2018 International Conference on Computer, Information and Telecommunication Systems (CITS) 2018
DOI: 10.1109/cits.2018.8440164
|View full text |Cite
|
Sign up to set email alerts
|

Ensuring Privacy and Security in E- Health Records

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
3

Relationship

5
4

Authors

Journals

citations
Cited by 64 publications
(22 citation statements)
references
References 10 publications
0
22
0
Order By: Relevance
“…In traditional healthcare, all patient related data is stored in a centralized way and therefore, it is not advisable to give access of data to any untrusted third party. Moreover, the privacy and security of patient information must be maintained as it is vulnerable to a variety of attacks [121]. A centralized architecture cannot fulfill these requirements completely.…”
Section: E Smart Healthcarementioning
confidence: 99%
“…In traditional healthcare, all patient related data is stored in a centralized way and therefore, it is not advisable to give access of data to any untrusted third party. Moreover, the privacy and security of patient information must be maintained as it is vulnerable to a variety of attacks [121]. A centralized architecture cannot fulfill these requirements completely.…”
Section: E Smart Healthcarementioning
confidence: 99%
“…Due to the continuous expansion of smart devices [104], smart city [105], [106], sensors, smart agriculture [107], smart healthcare [108], [109], and many more applications, IoT became a widespread technology since last decade [110]. This application communicates among themselves through sensor nodes.…”
Section: A Overview Of Iotmentioning
confidence: 99%
“…Maintaining the patient data privacy is utmost important, and to achieve it, system needs to ensure data security. This can be implemented with AT&T control mechanism and XACML (eXtensible Access Control Markup Language) access model . This version of health care was not capable of handling a large amount of real‐time data generated remotely via smart wearable health monitoring devices such as wrist bands.…”
Section: Ti Deployment In Smart Applicationsmentioning
confidence: 99%