Role-Based Access Control Models
Computer
SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Network Security with Openssl
PKI: Implementing and Managing E-Security
PKI: Implementing and Managing E-Security
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks
Wireless Personal Communications: An International Journal
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
A lightweight reconfigurable security mechanism for 3G/4G mobile devices
IEEE Wireless Communications
Implementation of a WAP-based telemedicine system for patient monitoring
IEEE Transactions on Information Technology in Biomedicine
Enabling location privacy and medical data encryption in patient telemonitoring systems
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
PKI Security in Large-Scale Healthcare Networks
Journal of Medical Systems
Hi-index | 0.00 |
Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.