2009
DOI: 10.1155/2009/461560
|View full text |Cite
|
Sign up to set email alerts
|

Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components

Abstract: Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The work presented in this paper complements previous work being done and presented in [8], since it intends to fill the security gap which makes these devices and the data acquired by them, vulnerable to any kind of attacks.…”
Section: Dept Of Electrical and Computer Engineeringmentioning
confidence: 80%
“…The work presented in this paper complements previous work being done and presented in [8], since it intends to fill the security gap which makes these devices and the data acquired by them, vulnerable to any kind of attacks.…”
Section: Dept Of Electrical and Computer Engineeringmentioning
confidence: 80%
“…Confidentiality ensures that IoT system prohibits unauthorized entities (users and devices) from disclosing medical information (19,20). (3,7,9,19,(21)(22)(23)(24)(25)(26)(27)(28)(29)(30)(31)(32)(33)(34)) Confidentiality…”
Section: References Featuresmentioning
confidence: 99%
“…One of those is comprised of three layers which many researchers, including [13][14][15][16] have exploited. The first layer is comprised of some sensors and can perform some processing.…”
Section: Related Workmentioning
confidence: 99%