SEPTON Toolkit application: An overview of the security techniques used from wearable medical devices to physician’s healthcare platform
Abstract
References
Index Terms
- SEPTON Toolkit application: An overview of the security techniques used from wearable medical devices to physician’s healthcare platform
Recommendations
Security Models and Requirements for Healthcare Application Clouds
CLOUD '10: Proceedings of the 2010 IEEE 3rd International Conference on Cloud ComputingWith the widespread use of electronic health record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT ...
Security Scores for Medical Devices
BIOSTEC 2016: Proceedings of the International Joint Conference on Biomedical Engineering Systems and TechnologiesMedical devices are indispensable for millions of patients worldwide. They increasingly depend on software
and hardware components, and interoperate with other devices wirelessly and through the Internet. The sensitive
nature of health records, the ...
Security And Privacy Of Medical Data: Challenges For Next-Generation Patient-Centric Healthcare Systems
UMAP'19 Adjunct: Adjunct Publication of the 27th Conference on User Modeling, Adaptation and PersonalizationWe describe the recently-started EU H2020 Serums: Securing Medical Data in Smart Patient-Centric Healthcare Systems project that aims to develop novel techniques for safe and secure collection, storage, exchange and analysis of medical data, allowing ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- SEPTON - HORIZON-HLTH-2022-IND-13
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 31Total Downloads
- Downloads (Last 12 months)31
- Downloads (Last 6 weeks)7
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format