IEEE International Conference on E-Technology, E-Commerce and E-Service, 2004. EEE '04. 2004 2004
DOI: 10.1109/eee.2004.1287316
|View full text |Cite
|
Sign up to set email alerts
|

Security specification and implementation for mobile e-health services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 1 publication
0
10
0
Order By: Relevance
“…Li et al [38] look into the security weaknesses of glucose monitoring and insulin delivery systems and proposed the technologies for protecting those devices' operations using rolling-code and body-coupled communication. Also, Marti et al [39] lay out a few necessary requirements for building a secure mobile health care system. All such prior work focuses on the security problems of a specific health device or the communication protocol it uses, whereas our research aims at understanding the security implications of the way Android handles its external devices, in the presence of malicious apps running on the phone.…”
Section: Relatedworkmentioning
confidence: 99%
“…Li et al [38] look into the security weaknesses of glucose monitoring and insulin delivery systems and proposed the technologies for protecting those devices' operations using rolling-code and body-coupled communication. Also, Marti et al [39] lay out a few necessary requirements for building a secure mobile health care system. All such prior work focuses on the security problems of a specific health device or the communication protocol it uses, whereas our research aims at understanding the security implications of the way Android handles its external devices, in the presence of malicious apps running on the phone.…”
Section: Relatedworkmentioning
confidence: 99%
“…there have been works done in the underlying networks and application security services integrated into health networks by looking for mobile specific requirements [52,53]. Due to the demand, IEEE 11,073 workgroup formed a sub-workgroup for cybersecurity to support secure health data exchange between personal health devices (PHD) and their clients.…”
Section: Diseases Based Geographic Areas Relationships Modelling Techmentioning
confidence: 99%
“…patient's name, address, etc. need to be cryptographically protected; not all [12]. For instance when transmitting a DICOM image file, it is not necessary to hide the raw image data (image data integrity is dealt at a different level using the specifications analyzed in Reference [20]), however it is imperative to secure the sensitive information included in the DICOM header.…”
Section: General Issuesmentioning
confidence: 99%