Trust assessment of security for e-health systems

被引:29
作者
Bahtiyar, Erif [1 ,2 ]
Caglayan, Mehmet Ufuk [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, Comp Networks Res Lab, TR-34342 Istanbul, Turkey
[2] Provus Informat Technol, Progress R&D Ctr, Istanbul, Turkey
关键词
Trust; Assessment; Security; Architecture; E-health; REPUTATION MODEL; ARCHITECTURE; INTEROPERABILITY; CHALLENGES; MANAGEMENT; FRAMEWORK; PRIVACY; RECORDS;
D O I
10.1016/j.elerap.2013.10.003
中图分类号
F [经济];
学科分类号
02 ;
摘要
The expansive connectivity of emerging information systems has set the stage for pervasive access to healthcare services via e-health systems for selecting the best possible healthcare services. Emerging systems are expected to be highly dynamic open environments connecting diverse number of healthcare services and autonomous entities that are autonomous agents or software applications representing patients. Entities in such dynamic environments may have different security needs from e-health systems raising the challenge of trust computations regarding security. In this research, we proposed a trust assessment model of an e-health service from the viewpoint of an entity. The model contains a comprehensive architecture applicable to different types of entities, and a novel set of trust assessment metrics may be used to assess a specific property of a security system (i.e. partial metrics) or all properties (i.e. total metrics). The simulation based evaluation of proposed model in the context of a Hospital Online Appointment Service has shown that the proposed model provides better trust computation results than existing trust models for e-health systems. Furthermore, the entities are also able to assess the trust even with incomplete security information. (C) 2013 Elsevier B. V. All rights reserved.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 57 条
[1]  
Andert D., 2002, Trust Modeling for Security Architecture Development
[2]  
[Anonymous], THESIS HELSINKI U TE
[3]  
[Anonymous], 1996, TRUST MODERN SOC SEA
[4]  
Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
[5]   Trends and Challenges of the Emerging Technologies toward Interoperability and Standardization in e-Health Communications [J].
Araguees, Antonio ;
Escayola, Javier ;
Martinez, Ignacio ;
del Valle, Pilar ;
Munoz, Pilar ;
Trigo, Jesus D. ;
Garcia, Jose .
IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (11) :182-188
[6]  
Au R., 2008, HAWAII INT C SYSTEM, P234
[7]   Privacy in Mobile Technology for Personal Healthcare [J].
Avancha, Sasikanth ;
Baxi, Amit ;
Kotz, David .
ACM COMPUTING SURVEYS, 2012, 45 (01)
[8]  
Bahtiyar Serif, 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P803, DOI 10.1109/CIT.2010.153
[9]   Extracting trust information from security system of a service [J].
Bahtiyar, Serif ;
Caglayan, Mehmet Ufuk .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) :480-490
[10]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173