Filters








274,466 Hits in 6.2 sec

Towards a cross‐context identity management framework in e‐health

Mina Deng, Danny De Cock, Bart Preneel
2009 Online information review (Print)  
How the proposed cross-context identity management service can be integrated in an e-health system is explained with a use case scenario.  ...  Originality/value -This paper proposes a new service for cross-context identity management in e-health systems, improving interoperability between agencies when context-specific information is transferred  ...  Cross-context identity management in e-health In this section, we look at identity management from an e-health prospective.  ... 
doi:10.1108/14684520910969880 fatcat:hujfqn6w4ndlpnueyfiq23jble

A New Framework Architecture for Next Generation e-Health Services

M. Fengou, G. Mantas, D. Lymberopoulos, N. Komninos, S. Fengos, N. Lazarou
2013 IEEE journal of biomedical and health informatics  
The challenge for fast and low-cost deployment of ubiquitous personalized e-Health services has prompted us to propose a new framework architecture for such services.  ...  as the patient's bio and context sensor networks.  ...  Achieving Security To achieve security in the e-Health tele-monitoring service a number of Security Mechanisms should be integrated in a multilayer approach.  ... 
doi:10.1109/titb.2012.2224876 pmid:23086531 fatcat:jhabgjj72vapre3hirdxp4hv3a

An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services

P. Joseph, S. Britto
2016 International Journal of Computer Applications  
Hence, there is a need that arises to design a security system for context-aware web services with the support of end-to-end security in business services between the service providers and service requesters  ...  The objective of this research work is to provide a secure framework for Context aware web services using access control mechanisms.  ...  Such a situation has motivated us greatly to develop a security framework for health care related context aware mobile web services.  ... 
doi:10.5120/ijca2016910862 fatcat:kyct4pmvjndc7odd2n4vm3mlia

Health Information Management On Semantic Web :(Semantic HIM)

Nasim Khozoie
2012 International journal of Web & Semantic Technology  
KEYWORDS Health Information management (HIM), medical document, health information system(HIS), semantic web, security, trust.  ...  is Reality-based medicine, so that is the most important ,richest and the most realistic source of medical and health information.Health information management systems that require systems to the storage  ...  Secure Health Information management is also a key aspect of secure Managment.  ... 
doi:10.5121/ijwest.2012.3106 fatcat:lxx6xu54o5a2ldpfuputn6rpwi

Healthcare Information Management System in Home Environment [chapter]

Chang-Sun Shin, Su-Chong Joo, Chang-Won Jeong
2007 Lecture Notes in Computer Science  
This paper describes a healthcare information management system for supporting healthcare home services based on DOGF.  ...  The database constructed from this information for the purpose of home healthcare services is divided into the base information that uses the real schemes and the context based information that uses the  ...  We will also address the relevant security issues in the context of this work.  ... 
doi:10.1007/978-3-540-75664-4_22 fatcat:jshawuukkva4niymoul6w75gam

Generic platform for advanced E-health applications

Elmar Zeeb, Guido Moritz, Wolfgang Thronicke, Myriam Lipprandt, Andreas Hein, Frerk Muller, Jan Kruger, Oliver Dohndorf, Anna Litvina, Christoph Fiehe, Ingo Luck, Frank Golatowski (+1 others)
2010 The 12th IEEE International Conference on e-Health Networking, Applications and Services  
The German OSAmI-D subproject develops a construction kit based on the OSAmI component platform with a particular focus on services for medical and E-Health applications.  ...  The demographic change and the cost pressure in the healthcare sector drive the need for efficient and secure medical homecare solutions which apply for the people who are elderly or in anastasis.  ...  SECURITY Security aspects are of special importance in E-Health applications.  ... 
doi:10.1109/health.2010.5556571 fatcat:cnhdzf2l2vbq5ns3pabx6t4xqu

TALISMAN+: Intelligent System for Follow-Up and Promotion of Personal Autonomy [chapter]

David Ausín, Diego López-de-Ipiña, José Bravo, Miguel Ángel Valero, Francisco Flórez
2011 Lecture Notes in Computer Science  
, technological or social-health settings.  ...  The TALISMAN+ project, financed by the Spanish Ministry of Science and Innovation, aims to research and demonstrate innovative solutions transferable to society which offer services and products based  ...  identify the main risks associated to e-health in general and information monitoring and management in particular.  ... 
doi:10.1007/978-3-642-21303-8_26 fatcat:sghpnbf4u5dlrifbet3unl6wf4

Design for Distributed Moroccan Hospital Pharmacy Information Environment with Service Oriented Architecture [article]

Hajar Omrana, Safae Nassiri, Fatima-Zahra Belouadha, Ounsa Roudiés
2012 arXiv   pre-print
We also present a solution to secure Web services communication using WS-SecurityPolicy.  ...  We therefore propose a global Web services-based e-health architecture for integrating different heterogeneous blocks and various data resources of this system.  ...  Secured HPIS Web services using WS-SecurityPolicy Given the sensitivity of information exchanged, e-health systems require a high level of security.  ... 
arXiv:1207.3277v1 fatcat:p3z6bc6e6bbstkf4fjup7vzlza

Identity-management factors in e-health and telemedicine applications

Mario Savastano, Asbjorn Hovsto, Peter Pharow, Bernd Blobel
2008 Journal of Telemedicine and Telecare  
management standards in the context of eHealth.  ...  Nowadays, thanks to the characteristic of "assigning an identity" to objects (or even people), the term "identity management" embraces also the context of the Radio Frequency Identifiers (RFID) and the  ...  In particular its activity in ID Management will address biometrics (both public and private use -focus on a specific or new application…), RFID and Medical data (e-health patient records).  ... 
doi:10.1258/jtt.2008.007014 pmid:18852323 fatcat:466hevxtjjbvzjl74cljlpr5hq

Identity in federated electronic healthcare

Mina Deng, Riccardo Scandariato, Danny De Cock, Bart Preneel, Wouter Joosen
2008 2008 1st IFIP Wireless Days  
Therefore, the selection of a privacy-preserving identification scheme is a primary requirement in federated e-health.  ...  This paper presents an identity management infrastructure that minimizes the abovementioned threats.  ...  Roles have been adopted in the past as the cornerstone technique to manage permissions in e-health, e.g., in the context of the UK National Health Service [2] .  ... 
doi:10.1109/wd.2008.4812919 fatcat:wniw65zxgrdzthmpmo7w4fy4yy

Improving e-Health Services and System Requirements by Modelling the Health Environment

Ahmed H. Alahmadi, Ben Soh, Azmat Ullah
2014 Journal of Software  
Today, health organisational executives agree that health systems can play an increasingly key role in the achievement of the e-health business.  ...  and other health organisational resources from security threats.  ...  The paper is structured as follows: in Section 2, we review the context of our paper, which includes the theoretical concept of information security in context of e-health.  ... 
doi:10.4304/jsw.9.5.1189-1201 fatcat:ghffjwtwzfglhhnnffaflxcz4q

Innovative Applications and Security of Internet of Things

Hung-Yu Chien, YingJiu Li, Nai-Wei Lo
2014 International Journal of Distributed Sensor Networks  
The paper "Secure e-health system on passive RFID: outpatient clinic and emergency care" introduces a robust RFID-based e-health system which strengthens the system security, protects the patient's privacy  ...  This special issue includes five articles covering security issues, power management issue, innovative applications, and integration with social informatics.  ...  The paper "Secure e-health system on passive RFID: outpatient clinic and emergency care" introduces a robust RFID-based e-health system which strengthens the system security, protects the patient's privacy  ... 
doi:10.1155/2014/717898 fatcat:c3qbxqphfbca7ch57awrg6vzeq

Proposal for a Security Management in Cloud Computing for Health Care

Knut Haufe, Srdan Dzombeta, Knud Brandis
2014 The Scientific World Journal  
Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations  ...  Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system  ...  (vii) Security: as many service providers could provide the e-health cloud services, and it would be used by many health care providers, therefore their security risk would be very high.  ... 
doi:10.1155/2014/146970 pmid:24701137 pmcid:PMC3950467 fatcat:3zmtx4ldzbhsrfuykqjalerphy

Ontology-Based Matching of Security Attributes for Personal Data Access in e-Health [chapter]

Ioana Ciuciu, Brecht Claerhout, Louis Schilders, Robert Meersman
2011 Lecture Notes in Computer Science  
The approach is validated in an e-Health scenario for the access of patient data for diabetes patient monitoring and disease management.  ...  The approach is based on an ontology-based interoperation service (OBIS) whose role is to translate security attributes (name-value pairs) from local security vocabularies into the attributes recognized  ...  This paper is supported by the EC FP7 TAS 3 (Trusted Architecture for Securely Shared Services) project.  ... 
doi:10.1007/978-3-642-25106-1_13 fatcat:vvcs5jqf4fbo5p3xejdo7q4m7m

Ontology And Cdss Based Intelligent Health Data Management In Health Care Server

Eun-Jung Ko, Hyung-Jik Lee, Jeun-Woo Lee
2007 Zenodo  
In this paper, we designed and developed the intelligent Healthcare Server to manage the user's health data using CDSS and ontology.  ...  These collected user's health data should be managed and analyzed in the healthcare server, so that care giver or user can monitor user's physiological state.  ...  When the Diagnosis service transfers these health feature value, the Diagnosis Service encrypts these data for data security.  ... 
doi:10.5281/zenodo.1059425 fatcat:uozyg7mjpng3lowozfah3pg4uq
« Previous Showing results 1 — 15 out of 274,466 results