2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010
DOI: 10.1109/percomw.2010.5470649
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and context-aware access control for pervasive medical sensor networks

Abstract: Medical sensor networks allow for pervasive health monitoring in hospitals, at home, or on the way. Each user carries a set of wireless medical sensors that allows caregivers to monitor his health state. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that third parties cannot access confidential information. Additionally, the system also has to be aware of context changes, such as emergencies, to ensure fast access to the medical data, and thus, the safety of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…In [66] the authors have analyzed the proposed protocol ECoSec (Efficient Cooperative Security Protocol) operation and parameters for node agreement that is performed for admission voting and revocation information. Other work done in handling such issues by context awareness and intelligence can be found in [67] [68]. In [69] the authors discussed resilience management in IoT.…”
Section: Existing Solution and Discussionmentioning
confidence: 99%
“…In [66] the authors have analyzed the proposed protocol ECoSec (Efficient Cooperative Security Protocol) operation and parameters for node agreement that is performed for admission voting and revocation information. Other work done in handling such issues by context awareness and intelligence can be found in [67] [68]. In [69] the authors discussed resilience management in IoT.…”
Section: Existing Solution and Discussionmentioning
confidence: 99%
“…A patient's control could be extended with the right to manage roles attributed to the healthcare professionals in healthcare institutions, of course in limited, well-defined situations. For example, access can be granted to substitute general practitioners or, for example, to allow doctors that happen to be around and help the patient in some urgent, first-aid situation [33].…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…G. Morchon and K. Wehrle in [31] present a modular access control system for pervasive healthcare applications. The system extends the traditional RBAC model for two main issues: Firstly, to assign and distribute access control policies to sensor nodes.…”
Section: ) Security Models For Data Collection Levelmentioning
confidence: 99%
“…Three different types of context-data were considered in this model. The Environmental context refers to location or time, the Personal information context regarding age, status, or medical record and finally, the current medical data such as Heart rate or blood pressure [31].…”
Section: Care Security Modelmentioning
confidence: 99%