Zubaydi et al., 2015 - Google Patents

Security of mobile health (mHealth) systems

Zubaydi et al., 2015

View PDF
Document ID
9927834039512472690
Author
Zubaydi F
Saleh A
Aloul F
Sagahyroon A
Publication year
Publication venue
2015 IEEE 15th international conference on bioinformatics and bioengineering (BIBE)

External Links

Snippet

mHealth is a growing field that enables individuals to monitor their health status and facilitates the sharing of medical records with physicians and between hospitals anytime and anywhere. Unfortunately, smartphones and mHealth applications are still vulnerable to a …
Continue reading at www.aloul.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Zubaydi et al. Security of mobile health (mHealth) systems
Hasan et al. A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things
Hatzivasilis et al. Review of security and privacy for the Internet of Medical Things (IoMT)
Filkins et al. Privacy and security in the era of digital health: what should translational researchers know and do about it?
Ranchal et al. Protection of identity information in cloud computing without trusted third party
Christo et al. Ensuring improved security in medical data using ecc and blockchain technology with edge devices
Win et al. Personal health record systems and their security protection
Ahamad et al. A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
Alasmari et al. Security & privacy challenges in IoT-based health cloud
Altamimi Security and privacy issues in eHealthcare systems: Towards trusted services
Varadharajan et al. Data security and privacy in the internet of things (iot) environment
Saravanan et al. Lattice based access control for protecting user data in cloud environments with hybrid security
Mughaid et al. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
Zhao et al. Security and privacy analysis of mhealth application: A case study
Nagaty Mobile health care on a secured hybrid cloud
Alibasa et al. Designing a secure architecture for m-health applications
Bhagyoday et al. Comprehensive study of E-Health security in cloud computing
Saif et al. IoT-Based Secure Health Care: Challenges, Requirements and Case Study
Purwanti et al. Enhancing security on E-health private data using SHA-512
Tikkha et al. Cryptographic Measures in IoMT: Security Threats and Measurement
Premarathne et al. Impact of privacy issues on user behavioural acceptance of personalized mhealth services
Thakkar et al. Investigation of Techniques used for Mitigating Security and Privacy Issues in Cloud Based Electronic Health Record (EHR) Systems
Rastogi et al. Secured identity management system for preserving data privacy and transmission in cloud computing
Harnal et al. Towards secure, flexible and efficient role based hospital’s cloud management system: case study
Lee et al. Security concerns of identity authentication and context privacy preservation in uHealthcare System