Role-Based Access Control Models
Computer
On site: to opt-in or opt-out?: it depends on the question
Communications of the ACM
Pervasive Health Care Applications Face Tough Security Challenges
IEEE Pervasive Computing
PKI: It's Not Dead, Just Resting
Computer
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
'I didn't buy it for myself' privacy and ecommerce personalization
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
TinyPK: securing sensor networks with public key technology
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Journal of Medical Systems
Efficient multivariate data-oriented microaggregation
The VLDB Journal — The International Journal on Very Large Data Bases
Location privacy in wireless personal area networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Rijndael for Sensor Networks: Is Speed the Main Issue?
Electronic Notes in Theoretical Computer Science (ENTCS)
A compact, high-speed, wearable sensor network for biomotion capture and interactive media
Proceedings of the 6th international conference on Information processing in sensor networks
Addressing security in medical sensor networks
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Wireless Sensor Networks for Home Health Care
AINAW '07 Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 02
A secure architecture for the pseudonymization of medical data
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Passive data link layer 802.11 wireless device driver fingerprinting
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
A survey of key management schemes in wireless sensor networks
Computer Communications
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Pervasive healthcare and wireless health monitoring
Mobile Networks and Applications
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Requirements and design spaces of mobile medical care
ACM SIGMOBILE Mobile Computing and Communications Review
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Handbook of Biometrics
Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering
Active behavioral fingerprinting of wireless devices
WiSec '08 Proceedings of the first ACM conference on Wireless network security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
A framework for reasoning about the human in the loop
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Implementing public-key infrastructure for sensor networks
ACM Transactions on Sensor Networks (TOSN)
Unobtrusive multimodal biometric authentication: the HUMABIO project concept
EURASIP Journal on Advances in Signal Processing
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
eigenPulse: Robust human identification from cardiovascular function
Pattern Recognition
Design and implementation of a secure wireless mote-based medical sensor network
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Protecting your daily in-home activity information from a wireless snooping attack
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Dependent link padding algorithms for low latency anonymity systems
Proceedings of the 15th ACM conference on Computer and communications security
User-controllable learning of security and privacy policies
Proceedings of the 1st ACM workshop on Workshop on AISec
Identification via location-profiling in GSM networks
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Body-coupled communication for body sensor networks
BodyNets '08 Proceedings of the ICST 3rd international conference on Body area networks
Identity-Based Encryption and Beyond
IEEE Security and Privacy
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice
IEEE Transactions on Mobile Computing
Hassle free fitness monitoring
Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments
Exploring Privacy Concerns about Personal Sensing
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Data Hemorrhages in the Health-Care Sector
Financial Cryptography and Data Security
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Capturing Social Networking Privacy Preferences
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Activity-aware ECG-based patient authentication for remote health monitoring
Proceedings of the 2009 international conference on Multimodal interfaces
A probabilistic approach to hybrid role mining
Proceedings of the 16th ACM conference on Computer and communications security
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security
BikeNet: A mobile sensing system for cyclist experience mapping
ACM Transactions on Sensor Networks (TOSN)
A privacy framework for mobile health and home-care systems
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
HICCUPS: health information collaborative collection using privacy and security
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
A comparative study of secure device pairing methods
Pervasive and Mobile Computing
IBE-lite: a lightweight identity-based cryptography for body sensor networks
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Standardizing privacy notices: an online study of the nutrition label approach
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Key generation based on acceleration data of shaking processes
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Context aware body area networks for telemedicine
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Certificate revocation using fine grained certificate space partitioning
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
ACM Transactions on Information and System Security (TISSEC)
Recognizing whether sensors are on the same body
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Exposing privacy concerns in mHealth
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
Adaptive security and privacy for mHealth sensing
HealthSec'11 Proceedings of the 2nd USENIX conference on Health security and privacy
A grid authentication system with revocation guarantees
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
Journal of Medical Systems
Using height sensors for biometric identification in multi-resident homes
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Privacy in india: attitudes and awareness
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Tampering with motes: real-world physical attacks on wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
A contextual role-based access control authorization model for electronic patient record
IEEE Transactions on Information Technology in Biomedicine
A wearable health care system based on knitted integrated sensors
IEEE Transactions on Information Technology in Biomedicine
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
People-centric sensing in assistive healthcare: Privacy challenges and directions
Security and Communication Networks
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Social sensing for epidemiological behavior change
Proceedings of the 12th ACM international conference on Ubiquitous computing
Pervasive sensing to model political opinions in face-to-face networks
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
An amulet for trustworthy wearable mHealth
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
Free Web-based Personal Health Records: An Analysis of Functionality
Journal of Medical Systems
Hi-index | 0.00 |
Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables physicians to remotely monitor patients' health and enables individuals to manage their own health more easily. Despite these advantages, privacy is essential for any personal monitoring technology. Through an extensive survey of the literature, we develop a conceptual privacy framework for mHealth, itemize the privacy properties needed in mHealth systems, and discuss the technologies that could support privacy-sensitive mHealth systems. We end with a list of open research questions.