The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers. Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution...
The cloud based delivery model for IT resources is revolutionizing the IT industry. Despite the marketing hype around “the cloud”, the paradigm itself is in a critical transition state from the laboratories to mass market. Many technical and business aspects of cloud computing need to mature before it is widely adopted for corporate use. For example, the inability to seamlessly burst between internal...
In this paper, we propose a security framework, looking at different policies for data access control in the mobile environments. We have started with extending the Platform for Privacy Preferences (P3P) policy for controlling the data access. The aim is to modify the P3P policy and to use it in the security capsule of a mobile handset. The service provider can publish the P3P policy in the WebServices...
In the modern health services era, data is accessed by the doctors and nurses using small handheld devices like mobile, Personal Digital Assistants and other electronic handheld devices. Individual's health related information is normally stored in a central health repository. This data can be accessed by authorized doctors. Data is prone to be exposed to a number of mobile attacks while being accessed...
In energy constrained wireless sensor networks, it is important that a routing protocol provides network redundancy and reliability at a minimum energy consumption cost. To satisfy these conflicting constraints, wireless sensor networks (WSN) routing protocols generally employ a clustering algorithm in which the entire network does not have to be active at all times. In this paper, we propose a novel...
This paper provides detailed solutions for trust delegation and secure temporary storage of medical records for authorized users in public mobile communication networks. The solutions presented in this paper enable the development of software that can be used by emergency medical units in urgent need of sensitive personal information about unconscious patients. In today's world, technical improvements...
Accurate simulation and analysis of wireless networks are inherently dependent on accurate models which are able to provide real-time channel characterization. High-order Markov chains are typically used to model errors and losses over wireless channels. However, complexity (i.e., the number of states) of a high-order Markov model increases exponentially with the memory-length of the underlying channel...
The Internet and mobile networks have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such healthcare environment the privacy and security of the transmitted information must be preserved. When dealing with health sensitive information at times it is vital to protect the patientpsilas identity and their health sensitive...
Remote monitoring is fundamental in eHealth and introducing mobile devices in the remote monitoring process can provide additional benefits to both patients and medical personnel. For mobile remote monitoring systems to be successful, however, the authentication process must be in place to prevent the misuse of the system. In this paper we analyse the use of timestamps in the authentication process,...
In this paper we present a platform for the direct consumption of Web services by a Mobile Station. We give an architectural solution where Mobile Operators play the role of Trusted Third Parties supplying service credentials that allow a co-located 3GPP network application function and liberty-enabled identity provider entity to implement a controlled shopping mall service to mobile stations from...
Mobile and wireless devices have penetrated the health care sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such health care applications the privacy and security of the transmitted information must be preserved. Also different personal involved in the Healthcare industry must have different access privileges to the patient information. In...
There are many advantages to deploying mobile devices in eHealth systems. However; security is still an issue: in particular authentication and user privacy. In this paper we propose a novel architecture that integrates 3GPP UMTS mobile technology with Web services. This will help address authentication and privacy concern within eHealth environment. The architecture makes use of the generic authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.