Securing mobile healthcare systems based on information classification: DITIS case study
SourceProceedings of the 4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006
4th International Workshop on Security in Information Systems, WOSIS 2006, in Conjunction with ICEIS 2006
Google Scholar check
MetadataShow full item record
Healthcare applications require special attention regarding security issues since healthcare is associated with mission critical services that are connected with the well being of life. Security raises special considerations when mobility is introduced in the healthcare environment. This research work proposes a security framework for mobile healthcare systems based on information classification into security levels. By categorizing the information used in mobile healthcare systems and linking it with the security objectives and security technologies, we aim in balancing the trade-off between security complexity and performance. Furthermore, this paper discusses a number of issues that are raised in the healthcare environment: privacy, confidentiality, integrity, legal and ethical considerations.
Showing items related by title, author, creator and subject.
Belk, Marios; Fidas, Christos A.; Germanakos, Panagiotis; Samaras, George S. (2014)The purpose of this paper is to propose a preliminary framework for supporting usable security on the World Wide Web through adaptivity in user interface designs. In particular we elaborate the concept of "Adaptive Usable ...
Stavrou, Eliana (Πανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences, 2006-06)This research work addresses security-related issues in the electronic and mobile healthcare environments and proposes an appropriate security framework. The proposed framework will identify the necessary security technologies ...
Koumidis, K.; Kolios, P.; Ellinas, Georgios; Panayiotou, Christos G. (2019)Secure logging is essential for the integrity and accountability of cyber-physical systems (CPS). To prevent modification of log files the integrity of data must be ensured. In this work, we propose a solution for secure ...