The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Wake on wireless: an event driven energy saving strategy for battery operated devices
Proceedings of the 8th annual international conference on Mobile computing and networking
A security policy model for clinical information systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Computer
Context-Based Access Control Management in Ubiquitous Environments
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Formal specification of role-based security policies for clinical information systems
Proceedings of the 2005 ACM symposium on Applied computing
Criticality Aware Access Control Model for Pervasive Applications
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
A Privacy Service for Context-aware Mobile Computing
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Wireless Sensor Networks for Clinical Information Systems: A Security Perspective
ICDCSW '06 Proceedings of the 26th IEEE International ConferenceWorkshops on Distributed Computing Systems
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
RBAC administration in distributed systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Performance evaluation of XACML PDP implementations
Proceedings of the 2008 ACM workshop on Secure web services
Body area networking standardization: present and future directions
Proceedings of the ICST 2nd international conference on Body area networks
An Efficient Policy System for Body Sensor Networks
ICPADS '08 Proceedings of the 2008 14th IEEE International Conference on Parallel and Distributed Systems
Ensuring spatio-temporal access control for real-world applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Spatio-temporal access control: challenges and applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Brief announcement: lightweight key agreement and digital certificates for wireless sensor networks
Proceedings of the 28th ACM symposium on Principles of distributed computing
Securing body sensor networks: Sensor association and key management
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
An XML based access control architecture for pervasive computing
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Sensor network security for pervasive e-health
Security and Communication Networks
Hi-index | 0.01 |
Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.