ubiquitous Systems towards Green, Sustainable, and Secured Smart Environment
2015
The Scientific World Journal
on a strict and rigorous review policy. ...
After a two-round review process, only 22 papers were accepted for being included in this issue. ...
on a strict and rigorous review policy. ...
doi:10.1155/2015/281921
pmid:25874242
pmcid:PMC4383471
fatcat:2wdwh3sbszhindv2vrqmurf4by
Using online social media platforms for ubiquitous, personal health monitoring
2014
2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom)
Remote monitoring is an essential part of future mHealth systems for the delivery of personal healthcare allowing the collection of personal bio-data outside clinical environments. ...
We propose the use of an open and publicly accessible online social media platform (OSMP) as a key component for ubiquitous and personal remote health monitoring. ...
Priorities in global healthcare are shifting towards goals such as: prevention and early detection; routine monitoring for diagnosis; and treatment of chronic conditions. ...
doi:10.1109/healthcom.2014.7001856
dblp:conf/healthcom/KhorakhunB14
fatcat:yxjmnrtcj5hspb3tsz4sgb227u
Internet of Things Architectures, Technologies, Applications, Challenges, and Future Directions for Enhanced Living Environments and Healthcare Systems: A Review
2019
Electronics
This paper reviews the current state of the art on IoT architectures for ELEs and healthcare systems, with a focus on the technologies, applications, challenges, opportunities, open-source platforms, and ...
, particularly healthcare systems. ...
For that, healthcare systems based in IoT should incorporate hardware and software encryption methods and support privacy policies. ...
doi:10.3390/electronics8101081
fatcat:hhvkh6elbfghbm3aadddodhipq
Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey
2017
Indian Journal of Science and Technology
Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security. ...
Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on. ...
According to 15 , the ubiquitous/pervasive computing includes a complex socio-technical system that needs beyond traditional system-centric approaches for designing security with a well-approached analysis ...
doi:10.17485/ijst/2016/v9i48/89396
fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq
Towards the security and privacy analysis of patient portals
2007
ACM SIGBED Review
Given the sensitivity of patient data, federal regulations require healthcare providers to adopt policy, as well as technology, protections for patient data. ...
This work introduces the Modelbased Design Environment for Clinical Information Systems (MODECIS) -a graphical design environment that assists CIS architects in formalizing CIS systems as well-defined ...
for access control and security policy modeling. ...
doi:10.1145/1295464.1295467
fatcat:qdvfjuv4z5dtznu2zp2yuuiqqa
Challenges and Possibilities for the Household Medicine Lease (HML) System Viewed in light of CRM — HML-based Everyday Self-medication in Ubiquitous Network Society
2020
Zenodo
We will then clarify the following: 1) the usefulness of the business model for ensuring primary healthcare for people in developing countries, 2) the usefulness in our ubiquitous network society of applying ...
ICT to the HML system, 3) what contributions the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society, and we will also ...
The white paper"s analysis does not indicate the need for a healthcare system focused on traditional medicine, but it does suggest that self-medication and everyday healthcare need to be made much of in ...
doi:10.5281/zenodo.3679116
fatcat:i4yguyo3lfamff2ghpxu6hqe4y
Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare
2014
International Journal of Intelligent Computing Research
Healthcare systems based on them hold a remarkable promise for the costly treatment of chronic diseases. ...
In this paper, we study Bluetooth, ZigBee, NFC, and Wi-Fi from the security point of view in ubiquitous health applications. ...
Acknowledgements The work presented here has been carried out in three research projects: PHYLAWS -PHYsical Layer Wireless Security FP7 project, ASSET -Adaptive Security for Smart Internet of Things in ...
doi:10.20533/ijicr.2042.4655.2014.0056
fatcat:3oy7ktwvubeuvdtthlnjlf7k2q
Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study
2020
IEEE Access
Asangi Jayatilaka for her early reviews and insightful comments that helped to greatly improve this article. ...
ACKNOWLEDGMENT The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme. ...
Today, m/uHealth technologies carry Weiser's vision towards a pervasive and ubiquitous healthcare, promising access to health services anywhere and anytime. ...
doi:10.1109/access.2020.3015962
fatcat:huin3edwzfaoljhbgfjaagmuge
Engineering Policy-Based Ubiquitous Systems
2009
Computer journal
We present an architectural model based on policy-based Self Managed Cells for engineering ubiquitous computing systems and discuss issues of security and fault management. ...
The advent of miniaturised sensors that can be carried on the body or embedded in the environment, together with ubiquitous 'smart-phones' with various sensors means ubiquitous computing systems already ...
This paper presents Self-Managed Cells (SMCs) as an engineering paradigm for structuring ubiquitous systems. ...
doi:10.1093/comjnl/bxp102
fatcat:zvawvfd75zgbbl4jysu3j3pkey
Security and Privacy for mHealth and uHealth Systems: a Systematic Mapping Study
[article]
2020
arXiv
pre-print
An increased adoption of mobile health (mHealth) and ubiquitous health (uHealth) systems empower users with handheld devices and embedded sensors for a broad range of healthcare services. ...
This SMS facilitates knowledge transfer, enabling researchers and practitioners to engineer security and privacy for emerging and next generation of m/uHealth systems. ...
Today, m/uHealth technologies carry Weiser's vision towards a pervasive and ubiquitous healthcare, promising access to health services anywhere and anytime. ...
arXiv:2006.12069v1
fatcat:e7b5fe4yvfggnenlgxixopzlbq
« Previous
Showing results 1 — 15 out of 8,027 results