2016
DOI: 10.1109/jbhi.2015.2510403
|View full text |Cite
|
Sign up to set email alerts
|

BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. An emerging application for WSNs involves their use in healthcare where they are generally termed wireless medical sensor networks. In a hospital, outfitting every patient with tiny, wearable, wireless vital sign sensors would allow doctors, nurses, and other caregivers to continuously monitor the state of their patients. In such a scenario, patients are expected to be tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 23 publications
0
21
0
Order By: Relevance
“…Marinovic et al [24] presented a new break-glass model named Rampole, which could put integrity constraint into the decision process so that a policy maker can manage the break-glass access authority in a fine-grained manner. Maw et al [25] proposed a break-glass access model for the health care system with wireless sensor network, which considered the enforcement of access permissions across medical domains. However, these research papers [6,7,24,25] only present the architectures rather than the concrete scheme.…”
Section: Break-glass Accessmentioning
confidence: 99%
“…Marinovic et al [24] presented a new break-glass model named Rampole, which could put integrity constraint into the decision process so that a policy maker can manage the break-glass access authority in a fine-grained manner. Maw et al [25] proposed a break-glass access model for the health care system with wireless sensor network, which considered the enforcement of access permissions across medical domains. However, these research papers [6,7,24,25] only present the architectures rather than the concrete scheme.…”
Section: Break-glass Accessmentioning
confidence: 99%
“…To address the security policy violations from both the authorized and unauthorized users, a flexible access control model was proposed by Maw et al [1] named BTG-AC (Break-The-Glass Access Control) model. Availability issue was addressed by the BTG-AC model.…”
Section: Literature Reviewmentioning
confidence: 99%
“…1,2 Large-scale multiple-input-multiple-output (MIMO) is regarded as an emerging technology to enhance data rate of future wireless networks 2 and the wireless virtualization is regarded as an efficient paradigm to enhance the radio frequency (RF) spectrum utilization by subleasing RF slices of wireless infrastructure providers (WIPs) to mobile virtual network operators (MVNOs). With exponential increase in the number of wireless users, future wireless networks are expected to handle far more traffic at much higher speed than that of existing wireless networks.…”
Section: Introductionmentioning
confidence: 99%