Towards a security policy for ubiquitous healthcare systems (Position paper)

被引:0
|
作者
Kim, Joonwoong [1 ]
Beresford, Alastair R. [1 ]
Stajano, Frank [1 ]
机构
[1] Univ Cambridge, Comp Lab, 15 JJ Thomson Ave, Cambridge CB3 0FD, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
U-Healthcare promises increases in efficiency, accuracy and availability of medical treatment; however it also introduces the potential for serious abuses including major privacy violations, staff discrimination and even life-threatening attacks. In this position paper we highlight some potential threats and open the discussion about the security requirements of this new scenario. We take a few initial steps towards a U-Healthcare security policy and propose a system architecture designed to help enforce the policy's goals.
引用
收藏
页码:263 / +
页数:3
相关论文
共 50 条
  • [1] Security Policy Model for Ubiquitous Social Systems
    Jovanovikj, Vladimir
    Gabrijelcic, Dusan
    Klobucar, Tomaz
    [J]. MODELING AND USING CONTEXT (CONTEXT 2017), 2017, 10257 : 302 - 314
  • [2] Towards Ubiquitous and Pervasive Healthcare
    Szymanski, Jan
    Chaczko, Zenon
    Rodanski, Ben
    [J]. ADVANCED METHODS AND APPLICATIONS IN COMPUTATIONAL INTELLIGENCE, 2014, 6 : 387 - 404
  • [3] Security policy development for healthcare information systems
    Gritzalis, D
    Kokolakis, S
    [J]. ADVANCED HEALTH TELEMATICS AND TELEMEDICINE: THE MAGDEBURG EXPERT SUMMIT TEXTBOOK, 2003, 96 : 105 - 110
  • [4] Towards ubiquitous cooperative security
    Robinson, Philip
    [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 103 - 110
  • [5] Towards Autonomic Security Management of Healthcare Information Systems
    Chen, Qian
    Lambright, Jonathan
    Abdelwahed, Sherif
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 113 - 118
  • [6] A baseline security policy for distributed healthcare information systems
    Gritzalis, D
    [J]. COMPUTERS & SECURITY, 1997, 16 (08) : 709 - 719
  • [7] Baseline security policy for distributed healthcare information systems
    Athens Univ of Economics and, Business, Athens, Greece
    [J]. Comput Secur, 8 (709-719):
  • [8] Towards provable security for ubiquitous applications
    Burmester, Mike
    Van Le, Tri
    de Medeiros, Breno
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 295 - 312
  • [9] IT Security for SCADA: A Position Paper
    Rastogi, Rahul
    von Solms, Rossouw
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2015, 5 (03) : 19 - 27
  • [10] Position paper: Security in TACOMA
    Sudmann, NP
    [J]. OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 302 - 303