2017 IEEE Life Sciences Conference (LSC) 2017
DOI: 10.1109/lsc.2017.8268151
|View full text |Cite
|
Sign up to set email alerts
|

Designing a secure architecture for m-health applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 17 publications
0
8
0
2
Order By: Relevance
“…These security risks pose a significant barrier to the adoption of 5G-enabled healthcare services. Inability to protect the privacy and security of patient data has both social and economic consequences (Burns & Johnson, 2015;Alibasa et al, 2017). For example, a breach in the integrity of patient data can result in misdiagnosis, mistreatment and possibly death.…”
Section: Latencymentioning
confidence: 99%
See 1 more Smart Citation
“…These security risks pose a significant barrier to the adoption of 5G-enabled healthcare services. Inability to protect the privacy and security of patient data has both social and economic consequences (Burns & Johnson, 2015;Alibasa et al, 2017). For example, a breach in the integrity of patient data can result in misdiagnosis, mistreatment and possibly death.…”
Section: Latencymentioning
confidence: 99%
“…However, they do not provide end-to-end security guarantees for health data. Alibasa et al (2017) proposed a security architecture that focuses on the data storage network domain. The architecture separately stores identifiable and non-identifiable patient data on servers.…”
Section: Security Architecturesmentioning
confidence: 99%
“…[5], [6] Availability Clinical data must be easily accessible to authorized people, whenever they require it.…”
Section: Integritymentioning
confidence: 99%
“…[5], [6] Digital Object Identifier (DOI): http://dx.doi.org/10.18687/LACCEI2019. Access Control Doctors, nurses and patients access the information previously shared by the data owner.…”
Section: Integritymentioning
confidence: 99%
See 1 more Smart Citation