A New Security Scheme for E-health System

被引:0
|
作者
Li, Wei [1 ]
Hoang, Doan [1 ]
机构
[1] Univ Technol Sydney, iNEXT, UTS Res Ctr Innovat IT Serv & Applicat, Broadway, NSW 2007, Australia
关键词
e-health system; role-based access control; security; role model; interaction model; organization model;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Security is a critical requirement for the e-health system because the patient's sensitive information can be accessed remotely and this makes the entire system vulnerable to malicious attacks. In this paper, we present a novel role-interaction-organization security model and apply it to the e-health system which is modeled as a multi-agent system. The roles in our proposed model do not only determine access rights passively, but also initiate requests to interact dynamically with the agents who meet the security requirements. The interaction and the organization models help to identify the actions and responsibilities that a role can assume in the system within the organization and any dynamic interactions it can partake. A simple case from the e-health system is given to illustrate the application of the model.
引用
收藏
页码:361 / 366
页数:6
相关论文
共 50 条
  • [1] Data security in e-health monitoring system
    Abhishek, B.
    Panjanathan, Rukmani
    Sarobin, Vergin Raja
    Raja, Benson Edwin
    Narendra, Modigari
    [J]. MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4620 - 4628
  • [2] Economic and security aspects of applying a threshold scheme in e-Health
    Riedl, Bernhard
    Grascher, Veronika
    Kolb, Mathias
    Neubauer, Thomas
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 39 - +
  • [3] Heterogeneous System Model for Security in E-Health Applications
    Jellen, Isabel
    Callenes-Sloan, Joseph
    Fang, Dongfeng
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [4] Enhanced e-Health Framework for Security and Privacy in Healthcare System
    Shrestha, N. M.
    Alsadoon, Abeer
    Prasad, P. W. C.
    Hourany, L.
    Elchouemi, A.
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), 2016, : 75 - 79
  • [5] Security and Privacy in Cloud-Based E-Health System
    Sivan, Remya
    Zukarnain, Zuriati Ahmad
    [J]. SYMMETRY-BASEL, 2021, 13 (05):
  • [6] NEW LENS ON HEALTH CONSUMERISM: E-HEALTH CONSUMERISM, E-HEALTH TRUST, AND E-HEALTH LITERACY
    Seckin, G.
    Hughes, S.
    [J]. GERONTOLOGIST, 2016, 56 : 46 - 46
  • [7] A security architecture for e-health services
    Sulaiman, Rossilawati
    Sharma, Dharmendra
    Ma, Wanli
    Tran, Dat
    [J]. 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 999 - 1004
  • [8] Security and privacy-preserving in e-health: A new framework for patient
    Beheshti-Atashgah, Mohammad
    Aref, Mohammad Reza
    Barari, Morteza
    Bayat, Majid
    [J]. INTERNET OF THINGS, 2020, 12
  • [9] Security Improvement and Privacy Preservation in E-Health
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Kumar, Kulamala Vinod
    Mohapatra, Durga Prasad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [10] e-Health: An Introduction to the Challenges of Privacy and Security
    Jara, H. R.
    Schafir, E.
    [J]. 2014 IEEE CENTRAL AMERICA AND PANAMA CONVENTION (CONCAPAN XXXIV), 2014,