Abstract
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beznosova, K., Flinnb, D.J., Kawamotoc, S., Hartmand, B.: Introduction to web services and their security. Information Security Technical Report 10(1), 2–14 (2005)
Borselius, N.: Mobile agent security. Electronics & Communication Engineering Journal 14(5), 211–218 (2002)
Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Towards securing xml web services. In: XMLSEC 2002: Proceedings of the 2002 ACM workshop on XML security, pp. 90–96. ACM, New York (2002)
Dean, D., Felten, E.W., Wallach, D.S.: Java security: from HotJava to Netscape and beyond. In: IEEE (ed.) 1996 IEEE Symposium on Security and Privacy, Oakland, California, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, May 6-8, 1996, pp. 190–200. IEEE Computer Society Press, Los Alamitos (1996)
Dwivedi, A., Wickramasinghe, N., Bali, R.K., Naguib, R.N.G., Goldberg, S.: Crit- ical success factors for achieving superior m-health success. International Journal of Electronic Healthcare 3(2), 261–278 (2007)
Istepanian, R.S.H., Jovanov, E., Zhang, Y.T.: Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health- care connectivity. IEEE Transactions on Information Technology in Biomedicine 8(4), 405–414 (2004)
Hillenbrand, J.M.M., Gotze, J., Mullar, P.: A Single- Sign-On Framework forWeb-Services-based Distributed Applications. In: Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005, vol. (1), pp. 273–279 (2005)
Moran, E.B., Tentori, M., Gonzalez, V.M., Favela, J., Martinez-Garcia, A.I.: Mobility in hospital work: towards a pervasive computing hospital environment. Intl. J. Electronic Healthcare 3(7), 72–89 (2007)
Picco, P.: Mobile agents: an introduction. Microprocessors and Microsystems 25(2), 65–74 (2001)
Sun Microsystems, Wireless Toolkit, Version 2.1 (2003), http://java.sun.com/products
Tardo, J., Valente, L.: Mobile agent security and Telescript. In: IEEE CompCon 1996, pp. 58–63 (1996)
Varadharajan, V.: Security enhanced mobile agents. In: CCS 2000: Proceedings of the 7th ACM conference on Computer and communications security, pp. 200–209. ACM Press, New York (2000)
Weerasinghe, D., Elmufti, K., Rajarajan, M., Rakocevic, V.: Securing electronic health records with novel mobile encryption schemes. International Journal of Electronic Healthcare 3(4), 395–416 (2007)
Weerasinghe, D., Rajarajan, M., Elmufti, K., Rakocevic, V.: Patient privacy protection using anonymous access control techniques. Methods of Information in Medicine 47(3), 235–240 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Weerasinghe, D., Rajarajan, M., Rakocevic, V. (2009). Device Data Protection in Mobile Healthcare Applications. In: Weerasinghe, D. (eds) Electronic Healthcare. eHealth 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 0001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00413-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-00413-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00412-4
Online ISBN: 978-3-642-00413-1
eBook Packages: Computer ScienceComputer Science (R0)