2022 IEEE 35th International Symposium on Computer-Based Medical Systems (CBMS) 2022
DOI: 10.1109/cbms55023.2022.00040
|View full text |Cite
|
Sign up to set email alerts
|

Ethically Informed Software Process for Smart Health Home

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…In the healthcare industry, most wearable medical devices that support general wellness are grouped in Class I because they do not meet the current medical device standards; other devices meant for medical reasons are grouped in Class II and III, which need strict certification procedures and regulatory approvals; and the International Electrotechnical Commission 62304 reference standard for medical software only describes the software lifecycle. These defects have become a major challenge for software engineers developing intelligent health homes [110].…”
Section: Regulatory Compliance Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…In the healthcare industry, most wearable medical devices that support general wellness are grouped in Class I because they do not meet the current medical device standards; other devices meant for medical reasons are grouped in Class II and III, which need strict certification procedures and regulatory approvals; and the International Electrotechnical Commission 62304 reference standard for medical software only describes the software lifecycle. These defects have become a major challenge for software engineers developing intelligent health homes [110].…”
Section: Regulatory Compliance Challengesmentioning
confidence: 99%
“…The Data Encryption Standard (DES), Triple Data Encryption Standard (Triple DES), Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC), Digital Signature Algorithm (DSA), Secure Hash Algorithm 2 (SHA-2), SHA-3, Hash-based Message Authentication Code (HMAC), digital certificates, and quantum cryptography are the cryptographic algorithms employed in SHS to encrypt healthcare data at end-to-end, rest, in transit, and during backup processes[35][110][140][141]. Medical data are securely encrypted before being transmitted to the cloud or between storage and transmission[45][142].…”
mentioning
confidence: 99%
See 1 more Smart Citation