The design and implementation of a novel security model for HealthAgents

نویسندگان

  • Liang Xiao
  • Srinandan Dasmahapatra
  • Paul H. Lewis
  • Bo Hu
  • Andrew Peet
  • Alex Gibb
  • David Dupplaw
  • Madalina Croitoru
  • Francesc Estanyol
  • Juan Martínez-Miranda
  • Horacio González-Vélez
  • Magí Lluch i Ariet
چکیده

In this paper, we analyse the special security requirements for software support in healthcare and the HealthAgents system in particular. Our security solution consists of a link-anonymised data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure healthcare infrastructure for HealthAgents and can be easily adapted for other healthcare applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model Predictive Controller Design for a Novel Moving Mass Controlled Bi-rotor UAV

This paper presents design and implementation of Model Based Predictive Controller (MPC) for a novel Bi-Rotor Moving Mass Controlled (MMC) Unmanned Aerial Vehicle (UAV). Due to the strict constrained control inputs in this type of UAV, it is necessary to take into account the constrained controller design and un-constrained control methods are not applicable. MPC controller which is designed ba...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

A knowledgeable security model for distributed health information systems

Realising the vision of pervasive healthcare will generate new challenges to system security. Such challenges are fundamentally different from issues and problems that we face in centralised approaches as well as nonclinical scenarios. In this paper, we reflect upon our experiences in the HealthAgents project wherein a prototype system was developed and a novel approach employed that supports d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Knowledge Eng. Review

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2011