[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Song et al., 2006 - Google Patents

System architecture and economic value-chain models for healthcare privacy and security control in large-scale wireless sensor networks

Song et al., 2006

View PDF
Document ID
14618915073460681946
Author
Song W
Ha I
Choi M
Publication year
Publication venue
International Conference on Autonomic and Trusted Computing

External Links

Snippet

In this paper, we have designed and modeled the ubiquitous RFID healthcare system architecture and framework workflow, which are described by six classified core players or subsystems, and have also analyzed by an economic value-chain model. They consist of the …
Continue reading at koasas.kaist.ac.kr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
Rahman et al. A privacy preserving framework for RFID based healthcare systems
Kotz A threat taxonomy for mHealth privacy
Premarathne et al. Hybrid cryptographic access control for cloud-based EHR systems
EP3701668B1 (en) Methods for recording and sharing a digital identity of a user using distributed ledgers
ES2596308T3 (en) Method and provision for secure authentication
Gonçalves et al. Security architecture for mobile e-health applications in medication control
Sethia et al. NFC based secure mobile healthcare system
US8347101B2 (en) System and method for anonymously indexing electronic record systems
US8607332B2 (en) System and method for the anonymisation of sensitive personal data and method of obtaining such data
CN106682530A (en) Method and device for medical information sharing privacy protection based on blockchain technology
CN101111853A (en) Control of data exchange
CN107004077A (en) Method and system for providing safe and independently operable biological characteristic authentication
Sax et al. Wireless technology infrastructures for authentication of patients: PKI that rings
Rubio et al. Analysis of ISO/IEEE 11073 built-in security and its potential IHE-based extensibility
Chen et al. A design of tamper resistant prescription RFID access control system
Jayabalan et al. A study on authentication factors in electronic health records
Singh et al. Smart card ID: an evolving and viable technology
Tan et al. Survey on digital sovereignty and identity: from digitization to digitalization
CN108765615B (en) Block chain-based card punching information storage method and system
Makina et al. Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions
Song et al. Privacy and security control architecture for ubiquitous RFID healthcare system in wireless sensor networks
Jabeen et al. Enhanced architecture for privacy preserving data integration in a medical research environment
Kaul et al. Secure and privacy preserving biometric based user authentication with data access control system in the healthcare environment
Elngar et al. Data protection and privacy in healthcare: research and innovations
Sandeep et al. Blockchain-based privacy approaches for 5G healthcare informatics