Skip to main content

An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services

  • Conference paper
Wireless Mobile Communication and Healthcare (MobiHealth 2011)

Abstract

Mobile in conjunction with cloud computing can fulfil the vision of “Pervasive Healthcare” by enabling authorized healthcare participants to access services and required patient information without locational, time and other restraints. Of particular importance on such healthcare systems that incorporate mobile devices and cloud services is protecting the confidentiality of patient information. On these grounds, this paper proposes an access control framework for providing role-based context-aware authorization services with regard services invocations and patient information accesses. According to this, authorization decisions are taken according to contextual constraints that result from the domain ontology inferring that is used to represent context information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arnrich, B., Mayora, O., Bardram, J., Troster, G.: Pervasive Healthcare: Paving the Way for a Pervasive, User-centered and Preventive Healthcare Model. Methods Inf. Med. 49(1), 67–73 (2010)

    Google Scholar 

  2. Bouzid, Y., Harroud, H., Boulmalf, M., Karmouch, A.: Context-Based Services Discovery in Mobile Environments. In: 16th International Conference on Telecommunications, NJ, USA, pp. 13–18 (2009)

    Google Scholar 

  3. Poulymenopoulou, M., Malamateniou, F., Vassilacopoulos, G.: E-EPR: A Cloud-based Architecture of an Electronic Emergency Patient Record. In: 4th International Conference on Pervasive Technologies Related to Assisted Environments, Crete, Greece (2011)

    Google Scholar 

  4. Dersingh, A., Liscano, R., Jost, A.: Context-aware Access Control Using Semantic Policies. UbiCC J., Special Issue Autonomous Computing Systems and Applications, 19–32 (2008)

    Google Scholar 

  5. Wrona, K., Gomez, L.: Context-aware Security and Secure Context-awareness in Ubiquitous Computing Environments. In: XXI Autumn Meeting of Polish Information Processing Society Conference, Wisla, Poland, pp. 255–265 (2005)

    Google Scholar 

  6. Koufi, V., Malamateniou, F., Vassilacopoulos, G., Papakonstantinou, D.: Healthcare System Evolution towards SOA: A Security Perspective. In: 13th World Congress on Medical and Health Informatics, Cape Town, South Africa. Stud. Health Technol. Inform., pp. 874–878 (2010)

    Google Scholar 

  7. Zhang, R., Liu, L.: Security Models and Requirements for Healthcare Application Clouds. In: 3rd International Conference on Cloud Computing, Miami, Florida, USA, pp. 268–275 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Poulymenopoulou, M., Malamateniou, F., Vassilacopoulos, G. (2012). An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services. In: Nikita, K.S., Lin, J.C., Fotiadis, D.I., Arredondo Waldmeyer, MT. (eds) Wireless Mobile Communication and Healthcare. MobiHealth 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 83. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29734-2_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29734-2_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29733-5

  • Online ISBN: 978-3-642-29734-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics