End-to-End Security for Personal Telehealth

نویسندگان

  • Paul Koster
  • Muhammad Asim
  • Milan Petkovic
چکیده

Personal telehealth is in rapid development with innovative emerging applications like disease management. With personal telehealth people participate in their own care supported by an open distributed system with health services. This poses new end-to-end security and privacy challenges. In this paper we introduce new end-to-end security requirements and present a design for consent management in the context of the Continua Health Alliance architecture. Thus, we empower patients to control how their health information is shared and used in a personal telehealth eco-system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-end Security and Privacy Protection for Co-operative Access to Health and Care Data in a Telehealth Trial System for Remote Supervision of COPD-Patients

The security and privacy of personal, health-related data in emerging telehealth and telecare systems is crucial, in particular under consideration of additional requirements. On the one hand optimal usability of the devices and applications provided for the monitoring of the health condition is desirable for the supervised patient. On the other side the different health and care organizations ...

متن کامل

Dimensions of Futility at the End of Life: Nurses’ Experiences in Intensive Care Units

Background and aims: The concept and meaning of futile care depends on the existing culture, values,religion, beliefs, medical achievements, and emotional status of a country. In Iran, futile care hasbecome a challenge for nurses working in intensive care units (ICUs). Considering the differencesobserved in defining futile care based on the patients’ conditions and the nurses’...

متن کامل

Wireless '96 Design of Secure End-to-End Protocols for Mobile Systems

Use of mobile personal computers in open net-worked environment is revolutionalising the way we use computers. Mobile networked computing is raising some important information security and privacy issues. This paper is concerned with the design of authentication protocols for a mobile networked computing environment. We propose mobile user authentication protocols in intra and inter domain situ...

متن کامل

STEPSTONE: An Intelligent Integration Architecture for Personal Tele-Health

STEPSTONE is a joint industry-university project to create open source technology that would enable the scalable, “friction-free” integration of device-based healthcare solutions into enterprise systems using a Service Oriented Architecture (SOA). Specifically, STEPSTONE defines a first proposal to a Service Oriented Device Architecture (SODA) framework, and provides for initial reference imple...

متن کامل

Perceptions of End-Users on the Requirements in Personal Firewall Software: An Exploratory Study

Information security is usually considered a technical discipline with much attention being focused on topics such as encryption, hacking, break-ins, and credit card theft. Security products such as anti-virus programs and personal firewall software are now available for end-users to install on their computers to protect against threats endemic to networked computers. The behavioral aspects rel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Studies in health technology and informatics

دوره 169  شماره 

صفحات  -

تاریخ انتشار 2011