An Evaluation Scenario for Adaptive Security in eHealth
نویسندگان
چکیده
We present a scenario and storyline that are part of a framework to evaluate adaptive security in the Internet of Things, also denoted as the IoT. The successful deployment of the IoT depends on ensuring security and privacy, which need to adapt to the processing capabilities and resource use of the IoT. We develop a scenario for the assessment and validation of context-aware adaptive security solutions for the IoT in eHealth. We first present the properties to be fulfilled by a scenario to assess the adaptive security solutions for eHealth. We then develop a home scenario for patients with chronic diseases using biomedical sensors. This scenario is then used to create a storyline for a chronic patient living at home. Keywords—Internet of Things; assessment scenarios; eHealth systems; adaptive security.
منابع مشابه
An Evaluation Framework for Adaptive Security for the IoT in eHealth
We present a scenario and storyline that are part of a framework to evaluate adaptive security in the Internet of Things, also denoted as the IoT. The successful deployment of the IoT depends on ensuring security and privacy, which need to adapt to the processing capabilities and resource use of the IoT. We develop a scenario for the assessment and validation of context-aware adaptive security ...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملCLEFeHealth2012 - The CLEF 2012 Workshop on Cross-Language Evaluation of Methods, Applications, and Resources for eHealth Document Analysis
CLEFeHealth2012 is the CLEF2012 workshop on cross-language evaluation of methods, applications, and resources for eHealth document analysis. Its focus is on written and spoken natural-language processing with the use scenario of people using ICT tools to analyse and integrate eHealth documents across languages, genres, and jargons. The significance of workshop lies in taking steps toward system...
متن کاملDistributed Knowledge Sharing For Patient Guidance Ehealth Services
The European society is characterised by high costs for its health system and a shrinking work force due to health reasons and an aging population. The acceptance of prevention strategies is disappointingly low, as prevention requires an active and continuous commitment and does not consider individual preferences of potential users. We analyse the provision of personal guidance services in eHe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013