2015 Information Security for South Africa (ISSA) 2015
DOI: 10.1109/issa.2015.7335061
|View full text |Cite
|
Sign up to set email alerts
|

Risk-driven security metrics development for an e-health IoT application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…Clinicians and other healthcare professionals might not see security from the same perspective as IT professionals and are mainly driven by the need to deliver excellent patient care [3]. Security metrics can help stakeholders to learn about the insight and trends in their organisation and to measure how the organisation is performing against their peers in the industry [4]. The healthcare sector had numerous security breaches over the last few years and the trend has been increasing.…”
Section: Introductionmentioning
confidence: 99%
“…Clinicians and other healthcare professionals might not see security from the same perspective as IT professionals and are mainly driven by the need to deliver excellent patient care [3]. Security metrics can help stakeholders to learn about the insight and trends in their organisation and to measure how the organisation is performing against their peers in the industry [4]. The healthcare sector had numerous security breaches over the last few years and the trend has been increasing.…”
Section: Introductionmentioning
confidence: 99%
“…At the IoT application layer, the key requirements vary according to the type/sector for which the IoT application is developed. For example, key requirements for health‐monitoring applications are robustness, durability, accuracy, precision, reliability, security, privacy, availability, and responsiveness . Low latency is a key requirement in critical and real‐time applications, whereas network utilization and energy efficiency have a high priority in less critical applications such as building automation .…”
Section: Related Workmentioning
confidence: 99%
“…For example, key requirements for health-monitoring applications are robustness, durability, accuracy, precision, reliability, security, privacy, availability, and responsiveness. 23,32,33 Low latency is a key requirement in critical and real-time applications, 10,23 whereas network utilization and energy efficiency have a high priority in less critical applications such as building automation. 23,34 In our work, we considered the most common QoS metrics for all layers of the IoT reference architecture.…”
Section: Qos Metrics Through the Layersmentioning
confidence: 99%
“…However, with the Internet of Things (IoT) this monitoring can be extended easily to the patient's daily environment (home, workplace, etc. ).This model allows considering a broad spectrum of application for self-care with medical measurements [1] and the preventive and Low-Cost Diagnostics. In short, we can imagine many applications for the e-health with IoT environment.…”
Section: Motivationmentioning
confidence: 99%
“…Additionally, we need a certain metric to quantify the risk and other parameters. Savola et al [1] Propose heuristics for security metrics development, based on the risk-analysis results achieved through two view-points: the service provider's business perspective, and the end-user's perspective. Nevertheless, these analyzes don't focus on privacy and assume that data reside in a well-managed shared database on the service provider's premises.…”
mentioning
confidence: 99%