Mapping Security Requirements of Mobile Health Systems into Software Development Lifecycle

被引:3
作者
Al-Taee, Majid A. [1 ]
Al-Nuaimy, Waleed [1 ]
Muhsin, Zahra J. [1 ]
Al-Ataby, Ali [1 ]
Al-Taee, Ahmad M. [2 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool, Merseyside, England
[2] St Louis Univ, Sch Med, St Louis, MO 63103 USA
来源
2016 9TH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE 2016) | 2016年
关键词
diabetes management; eHealth; mHealth; platform-as-a-service; security requirements; software security;
D O I
10.1109/DeSE.2016.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The shift to delivering mobile healthcare services is inevitable. However, finding effective ways to protect personal health information handled by these systems is still a challenging task even with the utilization of advanced technology and trained professionals. This is mainly due to the fact that the peripheral defense on the Internet and web-based applications does not handle the root causes of the application's vulnerabilities. This paper proposes a solution for enhancing security and personal privacy in electronic/mobile health (e/mHealth) systems through embedding security schemes into software-development lifecycle. The proposed solution, which encompasses various healthcare-specific security needs in mobile health systems, aims at ensuring a balance between personal privacy through ensuring that patients have control over their own information from one side and information sharing that is necessary for integrated service delivery from the other side. This balance is achieved through handling security and privacy challenges through careful design and implementation of data protection mechanisms, cryptography, access control, and auditory that give patients and their health care professionals the right to control disclosures of identifiable health data.
引用
收藏
页码:87 / 93
页数:7
相关论文
共 35 条
[1]  
Akinbi A., 2015, P IEEE INT C COMP IN
[2]   Diagnosis and Classification of Chronic Renal Failure Utilising Intelligent Data Mining Classifiers [J].
Al-Hyari, Abeer Y. ;
Al-Taee, Ahmad M. ;
Al-Taee, Majid A. .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2014, 9 (04) :1-12
[3]  
Al-Taee Ahmad M., 2015, 2015 IEEE International Conferences on Computer and Information Technology
[4]  
Ubiquitous Computing and Communications
[5]  
Dependable, Autonomic and Secure Computing
[6]   Smart Bolus Estimation Taking into Account the Amount of Insulin on Board [J].
Al-Taee, Ahmad M. ;
Al-Taee, Majid A. ;
Al-Nuaimy, Waleed ;
Muhsin, Zahra J. ;
AlZu'bi, Hamzah .
CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, :1052-1057
[7]  
Al-Taee A.M., 2014 14 UK WORKSH CO, P1, DOI [10.1109/UKCI.2014.6930191, DOI 10.1109/UKCI.2014.6930191]
[8]  
Al-Taee A. M., 2016, P 9 INT C DEV ESYSTE
[9]  
Al-Taee M. A., 2014, 53 ANN C EUR SOC PED
[10]  
Al-Taee M. A., 2013, IEEE JORD C APPL EL, P1