ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 6 - Volume 6
Empirical evidence concerning AES
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Managing healthcare data hippocratically
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Discovering an RC4 anomaly through visualization
Proceedings of the 3rd international workshop on Visualization for computer security
A framework of authentication and authorization for e-health services
Proceedings of the 3rd ACM workshop on Secure web services
Open trusted health informatics structure (OTHIS)
HDKM '08 Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80
A Workflow-Based Access Control Framework for e-Health Applications
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |
e-Health services are gaining popularity due to largely reduced cost and wider range of advanced services. Securing e-Health data transmission is challenging due to both (a) the criticality of personal medical information on effective medical treatment and privacy protection and (b) the significant computational needs of encryption algorithms. In this paper, a cost-effective security framework that suits for e-Health authentication and data transmission is presented. The framework consists of efficient protocol architecture for e-Health service; two risk adaptive authentication techniques and different encryption algorithms to handle data with different levels of importance, thus achieving required security requirements of e-Health applications and reduction in the computational complexity and delay in e-Health communication.