Security aspects of ubiquitous computing in health careSicherheitsaspekte von Ubiquitous Computing im Gesundheitsbereich

被引:0
|
作者
E. Weippl
A. Holzinger
A. M. Tjoa
机构
[1] Vienna University of Technology,
[2] Medical University of Graz,undefined
[3] Vienna University of Technology,undefined
关键词
Mobile devices; Security; Health care; RFID; Mobile Geräte; Sicherheit; Gesundheitssystem; RFID;
D O I
10.1007/s00502-006-0336
中图分类号
学科分类号
摘要
Today, ubiquitous devices lack many of the security features known in desktop computing, an industry that is known to have a plethora of security problems. As ubiquitous devices are increasingly applied in the health care industry, security aspects need to receive even more attention. Clearly, patient-related data is extremely sensitive and legal requirements (such as HIPAA) attempt to enforce strict privacy controls. While we cannot solve the overall problem, our proposal to use RFID tags to authenticate users with ubiquitous devices addresses one of the most fundamental requirements of all security mechanisms: to reliably establish the user's identity. In this paper we discuss some questions that raised during experiments with ubiquitous devices at Graz University Hospital. The main problems which could be identified included security and privacy issues (protection precautions, confidentiality, reliability, sociability). The experiments showed that new and emerging computer technologies such as mobile, ubiquitous and pervasive computing have an enormous potential for the improvement of manifold workflows in health care, however, psychological and technological research must be carried out together in order to bring clear benefits for the end-users and to optimize workflows in health care in the daily routine.
引用
收藏
页码:156 / 161
页数:5
相关论文
共 50 条
  • [1] Security aspects of ubiquitous computing in health care
    Weippl, E.
    Holzinger, A.
    Tjoa, A. M.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2006, 123 (04): : 156 - 161
  • [2] Special Issue on Security Aspects in Pervasive and Ubiquitous Computing
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 1 - 2
  • [3] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [4] Survey of Ubiquitous Computing Security
    Li, Yin
    Chen, Yong
    Zhao, Jingxin
    Yue, Xinghui
    Zheng, Chen
    Wu, Yanjun
    Wu, Gaofei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [5] The security challenges of ubiquitous computing
    Stajano, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [6] Dependability aspects of ubiquitous computing
    Yan, Lu
    Sere, Kaisa
    [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 451 - 453
  • [7] Security policies and trust in ubiquitous computing
    Joshi, Anupam
    Finin, Tim
    Kagal, Lalana
    Parker, Jim
    Patwardhan, Anand
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3769 - 3780
  • [8] Ubiquitous computing for health and medicine
    Atkinson, C
    Kaplan, B
    Larson, K
    Martins, HMG
    Lundell, J
    Harris, M
    [J]. Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, 2005, 185 : 355 - 358
  • [9] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
  • [10] Small worlds and the security of ubiquitous computing
    Vogt, H
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597