Innovation in Health Informatics 2020
DOI: 10.1016/b978-0-12-819043-2.00008-3
|View full text |Cite
|
Sign up to set email alerts
|

Security and privacy solutions for smart healthcare systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 77 publications
0
3
0
Order By: Relevance
“…Most e‐healthcare data in enterprises is concerned with technical data security issues in utilizing software and ICT hardware and therefore, efforts should be made in limiting the risk of information security violations in smart healthcare systems (Kobis, 2019; Lu & Sinnott, 2020). In this context, the security of interoperable e‐health systems should be mainly centered on confidentiality, integrity, and availability (CIA) enforcement at the database engine layer of an EA (Cherdantseva & Hilton, 2013).…”
Section: Theoretical Insightsmentioning
confidence: 99%
“…Most e‐healthcare data in enterprises is concerned with technical data security issues in utilizing software and ICT hardware and therefore, efforts should be made in limiting the risk of information security violations in smart healthcare systems (Kobis, 2019; Lu & Sinnott, 2020). In this context, the security of interoperable e‐health systems should be mainly centered on confidentiality, integrity, and availability (CIA) enforcement at the database engine layer of an EA (Cherdantseva & Hilton, 2013).…”
Section: Theoretical Insightsmentioning
confidence: 99%
“…The massive medical data is stored on cloud servers and moves wirelessly over the insecure forwarding medium. Therefore, secure and privacy-preserving solutions for sustainable systems are demanding factors and need to maintain the resources efficiently [16][17][18][19]. The purpose of this research work is to explore blockchain, which is an emerging technology [20,21] to improve the performance of the healthcare system against security extortions with efficient data management.…”
Section: Introductionmentioning
confidence: 99%
“…In a more heterogeneous environment, the incidence of a security breach increases, i.e. a setup such as the healthcare, where privacy of users is the principal concern [9,10]. A typical smart healthcare scenario may involve adaptation of devices that the users already have, for the specific need.…”
Section: Introductionmentioning
confidence: 99%