Zubaydi et al., 2015 - Google Patents
Security of mobile health (mHealth) systemsZubaydi et al., 2015
View PDF- Document ID
- 9927834039512472690
- Author
- Zubaydi F
- Saleh A
- Aloul F
- Sagahyroon A
- Publication year
- Publication venue
- 2015 IEEE 15th international conference on bioinformatics and bioengineering (BIBE)
External Links
Snippet
mHealth is a growing field that enables individuals to monitor their health status and facilitates the sharing of medical records with physicians and between hospitals anytime and anywhere. Unfortunately, smartphones and mHealth applications are still vulnerable to a …
- 230000036541 health 0 title description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zubaydi et al. | Security of mobile health (mHealth) systems | |
Hasan et al. | A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things | |
Hatzivasilis et al. | Review of security and privacy for the Internet of Medical Things (IoMT) | |
Filkins et al. | Privacy and security in the era of digital health: what should translational researchers know and do about it? | |
Ranchal et al. | Protection of identity information in cloud computing without trusted third party | |
Christo et al. | Ensuring improved security in medical data using ecc and blockchain technology with edge devices | |
Win et al. | Personal health record systems and their security protection | |
Ahamad et al. | A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic | |
Alasmari et al. | Security & privacy challenges in IoT-based health cloud | |
Altamimi | Security and privacy issues in eHealthcare systems: Towards trusted services | |
Varadharajan et al. | Data security and privacy in the internet of things (iot) environment | |
Saravanan et al. | Lattice based access control for protecting user data in cloud environments with hybrid security | |
Mughaid et al. | Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things | |
Zhao et al. | Security and privacy analysis of mhealth application: A case study | |
Nagaty | Mobile health care on a secured hybrid cloud | |
Alibasa et al. | Designing a secure architecture for m-health applications | |
Bhagyoday et al. | Comprehensive study of E-Health security in cloud computing | |
Saif et al. | IoT-Based Secure Health Care: Challenges, Requirements and Case Study | |
Purwanti et al. | Enhancing security on E-health private data using SHA-512 | |
Tikkha et al. | Cryptographic Measures in IoMT: Security Threats and Measurement | |
Premarathne et al. | Impact of privacy issues on user behavioural acceptance of personalized mhealth services | |
Thakkar et al. | Investigation of Techniques used for Mitigating Security and Privacy Issues in Cloud Based Electronic Health Record (EHR) Systems | |
Rastogi et al. | Secured identity management system for preserving data privacy and transmission in cloud computing | |
Harnal et al. | Towards secure, flexible and efficient role based hospital’s cloud management system: case study | |
Lee et al. | Security concerns of identity authentication and context privacy preservation in uHealthcare System |