移动电子医疗服务的安全规范和实现

R. Martí, J. Delgado, X. Perramon
{"title":"移动电子医疗服务的安全规范和实现","authors":"R. Martí, J. Delgado, X. Perramon","doi":"10.1109/EEE.2004.1287316","DOIUrl":null,"url":null,"abstract":"Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"42","resultStr":"{\"title\":\"Security specification and implementation for mobile e-health services\",\"authors\":\"R. Martí, J. Delgado, X. Perramon\",\"doi\":\"10.1109/EEE.2004.1287316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.\",\"PeriodicalId\":360167,\"journal\":{\"name\":\"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"42\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EEE.2004.1287316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EEE.2004.1287316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 42

摘要

不同的IT应用需要不同的安全服务。我们一直致力于移动环境中的电子保健应用领域,我们需要集成特定的安全服务。我们介绍了移动电子医疗服务的这些安全服务以及我们是如何实现它们的。首先,描述了针对电子医疗应用的不同安全威胁,如患者数据窃听和操纵。然后,介绍了解决这些特定安全威胁的不同安全机制,例如数据机密性和完整性,以及动态IP地址的限制。下面描述了安全服务需求的规范以及在移动电子医疗服务中解决这些需求的实现可能性。作为将安全服务集成到电子保健系统中的一个示例,我们包括对移动电子保健服务MobiHealth的描述,这是在MobiHealth项目下开发的一个应用程序,由欧洲委员会(IST-2001-36006)共同资助,重点关注添加到其中的安全服务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security specification and implementation for mobile e-health services
Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the distributed management of SCORM-compliant course contents A new fair micropayment system based on hash chain An enhanced EDCG replica allocation method in ad hoc networks Using element and document profile for information clustering A scheme for MAC isolation to realize effective management in public wireless LAN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1