Securing ubiquitous access in U-health monitoring systems

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung

    Research output: Chapter in Book / Conference PaperConference Paperpeer-review

    Abstract

    ![CDATA[There are clear advantages in using ubiquitous health (U-health) monitoring systems. They help with improving the quality of care and the availability of data. In such a system, healthcare professionals can remotely access a patient's Electronic Health Records (EHR), over the Internet, anywhere and anytime using various communication devices. Amongst the main challenges that this U-health technology faces, security is considered as one of the major obstacles to its adaptation. This work reports an authentication approach, referred as Health Authentication Approach (HAA), which aims at minimizing the security risk associated with the use of a U-health monitoring system. The proposed approach allows healthcare professionals to ubiquity access patients' EHRs, using their mobile devices in a secure way. For verification purposes, HAA is implemented in an Android mobile application which demonstrates a successful integration of the proposed approach in a mobile environment.]]
    Original languageEnglish
    Title of host publicationProceedings of the 7th International Conference on Information Technology and Application (ICITA 2011): Sydney, NSW, Australia, 21-24 November 2011
    PublisherICITA
    Pages14-18
    Number of pages5
    ISBN (Print)9780980326741
    Publication statusPublished - 2011
    EventInternational Conference on Information Technology and Application -
    Duration: 21 Nov 2011 → …

    Conference

    ConferenceInternational Conference on Information Technology and Application
    Period21/11/11 → …

    Fingerprint

    Dive into the research topics of 'Securing ubiquitous access in U-health monitoring systems'. Together they form a unique fingerprint.

    Cite this