Role-Based Access Control Models
Computer
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
The Solar Trust Model: Authentication Without Limitation
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Trust Is in the Eye of the Beholder
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
A security policy model for clinical information systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
In the future, patients may be able to receive health care through the use of pervasive medical devices, sensors, and applications, even outside of hospitals. These data sources monitor and assist patients, aid in treatment, and notify doctors of problems as they develop, allowing them to send help and prepare for emergency treatment faster than otherwise possible. But such data sources are subject to attack or failure. Current trust models guarantee control over access to patient data, but not to determine the trustworthiness of the sources of that data, or of the data itself. This paper shows how the Solar Trust Model can be used to evaluate the trustworthiness of data and data sources in networks of pervasive healthcare devices, sensors, and applications.