security framework for pervasive healthcare architectures utilizing mpeg-21 ipmp components安全框架普遍医疗保健体系结构利用mpeg-21 ipmp组件.pdfVIP

  • 1
  • 0
  • 约 10页
  • 2017-09-01 发布于上海
  • 举报

security framework for pervasive healthcare architectures utilizing mpeg-21 ipmp components安全框架普遍医疗保健体系结构利用mpeg-21 ipmp组件.pdf

security framework for pervasive healthcare architectures utilizing mpeg-21 ipmp components安全框架普遍医疗保健体系结构利用mpeg-21 ipmp组件

Hindawi Publishing Corporation International Journal of Telemedicine and Applications Volume 2009, Article ID 461560, 9 pages doi:10.1155/2009/461560 Research Article Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP Components Anastasios Fragopoulos,1, 2 John Gialelis,1, 2 and Dimitrios Serpanos1, 2 1 Industrial Systems Institute, R.C Athena, Stadiou Street, Platani, 26504 Patras, Greece 2 Department of Electrical and Computer Engineering, University of Patras, 26500 Rio Patras, Greece Correspondence should be addressed to John Gialelis, gialelis@ece.upatras.gr Received 29 May 2008; Accepted 6 November 2008 Recommended by Yang Xiao Nowadays in modern and ubiquitous computing environments, it is imperative more than ever the necessity for deployment of pervasive healthcare architectures into which the patient is the central point surrounded by different types of embedded and small computing devices, which measure sensitive physical indications, interacting with hospitals databases, allowing thus urgent medical response in occurrences of critical situations. Such environments must be developed satisfying the basic security requirements for real-time secure data communication, and protection of sensitive medical data and measurements, data integrity and confidentiality, and protection of the monitored patient’s privacy. In this work, we argue that the MPEG-21 Intellectual Property Management and Protection (IPMP) components can be used in order to achieve protection of transmitted medical information and enhance patient’s privacy, since there is selective and controlled access to medical data that sent toward the hospital’s servers. Copyright © 2009 Anastasios Fragopoulos et al.

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档