메뉴 건너뛰기




Volumn , Issue , 2012, Pages 309-322

Plug-n-trust: Practical trusted sensing for mHealth

Author keywords

mhealth; smartcards; smartphones; trusted computing

Indexed keywords

CONFIDENTIAL DATA; EXPERIMENTAL EVALUATION; FLEXIBLE PROGRAMMING; HASHING TECHNIQUES; MEDICAL CONDITIONS; MEDICAL DATA; MEDICAL SENSING; MHEALTH; PLUG-INS; SAFETY CRITICAL APPLICATIONS; SAFETY-CRITICAL; SECURITY GOALS; SENSING TECHNOLOGY; SOFTWARE-BASED; TRUSTED COMPUTING; WIRELESS SENSOR;

EID: 84864353539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2307636.2307665     Document Type: Conference Paper
Times cited : (31)

References (46)
  • 3
    • 78149481587 scopus 로고    scopus 로고
    • Remote health monitoring using mobile phones and web services
    • June DOI 10.1089/tmj.2009.0165
    • S. Agarwal and C. T. Lau. Remote health monitoring using mobile phones and web services. Telemedicine and e-Health, 16(5):603-607, June 2010. DOI 10.1089/tmj.2009.0165.
    • (2010) Telemedicine and E-Health , vol.16 , Issue.5 , pp. 603-607
    • Agarwal, S.1    Lau, T.C.2
  • 7
    • 0028462563 scopus 로고
    • Optimally profiling and tracing programs
    • July DOI
    • T. Ball and J. R. Larus. Optimally profiling and tracing programs. ACM Transactions on Programming Languages Systems, 16:1319-1360, July 1994. DOI http://doi.acm.org/10.1145/183432.183527.
    • (1994) ACM Transactions on Programming Languages Systems , vol.16 , pp. 1319-1360
    • Ball, T.1    Larus, J.R.2
  • 8
    • 79960189918 scopus 로고    scopus 로고
    • Smarter phones for healthier lifestyles: An adaptive fitness game
    • Oct. DOI 10.1109/MPRV.2010.52
    • F. Buttussi and L. Chittaro. Smarter phones for healthier lifestyles: An adaptive fitness game. IEEE Pervasive Computing, 9(4):51-57, Oct. 2010. DOI 10.1109/MPRV.2010.52.
    • (2010) IEEE Pervasive Computing , vol.9 , Issue.4 , pp. 51-57
    • Buttussi, F.1    Chittaro, L.2
  • 10
    • 78651583714 scopus 로고    scopus 로고
    • On-body chemical sensors for monitoring sweat
    • Wearable and Autonomous Biomedical Devices and Systems for Smart Environment, Springer, DOI 10.1007/978-3-642-15687-8 9
    • S. Coyle, F. Benito-Lopez, R. Byrne, and D. Diamond. On-body chemical sensors for monitoring sweat. In Wearable and Autonomous Biomedical Devices and Systems for Smart Environment, volume 75 of Lecture Notes in Electrical Engineering, pages 177-193. Springer, 2010. DOI 10.1007/978-3-642-15687-8 9.
    • (2010) Lecture Notes in Electrical Engineering , vol.75 , pp. 177-193
    • Coyle, S.1    Benito-Lopez, F.2    Byrne, R.3    Diamond, D.4
  • 13
    • 84859028284 scopus 로고    scopus 로고
    • Towards trustworthy participatory sensing
    • USENIX, Aug. Online at
    • A. Dua, N. Bulusu, W.-c. Feng, and W. Hu. Towards trustworthy participatory sensing. In USENIX Conference on Hot Topics in Security. USENIX, Aug. 2009. Online at http://www.usenix.org/event/hotsec09/tech/full-papers/dua. pdf.
    • (2009) USENIX Conference on Hot Topics in Security
    • Dua, A.1    Bulusu, N.2    Feng, W.-C.3    Hu, W.4
  • 14
    • 84864347884 scopus 로고    scopus 로고
    • Enterproid.com. Online at visited Dec. 2011
    • Enterproid.com. Enterproid: The Divide platform. Online at http://www.enterproid.com/features.php, visited Dec. 2011.
    • Enterproid: The Divide Platform
  • 17
    • 84864354955 scopus 로고    scopus 로고
    • Giesecke and Devrient GmbH. Online at /, visited Mar. 2011
    • Giesecke and Devrient GmbH. Online at http://www.gi-de.com/, visited Mar. 2011.
  • 18
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • T. Rabin, editor, Springer, DOI 10.1007/978-3-642-14623-7 25
    • R. Gennaro, C. Gentry, and B. Parno. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In T. Rabin, editor, Advances in Cryptology (CRYPTO), volume 6223, pages 465-482. Springer, 2010. DOI 10.1007/978-3-642-14623-7 25.
    • (2010) Advances in Cryptology (CRYPTO) , vol.6223 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 21
    • 84864347890 scopus 로고    scopus 로고
    • Online at visited Dec. 2011
    • Go-Trust NFC smart cards. Online at http://www.go-trust.com/products/swp- secure-microsd/, visited Dec. 2011.
    • Go-Trust NFC Smart Cards
  • 22
    • 84872066245 scopus 로고    scopus 로고
    • Online at /, visited Dec. 2011
    • Google. Google wallet. Online at http://www.google.com/wallet/, visited Dec. 2011.
    • Google Wallet
  • 25
    • 84871243129 scopus 로고    scopus 로고
    • Next generation secure mobile devices
    • D. Kleidermacher. Next generation secure mobile devices. Information Quarterly, 7(4), 2008.
    • (2008) Information Quarterly , vol.7 , pp. 4
    • Kleidermacher, D.1
  • 28
    • 1242304439 scopus 로고    scopus 로고
    • Protecting Java code via code obfuscation
    • 21-23, Apr. DOI 10.1145/332084.332092
    • D. Low. Protecting Java code via code obfuscation. Crossroads, 4(3):21-23, Apr. 1998. DOI 10.1145/332084.332092.
    • (1998) Crossroads , vol.4 , pp. 3
    • Low, D.1
  • 30
    • 77952132371 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for TCB minimization
    • Apr. DOI 10.1145/1352592.1352625
    • J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: an execution infrastructure for TCB minimization. SIGOPS Operating Systems Review, 42:315-328, Apr. 2008. DOI 10.1145/1352592.1352625.
    • (2008) SIGOPS Operating Systems Review , vol.42 , pp. 315-328
    • McCune, J.M.1    Parno, B.J.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 31
    • 84864363062 scopus 로고    scopus 로고
    • Online at visited Dec. 2010
    • Mobile Phone Work Group. Mobile Trusted Module FAQ. Online at http://www.trustedcomputinggroup.org/ resources/mobile-trusted-module-faq, visited Dec. 2010.
    • Mobile Trusted Module FAQ
  • 33
    • 34247264327 scopus 로고    scopus 로고
    • Web Site. Online at , visited Dec. 2011
    • SIMalliance. SIMaLliance Web Site. Online at http://www.simalliance.org, visited Dec. 2011.
    • SIMalliance
  • 35
    • 78650692944 scopus 로고    scopus 로고
    • Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study
    • Dec. DOI 10.1161/CIRCULATIONAHA.110.960633
    • L. A. Saxon, D. L. Hayes, F. R. Gilliam, P. A. Heidenreich, J. Day, M. Seth, T. E. Meyer, P. W. Jones, and J. P. Boehmer. Long-term outcome after ICD and CRT implantation and influence of remote device follow-up: The ALTITUDE survival study. Circulation, 122(23):2359-2367, Dec. 2010. DOI 10.1161/CIRCULATIONAHA.110.960633.
    • (2010) Circulation , vol.122 , Issue.23 , pp. 2359-2367
    • Saxon, L.A.1    Hayes, D.L.2    Gilliam, F.R.3    Heidenreich, P.A.4    Day, J.5    Seth, M.6    Meyer, T.E.7    Jones, P.W.8    Boehmer, J.P.9
  • 36
    • 84864354988 scopus 로고    scopus 로고
    • Open source Online at visited Apr. 2011
    • Open source. Seek-for-android. Online at https: //code.google.com/p/seek- for-android/wiki/PCSCLite, visited Apr. 2011.
    • Seek-for-android
  • 37
    • 78650203267 scopus 로고    scopus 로고
    • The diversity of TPMs and its effects on development: A case study of integrating the TPM into OpenSolaris
    • ACM, DOI 10.1145/1867635.1867649.
    • A. Shubina, S. Bratus, W. Ingersol, and S. W. Smith. The diversity of TPMs and its effects on development: a case study of integrating the TPM into OpenSolaris. In Proceedings of the ACM Workshop on Scalable Trusted Computing (STC), pages 85-90. ACM, 2010. DOI 10.1145/1867635.1867649.
    • (2010) Proceedings of the ACM Workshop on Scalable Trusted Computing (STC) , pp. 85-90
    • Shubina, A.1    Bratus, S.2    Ingersol, W.3    Smith, S.W.4
  • 41
    • 84864363045 scopus 로고    scopus 로고
    • Rev 103. Online at visited Dec. 2010
    • Trusted Computing Group. TPM Main Speci cation Level 2 Version 1.2, Rev 103. Online at http://www.trustedcomputinggroup.org/resources/tpm-main- specification, visited Dec. 2010.
    • TPM Main Speci Cation Level 2 Version 1.2
  • 42
    • 84980316005 scopus 로고    scopus 로고
    • web site. Online at visited Dec. 2010
    • TrustZone. ARM TrustZone web site. Online at http://www.arm.com/products/ processors/technologies/trustzone.php, visited Dec. 2010.
    • TrustZone
  • 43
    • 49949095440 scopus 로고    scopus 로고
    • Virtualization sparks security concerns
    • Aug. DOI 10.1109/MC.2008.276
    • S. Vaughan-Nichols. Virtualization sparks security concerns. Computer, 41(8):13-15, Aug. 2008. DOI 10.1109/MC.2008.276.
    • (2008) Computer , vol.41 , Issue.8 , pp. 13-15
    • Vaughan-Nichols, S.1
  • 44
    • 84864354966 scopus 로고    scopus 로고
    • VMWare, Inc. and LG Electronics MobileComm U.S.A, Inc. Dec. 7, Online at visited Dec. 2010
    • VMWare, Inc. and LG Electronics MobileComm U.S.A, Inc. VMWare News Release, Dec. 7, 2010. Online at http://www.vmware.com/company/news/releases/ vmware-lge-partnership.html, visited Dec. 2010.
    • (2010) VMWare News Release
  • 45
    • 84864345737 scopus 로고    scopus 로고
    • Using trusted sensors to monitor patients' habits
    • USENIX Association, Aug. Online at
    • A. Wolman, S. Saroiu, and V. Bahl. Using trusted sensors to monitor patients' habits. In USENIX Workshop on Health Security and Privacy. USENIX Association, Aug. 2010. Online at http://research.microsoft.com/en-us/um/people/ alecw/healthsec-2010.pdf.
    • (2010) USENIX Workshop on Health Security and Privacy
    • Wolman, A.1    Saroiu, S.2    Bahl, V.3
  • 46
    • 77955461661 scopus 로고    scopus 로고
    • Mobile personal health care system for patients with diabetes
    • Y. Lee, Z. Bien, M. Mokhtari, J. Kim, M. Park, J. Kim, H. Lee, and I. Khalil, editors, Aging Friendly Technology for Health and Independence, chapter 12, Springer, DOI 10.1007/978-3-642-13778-5-12.
    • F. Zhou, H.-I. Yang, J. Álamo, J. Wong, and C. Chang. Mobile personal health care system for patients with diabetes. In Y. Lee, Z. Bien, M. Mokhtari, J. Kim, M. Park, J. Kim, H. Lee, and I. Khalil, editors, Aging Friendly Technology for Health and Independence, volume 6159 of Lecture Notes in Computer Science, chapter 12, pages 94-101. Springer, 2010. DOI 10.1007/978-3-642-13778-5-12.
    • (2010) Lecture Notes in Computer Science , vol.6159 , pp. 94-101
    • Zhou, F.1    Yang, H.-I.2    Álamo, J.3    Wong, J.4    Chang, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.