Cuevas et al., 2008 - Google Patents
Security patterns for capturing encryption-based access control to sensor dataCuevas et al., 2008
View PDF- Document ID
- 15539922816855222836
- Author
- Cuevas A
- El Khoury P
- Gomez L
- Laube A
- Publication year
- Publication venue
- 2008 Second International Conference on Emerging Security Information, Systems and Technologies
External Links
Snippet
A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless …
- 239000000463 material 0 description 12
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0241—Data exchange details, e.g. data protocol
- G08B21/025—System arrangements wherein the alarm criteria uses absence of reply signal after an elapsed time
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Prince et al. | Privacy enforced access control model for secured data handling in cloud-based pervasive health care system | |
Pal et al. | Policy-based access control for constrained healthcare resources in the context of the Internet of Things | |
US10355854B2 (en) | Privacy preserving group formation with distributed content key generation | |
Li et al. | Data security and privacy in wireless body area networks | |
KR101625359B1 (en) | Personal security manager for ubiquitous patient monitoring | |
Wang et al. | Security-aware and privacy-preserving personal health record sharing using consortium blockchain | |
Sun et al. | Privacy and emergency response in e-healthcare leveraging wireless body sensor networks | |
Pal | Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems | |
Pussewalage et al. | Attribute based access control scheme with controlled access delegation for collaborative E-health environments | |
Hao et al. | Secure data sharing with flexible user access privilege update in cloud-assisted IoMT | |
Sethia et al. | CP-ABE for selective access with scalable revocation: A case study for mobile-based healthfolder. | |
Bhattacharjya et al. | Present scenarios of IoT projects with security aspects focused | |
Abid et al. | A smart contract-based access control framework for smart healthcare systems | |
Singh et al. | An adaptive mutual trust based access control model for electronic healthcare system | |
Cuevas et al. | Security patterns for capturing encryption-based access control to sensor data | |
Patel et al. | Internet of things security: challenges, advances, and analytics | |
Bhalerao et al. | Decentralized E-health patient record management system using blockchain and IPFS | |
Antonopoulos et al. | Security data management process and its impact on smart cities' wireless sensor networks | |
Alami et al. | A study of security requirements in wireless sensor networks for smart home healthcare systems | |
Bacon et al. | Access control and trust in the use of widely distributed services | |
Choi et al. | Ubiquitous rfid healthcare systems analysis on physionet grid portal services using petri nets | |
Felkner | How the role-based trust management can be applied to wireless sensor networks | |
Ali et al. | An Efficient Blockchain-Based Healthcare System Using Artificial Intelligence. | |
Dhillon et al. | Internet of Things attacks and countermeasure access control techniques: a review | |
Dhanabagyam et al. | Identity and access management as a service in e-healthcare cloud |