Abstract
![CDATA[There are clear advantages in using ubiquitous health (U-health) monitoring systems. They help with improving the quality of care and the availability of data. In such a system, healthcare professionals can remotely access a patient's Electronic Health Records (EHR), over the Internet, anywhere and anytime using various communication devices. Amongst the main challenges that this U-health technology faces, security is considered as one of the major obstacles to its adaptation. This work reports an authentication approach, referred as Health Authentication Approach (HAA), which aims at minimizing the security risk associated with the use of a U-health monitoring system. The proposed approach allows healthcare professionals to ubiquity access patients' EHRs, using their mobile devices in a secure way. For verification purposes, HAA is implemented in an Android mobile application which demonstrates a successful integration of the proposed approach in a mobile environment.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the 7th International Conference on Information Technology and Application (ICITA 2011): Sydney, NSW, Australia, 21-24 November 2011 |
Publisher | ICITA |
Pages | 14-18 |
Number of pages | 5 |
ISBN (Print) | 9780980326741 |
Publication status | Published - 2011 |
Event | International Conference on Information Technology and Application - Duration: 21 Nov 2011 → … |
Conference
Conference | International Conference on Information Technology and Application |
---|---|
Period | 21/11/11 → … |