Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments 2009
DOI: 10.1145/1579114.1579186
|View full text |Cite
|
Sign up to set email alerts
|

Security and trust in virtual healthcare communities

Abstract: The main purpose of a virtual healthcare community is to enforce members' collaboration and allow them collectively conduct health care activities. Patient monitoring and medical consultation and support are the most popular activities inside health care communities. They bring together medical experts and patients and require confidentiality, reliability and trust in order to be successful. An examination of existing virtual communities for healthcare leads to the conclusion that many of them fail to meet req… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…In addition, we recognize that security and privacy requirements have to be considered when implementing our framework in clinical settings due to the fact that a secure infrastructure is important for the operation of any virtual healthcare community, and it is critical to protect the confidentiality of sensitive medical data (Chryssanthou et al 2009). …”
Section: Page | 78mentioning
confidence: 99%
“…In addition, we recognize that security and privacy requirements have to be considered when implementing our framework in clinical settings due to the fact that a secure infrastructure is important for the operation of any virtual healthcare community, and it is critical to protect the confidentiality of sensitive medical data (Chryssanthou et al 2009). …”
Section: Page | 78mentioning
confidence: 99%
“…In such dynamic and data-rich environments, a holistic security approach (Wozak et al, 2007;Apostolakis et al, 2009;Chryssanthou et al, 2009) is needed in order to improve confidentiality and reliability and consequently increase community trust. In terms of a holistic solution, technological, organisational, human-related and other aspects must be examined in order to minimise the risk and potential damage for everyone (i.e.…”
Section: Related Researchmentioning
confidence: 99%
“…We now describe the 'Plan' phase of the methodology, which leads to the design of the security-enabled architecture that we presented in Chryssanthou et al (2009) and that is depicted in Figure 3. The architecture is multi-layered and assumes that the sensitive community information is stored in the secured internal layer, which guarantees software updates, data backups, etc.…”
Section: Security-enabled Architecturementioning
confidence: 99%
See 2 more Smart Citations