2012 IEEE First International Conference on Mobile Services 2012
DOI: 10.1109/mobserv.2012.15
|View full text |Cite
|
Sign up to set email alerts
|

Security and Communication Architecture for Networked Medical Devices in Mobility-Aware eHealth Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Similar issues about guaranteeing user privacy across several providers and organizations are also addressed in [52], [53]. In particular, the work in [52] aims at extending the traditional service-oriented architecture framework to define a flexible policy-based approach for defining and monitoring streaming event data based on a general publish/subscribe model in business-tobusiness healthcare networks.…”
Section: ) Challengesmentioning
confidence: 98%
See 1 more Smart Citation
“…Similar issues about guaranteeing user privacy across several providers and organizations are also addressed in [52], [53]. In particular, the work in [52] aims at extending the traditional service-oriented architecture framework to define a flexible policy-based approach for defining and monitoring streaming event data based on a general publish/subscribe model in business-tobusiness healthcare networks.…”
Section: ) Challengesmentioning
confidence: 98%
“…A preliminary approach to address security and privacy issues is presented in [53]. In emergency scenarios, the "on-the-fly" network integration as well as the information exchange among different entities are of paramount importance.…”
Section: ) Challengesmentioning
confidence: 99%
“…Recently, there has been some effort towards the inclusion of some security and privacy measures within X73PHD [27][28][29][30]. The methods proposed by such projects for handling authentication range from modifying the FSM to add challenge-based authentication [27,28] to develop a rather complex certificate-based architecture [29].…”
Section: A) Security and Privacymentioning
confidence: 99%
“…The methods proposed by such projects for handling authentication range from modifying the FSM to add challenge-based authentication [27,28] to develop a rather complex certificate-based architecture [29]. The encryption tools proposed on those manuscripts include symmetric algorithms like "Rivest, Shamir & Adleman" [27], asymmetric algorithms like the advanced encryption standard (assuming that the secret key is allotted in advance within the agent and the manager) [30], or biometric keys [28].…”
Section: A) Security and Privacymentioning
confidence: 99%
“…In 2012, Kliem et al [8] proposed architecture for secure communication in a PHD mobile setting. In the same year, Rubio et al [9] published a paper regarding a strong and simple security expansion for an ECG device.…”
Section: Journal Of Applied Mathematicsmentioning
confidence: 99%