2016
DOI: 10.1007/978-3-319-51234-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Security Context Framework for Distributed Healthcare IoT Platform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…Based on the analysis results and the existing studies,[ 57 63 ] Figure 3 shows the interaction among several technologies adopted for smart chronic disease management, including IoT, big data, cloud computing, and fog computing, for a case where all of the four technologies were engaged. Sensors and IoT devices gather data from patients.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the analysis results and the existing studies,[ 57 63 ] Figure 3 shows the interaction among several technologies adopted for smart chronic disease management, including IoT, big data, cloud computing, and fog computing, for a case where all of the four technologies were engaged. Sensors and IoT devices gather data from patients.…”
Section: Resultsmentioning
confidence: 99%
“… A brief picture of the literature on the use of Internet of Things for chronic disease management in terms of patient monitoring (some parts adapted[ 1 6 10 57 63 ]) …”
Section: Resultsmentioning
confidence: 99%
“…[17] divides telemedicine security threats into seven specific areas, where each threat area represents a point where threat actors can compromise assets through common vulnerabilities -resulting in multiple risks for telehealth care systems. [18] states that the healthcare sector is more vulnerable of attacks due to the high value of data being processed. This is supported by [14] who found threats towards IoMT devices to be much higher when health data was processed.…”
Section: Threats and Vulnerabilitiesmentioning
confidence: 99%
“…Vanickis et al (2018) have proposed an access control policy enforcement framework using Zero Trust for IoT security. Sangpetch and Sangpetch (2016) have provided an IoT security framework to achieve accountability and track information propagation in IoT networks. Novo (2018) has proposed a blockchain-based access control and authorization system for IoT devices.…”
Section: A Framework For Iot Security Implementation Using Zero Trustmentioning
confidence: 99%