2010
DOI: 10.1007/s10916-010-9629-2
|View full text |Cite
|
Sign up to set email alerts
|

Utilize Common Criteria Methodology for Secure Ubiquitous Healthcare Environment

Abstract: RFID technology is widely used in healthcare environments to ensure patient safety. Therefore, the testing of RFID tags, such as performance tests and security evaluations, is necessary to ensure inter-operational functional compatibility with standards. A survey of the literature shows that while standards that are around RFID performance tests have been addressed, but the same is not true for security evaluations. Therefore, in this paper, we introduce the Common Criteria security evaluation methodology, als… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

2
1
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
2
1
0
Order By: Relevance
“…The previous research works proposing CC-based information security [27,28,29,37,38,49,51,53,35,56,57,58] report reaching EAL 3, just as we did. Our research brings one more CC application to the set of desktop computer certification [27] applications: Radio Frequency Identification (RFID) technology [28], biometric system [29], smart meters [49,51], integrated voice, data, and video communications [37,38], boots, sealing, and IT channels [57], Point-of-Sale (POS) systems, wind turbine park systems, and a secure workflow [56], personal computer [58], electronic voting system [55], SDN switches and controllers [59]. Only [51,57] report having reached EAL 4 or 5.…”
Section: Discussionsupporting
confidence: 68%
See 2 more Smart Citations
“…The previous research works proposing CC-based information security [27,28,29,37,38,49,51,53,35,56,57,58] report reaching EAL 3, just as we did. Our research brings one more CC application to the set of desktop computer certification [27] applications: Radio Frequency Identification (RFID) technology [28], biometric system [29], smart meters [49,51], integrated voice, data, and video communications [37,38], boots, sealing, and IT channels [57], Point-of-Sale (POS) systems, wind turbine park systems, and a secure workflow [56], personal computer [58], electronic voting system [55], SDN switches and controllers [59]. Only [51,57] report having reached EAL 4 or 5.…”
Section: Discussionsupporting
confidence: 68%
“…The research efforts of Hou and Yu [28] and Fernandez-Saavedra et al [29] are also close to the work carried out here since they used Common Criteria to evaluate information systems security. Hou and You [28] evaluated the use of Radio Frequency Identification (RFID) technology in a medicalhospital environment. Simultaneously, [29] assessed a biometric system, and both used literature review and best market practices for gathering the assessment criteria.…”
Section: B Information Security and The Common Criteria Standardsupporting
confidence: 62%
See 1 more Smart Citation