A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards a cross‐context identity management framework in e‐health
2009
Online information review (Print)
How the proposed cross-context identity management service can be integrated in an e-health system is explained with a use case scenario. ...
Originality/value -This paper proposes a new service for cross-context identity management in e-health systems, improving interoperability between agencies when context-specific information is transferred ...
Cross-context identity management in e-health In this section, we look at identity management from an e-health prospective. ...
doi:10.1108/14684520910969880
fatcat:hujfqn6w4ndlpnueyfiq23jble
A New Framework Architecture for Next Generation e-Health Services
2013
IEEE journal of biomedical and health informatics
The challenge for fast and low-cost deployment of ubiquitous personalized e-Health services has prompted us to propose a new framework architecture for such services. ...
as the patient's bio and context sensor networks. ...
Achieving Security To achieve security in the e-Health tele-monitoring service a number of Security Mechanisms should be integrated in a multilayer approach. ...
doi:10.1109/titb.2012.2224876
pmid:23086531
fatcat:jhabgjj72vapre3hirdxp4hv3a
An Enhanced Multi-Layered Security Framework for Context-Aware Mobile Web Services
2016
International Journal of Computer Applications
Hence, there is a need that arises to design a security system for context-aware web services with the support of end-to-end security in business services between the service providers and service requesters ...
The objective of this research work is to provide a secure framework for Context aware web services using access control mechanisms. ...
Such a situation has motivated us greatly to develop a security framework for health care related context aware mobile web services. ...
doi:10.5120/ijca2016910862
fatcat:kyct4pmvjndc7odd2n4vm3mlia
Health Information Management On Semantic Web :(Semantic HIM)
2012
International journal of Web & Semantic Technology
KEYWORDS Health Information management (HIM), medical document, health information system(HIS), semantic web, security, trust. ...
is Reality-based medicine, so that is the most important ,richest and the most realistic source of medical and health information.Health information management systems that require systems to the storage ...
Secure Health Information management is also a key aspect of secure Managment. ...
doi:10.5121/ijwest.2012.3106
fatcat:lxx6xu54o5a2ldpfuputn6rpwi
Healthcare Information Management System in Home Environment
[chapter]
2007
Lecture Notes in Computer Science
This paper describes a healthcare information management system for supporting healthcare home services based on DOGF. ...
The database constructed from this information for the purpose of home healthcare services is divided into the base information that uses the real schemes and the context based information that uses the ...
We will also address the relevant security issues in the context of this work. ...
doi:10.1007/978-3-540-75664-4_22
fatcat:jshawuukkva4niymoul6w75gam
Generic platform for advanced E-health applications
2010
The 12th IEEE International Conference on e-Health Networking, Applications and Services
The German OSAmI-D subproject develops a construction kit based on the OSAmI component platform with a particular focus on services for medical and E-Health applications. ...
The demographic change and the cost pressure in the healthcare sector drive the need for efficient and secure medical homecare solutions which apply for the people who are elderly or in anastasis. ...
SECURITY Security aspects are of special importance in E-Health applications. ...
doi:10.1109/health.2010.5556571
fatcat:cnhdzf2l2vbq5ns3pabx6t4xqu
TALISMAN+: Intelligent System for Follow-Up and Promotion of Personal Autonomy
[chapter]
2011
Lecture Notes in Computer Science
, technological or social-health settings. ...
The TALISMAN+ project, financed by the Spanish Ministry of Science and Innovation, aims to research and demonstrate innovative solutions transferable to society which offer services and products based ...
identify the main risks associated to e-health in general and information monitoring and management in particular. ...
doi:10.1007/978-3-642-21303-8_26
fatcat:sghpnbf4u5dlrifbet3unl6wf4
Design for Distributed Moroccan Hospital Pharmacy Information Environment with Service Oriented Architecture
[article]
2012
arXiv
pre-print
We also present a solution to secure Web services communication using WS-SecurityPolicy. ...
We therefore propose a global Web services-based e-health architecture for integrating different heterogeneous blocks and various data resources of this system. ...
Secured HPIS Web services using WS-SecurityPolicy Given the sensitivity of information exchanged, e-health systems require a high level of security. ...
arXiv:1207.3277v1
fatcat:p3z6bc6e6bbstkf4fjup7vzlza
Identity-management factors in e-health and telemedicine applications
2008
Journal of Telemedicine and Telecare
management standards in the context of eHealth. ...
Nowadays, thanks to the characteristic of "assigning an identity" to objects (or even people), the term "identity management" embraces also the context of the Radio Frequency Identifiers (RFID) and the ...
In particular its activity in ID Management will address biometrics (both public and private use -focus on a specific or new application…), RFID and Medical data (e-health patient records). ...
doi:10.1258/jtt.2008.007014
pmid:18852323
fatcat:466hevxtjjbvzjl74cljlpr5hq
Identity in federated electronic healthcare
2008
2008 1st IFIP Wireless Days
Therefore, the selection of a privacy-preserving identification scheme is a primary requirement in federated e-health. ...
This paper presents an identity management infrastructure that minimizes the abovementioned threats. ...
Roles have been adopted in the past as the cornerstone technique to manage permissions in e-health, e.g., in the context of the UK National Health Service [2] . ...
doi:10.1109/wd.2008.4812919
fatcat:wniw65zxgrdzthmpmo7w4fy4yy
Improving e-Health Services and System Requirements by Modelling the Health Environment
2014
Journal of Software
Today, health organisational executives agree that health systems can play an increasingly key role in the achievement of the e-health business. ...
and other health organisational resources from security threats. ...
The paper is structured as follows: in Section 2, we review the context of our paper, which includes the theoretical concept of information security in context of e-health. ...
doi:10.4304/jsw.9.5.1189-1201
fatcat:ghffjwtwzfglhhnnffaflxcz4q
Innovative Applications and Security of Internet of Things
2014
International Journal of Distributed Sensor Networks
The paper "Secure e-health system on passive RFID: outpatient clinic and emergency care" introduces a robust RFID-based e-health system which strengthens the system security, protects the patient's privacy ...
This special issue includes five articles covering security issues, power management issue, innovative applications, and integration with social informatics. ...
The paper "Secure e-health system on passive RFID: outpatient clinic and emergency care" introduces a robust RFID-based e-health system which strengthens the system security, protects the patient's privacy ...
doi:10.1155/2014/717898
fatcat:c3qbxqphfbca7ch57awrg6vzeq
Proposal for a Security Management in Cloud Computing for Health Care
2014
The Scientific World Journal
Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations ...
Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system ...
(vii) Security: as many service providers could provide the e-health cloud services, and it would be used by many health care providers, therefore their security risk would be very high. ...
doi:10.1155/2014/146970
pmid:24701137
pmcid:PMC3950467
fatcat:3zmtx4ldzbhsrfuykqjalerphy
Ontology-Based Matching of Security Attributes for Personal Data Access in e-Health
[chapter]
2011
Lecture Notes in Computer Science
The approach is validated in an e-Health scenario for the access of patient data for diabetes patient monitoring and disease management. ...
The approach is based on an ontology-based interoperation service (OBIS) whose role is to translate security attributes (name-value pairs) from local security vocabularies into the attributes recognized ...
This paper is supported by the EC FP7 TAS 3 (Trusted Architecture for Securely Shared Services) project. ...
doi:10.1007/978-3-642-25106-1_13
fatcat:vvcs5jqf4fbo5p3xejdo7q4m7m
Ontology And Cdss Based Intelligent Health Data Management In Health Care Server
2007
Zenodo
In this paper, we designed and developed the intelligent Healthcare Server to manage the user's health data using CDSS and ontology. ...
These collected user's health data should be managed and analyzed in the healthcare server, so that care giver or user can monitor user's physiological state. ...
When the Diagnosis service transfers these health feature value, the Diagnosis Service encrypts these data for data security. ...
doi:10.5281/zenodo.1059425
fatcat:uozyg7mjpng3lowozfah3pg4uq
« Previous
Showing results 1 — 15 out of 274,466 results