[HTML][HTML] Security and privacy in electronic health records: A systematic literature review

JL Fernández-Alemán, IC Señor, PÁO Lozoya… - Journal of biomedical …, 2013 - Elsevier
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …

Pervasive healthcare and wireless health monitoring

U Varshney - Mobile Networks and Applications, 2007 - Springer
With an increasingly mobile society and the worldwide deployment of mobile and wireless
networks, the wireless infrastructure can support many current and emerging healthcare …

A rule-based framework for role-based delegation and revocation

L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …

Securing electronic medical records using attribute-based encryption on mobile devices

JA Akinyele, MW Pagano, MD Green… - Proceedings of the 1st …, 2011 - dl.acm.org
We provide a design and implementation of self-protecting electronic medical records
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …

Wellness sensor networks: A proposal and implementation for smart home for assisted living

H Ghayvat, J Liu, SC Mukhopadhyay… - IEEE Sensors …, 2015 - ieeexplore.ieee.org
In recent times, wireless sensor networks (WSNs) have become the backbone of many
systems. Smart homes based on WSN protocols are used to provide an assisted living …

Extending access control models with break-glass

AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …

Programming pervasive and mobile computing applications with the TOTA middleware

M Mamei, F Zambonelli - Second IEEE Annual Conference on …, 2004 - ieeexplore.ieee.org
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …

Cloud-assisted mobile-access of health data with privacy and auditability

Y Tong, J Sun, SSM Chow, P Li - IEEE Journal of biomedical …, 2013 - ieeexplore.ieee.org
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and
the wild success of cloud service models, we propose to build privacy into mobile healthcare …

[PDF][PDF] A framework for modeling privacy requirements in role engineering

Q He, AI Antón - Proc. of REFSQ, 2003 - crinfo.univ-paris1.fr
Privacy protection is important in many industries, such as healthcare and finance.
Capturing and modeling privacy requirements in the early stages of system development is …

[PDF][PDF] Dynamic, context-aware access control for distributed healthcare applications

J Hu, AC Weaver - Workshop on Privacy, Security, and Trust, 2004 - Citeseer
The rapid worldwide deployment of the Internet and Web is the enabler of a new generation
of e-healthcare applications, but the provision of a security architecture that can ensure the …