The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
A Campus-Wide Mobile EMS Information Management System
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A Programmable Service Architecture for Mobile Medical Care
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A pervasive architectural framework for providing remote medical treatment
Proceedings of the 1st international conference on PErvasive Technologies Related to Assistive Environments
Real-time and secure wireless health monitoring
International Journal of Telemedicine and Applications - Pervasive Health Care Services and Technologies
End to end secure communication in ad-hoc assistive medical environments using secure paths
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
AMON: a wearable multiparameter medical monitoring and alert system
IEEE Transactions on Information Technology in Biomedicine
The Role of Privacy Protection in Healthcare Information Systems Adoption
Journal of Medical Systems
Hi-index | 0.00 |
Wireless technologies have lately been integrated in many types of environments; their development is able to provide innovative services minimizing costs and the time necessary to identify the necessary information. However medical information is very sensitive since it contains critical personal data. Security and privacy preservation are very critical parameters. Lately, innovative technologies such as software agents' technology have been utilized to support distributed environments. Presented is an architecture that allows secure medical related information management using software agents; this work expands previous research Belsis, Skourlas, & Gritzalis, 2011. The authors present a security oriented solution and also provide experimental evidence about the capability of the platform to operate in wireless environments with large number of users.