[HTML][HTML] Security and privacy in electronic health records: A systematic literature review
OBJECTIVE: To report the results of a systematic literature review concerning the security
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
and privacy of electronic health record (EHR) systems. DATA SOURCES: Original articles …
Pervasive healthcare and wireless health monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless
networks, the wireless infrastructure can support many current and emerging healthcare …
networks, the wireless infrastructure can support many current and emerging healthcare …
A rule-based framework for role-based delegation and revocation
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …
another entity to access resources. In today's distributed systems, a user often needs to act …
Securing electronic medical records using attribute-based encryption on mobile devices
We provide a design and implementation of self-protecting electronic medical records
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …
(EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare …
Wellness sensor networks: A proposal and implementation for smart home for assisted living
In recent times, wireless sensor networks (WSNs) have become the backbone of many
systems. Smart homes based on WSN protocols are used to provide an assisted living …
systems. Smart homes based on WSN protocols are used to provide an assisted living …
Extending access control models with break-glass
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …
only changes seldom. Especially for scenarios in health care and disaster management, a …
Programming pervasive and mobile computing applications with the TOTA middleware
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …
large software systems dived in dynamic mobile network environments. Here we present the …
Cloud-assisted mobile-access of health data with privacy and auditability
Motivated by the privacy issues, curbing the adoption of electronic healthcare systems and
the wild success of cloud service models, we propose to build privacy into mobile healthcare …
the wild success of cloud service models, we propose to build privacy into mobile healthcare …
A cyber resilience framework for NG-IoT healthcare using machine learning and blockchain
Internet of Things (IoT) technology such as intelligent devices, sensors, actuators and
wearables have been integrated in the healthcare industry, thus contributing in the creation …
wearables have been integrated in the healthcare industry, thus contributing in the creation …
[PDF][PDF] A framework for modeling privacy requirements in role engineering
Privacy protection is important in many industries, such as healthcare and finance.
Capturing and modeling privacy requirements in the early stages of system development is …
Capturing and modeling privacy requirements in the early stages of system development is …