The design and implementation of a novel security model for HealthAgents
نویسندگان
چکیده
In this paper, we analyse the special security requirements for software support in healthcare and the HealthAgents system in particular. Our security solution consists of a link-anonymised data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure healthcare infrastructure for HealthAgents and can be easily adapted for other healthcare applications.
منابع مشابه
Model Predictive Controller Design for a Novel Moving Mass Controlled Bi-rotor UAV
This paper presents design and implementation of Model Based Predictive Controller (MPC) for a novel Bi-Rotor Moving Mass Controlled (MMC) Unmanned Aerial Vehicle (UAV). Due to the strict constrained control inputs in this type of UAV, it is necessary to take into account the constrained controller design and un-constrained control methods are not applicable. MPC controller which is designed ba...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملHardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملA knowledgeable security model for distributed health information systems
Realising the vision of pervasive healthcare will generate new challenges to system security. Such challenges are fundamentally different from issues and problems that we face in centralised approaches as well as nonclinical scenarios. In this paper, we reflect upon our experiences in the HealthAgents project wherein a prototype system was developed and a novel approach employed that supports d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Knowledge Eng. Review
دوره 26 شماره
صفحات -
تاریخ انتشار 2011