[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Cuevas et al., 2008 - Google Patents

Security patterns for capturing encryption-based access control to sensor data

Cuevas et al., 2008

View PDF
Document ID
15539922816855222836
Author
Cuevas A
El Khoury P
Gomez L
Laube A
Publication year
Publication venue
2008 Second International Conference on Emerging Security Information, Systems and Technologies

External Links

Snippet

A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper describes a generic solution that ensures end-to-end access control for data generated by wireless …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal operating condition and not elsewhere provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0241Data exchange details, e.g. data protocol
    • G08B21/025System arrangements wherein the alarm criteria uses absence of reply signal after an elapsed time

Similar Documents

Publication Publication Date Title
Prince et al. Privacy enforced access control model for secured data handling in cloud-based pervasive health care system
Pal et al. Policy-based access control for constrained healthcare resources in the context of the Internet of Things
US10355854B2 (en) Privacy preserving group formation with distributed content key generation
Li et al. Data security and privacy in wireless body area networks
KR101625359B1 (en) Personal security manager for ubiquitous patient monitoring
Wang et al. Security-aware and privacy-preserving personal health record sharing using consortium blockchain
Sun et al. Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
Pal Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems
Pussewalage et al. Attribute based access control scheme with controlled access delegation for collaborative E-health environments
Hao et al. Secure data sharing with flexible user access privilege update in cloud-assisted IoMT
Sethia et al. CP-ABE for selective access with scalable revocation: A case study for mobile-based healthfolder.
Bhattacharjya et al. Present scenarios of IoT projects with security aspects focused
Abid et al. A smart contract-based access control framework for smart healthcare systems
Singh et al. An adaptive mutual trust based access control model for electronic healthcare system
Cuevas et al. Security patterns for capturing encryption-based access control to sensor data
Patel et al. Internet of things security: challenges, advances, and analytics
Bhalerao et al. Decentralized E-health patient record management system using blockchain and IPFS
Antonopoulos et al. Security data management process and its impact on smart cities' wireless sensor networks
Alami et al. A study of security requirements in wireless sensor networks for smart home healthcare systems
Bacon et al. Access control and trust in the use of widely distributed services
Choi et al. Ubiquitous rfid healthcare systems analysis on physionet grid portal services using petri nets
Felkner How the role-based trust management can be applied to wireless sensor networks
Ali et al. An Efficient Blockchain-Based Healthcare System Using Artificial Intelligence.
Dhillon et al. Internet of Things attacks and countermeasure access control techniques: a review
Dhanabagyam et al. Identity and access management as a service in e-healthcare cloud