메뉴 건너뛰기




Volumn 4, Issue , 2016, Pages 8418-8441

A fog based middleware for automated compliance with OECD privacy principles in internet of healthcare things

Author keywords

Cloud based healthcare services; Holistic privacy; Internet of healthcare things

Indexed keywords

BIOLOGY; DIGITAL COMMUNICATION SYSTEMS; FOG; GATEWAYS (COMPUTER NETWORKS); HEALTH; HEALTH CARE; HEALTH INSURANCE; LAWS AND LEGISLATION; MIDDLEWARE; POPULATION STATISTICS; STATISTICS; WEB SERVICES;

EID: 85009181013     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2016.2631546     Document Type: Article
Times cited : (104)

References (62)
  • 1
    • 84904582459 scopus 로고    scopus 로고
    • A mobile wireless body area network platform
    • Jul.
    • B. Alghamdi and H. Fouchal, "A mobile wireless body area network platform," J. Comput. Sci., vol. 5, no. 4, pp. 664-674, Jul. 2014.
    • (2014) J. Comput. Sci. , vol.5 , Issue.4 , pp. 664-674
    • Alghamdi, B.1    Fouchal, H.2
  • 3
    • 77951270415 scopus 로고    scopus 로고
    • The design and evaluation of personalised ambient mental health monitors
    • Las Vegas, NV, USA
    • J. M. Blum and E. H. Magill, "The design and evaluation of personalised ambient mental health monitors," presented at the 7th IEEE Conf. Consum. Commun. Netw. Conf., Las Vegas, NV, USA, 2010, pp. 1-5.
    • (2010) The 7th IEEE Conf. Consum. Commun. Netw. Conf. , pp. 1-5
    • Blum, J.M.1    Magill, E.H.2
  • 6
    • 84944262629 scopus 로고    scopus 로고
    • Collaborative filtering with privacy
    • May
    • J. Canny, "Collaborative filtering with privacy," presented at the IEEE Symp. Secur. Privacy, May 2002, pp. 45-57.
    • (2002) The IEEE Symp. Secur. Privacy , pp. 45-57
    • Canny, J.1
  • 7
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • Tampere, Finland, May
    • J. Canny, "Collaborative filtering with privacy via factor analysis," presented at the 25th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., Tampere, Finland, May 2002, pp. 45-57.
    • (2002) The 25th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retr. , pp. 45-57
    • Canny, J.1
  • 8
    • 84863179355 scopus 로고    scopus 로고
    • Attitudes towards information privacy
    • S. Cockcroft and P. Clutterbuck, "Attitudes towards information privacy," in Proc. ACIS, 2001, p. 20.
    • (2001) Proc. ACIS , pp. 20
    • Cockcroft, S.1    Clutterbuck, P.2
  • 10
    • 84992015113 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector
    • E. Commission
    • E. Commission, "Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector," Off. J. L, vol. 201, no. 31, p. 7, 2002.
    • (2002) Off. J. L , vol.201 , Issue.31 , pp. 7
  • 11
    • 1642301688 scopus 로고    scopus 로고
    • T didn't buy it for myself privacy and ecommerce personalization,"
    • Washington, DC, USA
    • L. E Cranor, "T didn't buy it for myself privacy and ecommerce personalization," presented at the ACM Workshop Privacy Electron. Soc, Washington, DC, USA, 2003, pp. 111-117.
    • (2003) The ACM Workshop Privacy Electron. Soc , pp. 111-117
    • Cranor, L.E.1
  • 14
    • 0003187764 scopus 로고
    • 95/46/EC of the European Parliament and of the Council of 24 Oct. 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • Directive, E., "95/46/EC of the European Parliament and of the Council of 24 Oct. 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," Off. J. EC, vol. 23, no. 6, 1995.
    • (1995) Off. J. EC , vol.23 , Issue.6
    • Directive, E.1
  • 16
    • 84903720938 scopus 로고    scopus 로고
    • Privacy aware obfuscation middleware for mobile jukebox recommender services
    • Kaunas, Lithuania
    • A. Elmisery and D. Botvich, "Privacy aware obfuscation middleware for mobile jukebox recommender services," presented at the 11th IFIP Conf. e-Business, e-Service, e-Society, Kaunas, Lithuania, 2011, pp. 73-89, doi: 10.1007/978-3-642-27260-8-6.
    • (2011) The 11th IFIP Conf. E-Business E-Service, E-Society , pp. 73-89
    • Elmisery, A.1    Botvich, D.2
  • 17
    • 84860796322 scopus 로고    scopus 로고
    • Privacy aware recommender service using multi-agent middleware- an IPTV network scenario
    • A. Elmisery and D. Botvich, "Privacy aware recommender service using multi-agent middleware- an IPTV network scenario," Informatica, vol. 36, no. 1, 2012.
    • (2012) Informatica , vol.36 , Issue.1
    • Elmisery, A.1    Botvich, D.2
  • 18
    • 84903727280 scopus 로고    scopus 로고
    • Private personalized social recommendations in an IPTV system
    • A. M. Elmisery, "Private personalized social recommendations in an IPTV system," New Rev. Hypermedia Multimedia, vol. 20, no. 2, pp. 145-167, 2014, doi: 10.1080/13614568.2014.889222.
    • (2014) New Rev. Hypermedia Multimedia , vol.20 , Issue.2 , pp. 145-167
    • Elmisery, A.M.1
  • 21
    • 84869597343 scopus 로고    scopus 로고
    • Agent based middleware for maintaining user privacy in IPTV recommender services
    • Aalborg, Denmark, May
    • A. M. Elmisery and D. Botvich, "Agent based middleware for maintaining user privacy in IPTV recommender services," in Proc. 3rd Int. ICST Conf. Secur. Privacy Mobile Inf. Commun. Syst. MobiSec, Aalborg, Denmark, May 2011, pp. 64-75, doi: 10.1007/978-3-642-30244-2-6.
    • (2011) Proc. 3rd Int. ICST Conf. Secur. Privacy Mobile Inf. Commun. Syst. MobiSec , pp. 64-75
    • Elmisery, A.M.1    Botvich, D.2
  • 22
    • 84888387545 scopus 로고    scopus 로고
    • Multi-agent based middleware for protecting privacy in IPTV content recommender services
    • A. M. Elmisery and D. Botvich, "Multi-agent based middleware for protecting privacy in IPTV content recommender services," Multimedia Tools Appi., vol. 64, no. 2, pp. 249-275, 2013, doi: 10.1007/sll042-012-1067-3.
    • (2013) Multimedia Tools Appi. , vol.64 , Issue.2 , pp. 249-275
    • Elmisery, A.M.1    Botvich, D.2
  • 25
    • 78649884242 scopus 로고    scopus 로고
    • Privacy preserving distributed learning clustering of healthcare data using cryptography protocols
    • Jul.
    • A. M. Elmisery and H. Fu, "Privacy preserving distributed learning clustering of healthcare data using cryptography protocols," presented at the IEEE 34th Annu. Comput. Softw. Appi. Conf. Workshops (COMPSACW), Jul. 2010, pp. 19-23, doi: 10.1109/COMPSACW.2010.33.
    • (2010) The IEEE 34th Annu. Comput. Softw. Appi. Conf. Workshops (COMPSACW) , pp. 19-23
    • Elmisery, A.M.1    Fu, H.2
  • 26
    • 84908519405 scopus 로고    scopus 로고
    • Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service
    • Nov.
    • A.M. Elmisery, S.Rho, and D. Botvich, "Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service," Multimedia Tools Appi, vol. 75, no. 22, pp. 14927-14957, Nov. 2016, doi: 10.1007/sl 1042-014-2271-0.
    • (2016) Multimedia Tools Appi , vol.75 , Issue.22 , pp. 14927-14957
    • Elmisery, A.M.1    Rho, S.2    Botvich, D.3
  • 27
    • 84957432012 scopus 로고    scopus 로고
    • Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups
    • Jan.
    • A. M. Elmisery, S. Rho, and D. Botvich, "Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups," J. Supercomput., vol. 72, no. 1, pp. 247-274, Jan. 2016, doi: 10.1007/sll227-015-1574-x.
    • (2016) J. Supercomput. , vol.72 , Issue.1 , pp. 247-274
    • Elmisery, A.M.1    Rho, S.2    Botvich, D.3
  • 31
    • 35348924316 scopus 로고    scopus 로고
    • PRIVE: Anonymous location-based queries in distributed mobile systems
    • Banff, AB, Canada
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous location-based queries in distributed mobile systems," presented at the 16th Int. Conf. World Wide Web, Banff, AB, Canada, 2007.
    • (2007) The 16th Int. Conf. World Wide Web
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 32
    • 70350714539 scopus 로고    scopus 로고
    • Challenges in supporting end-user privacy and security management with social navigation
    • Mountain View, CA, USA
    • J. Goecks, W. K. Edwards, and E. D. Mynatt, "Challenges in supporting end-user privacy and security management with social navigation," presented at the 5th Symp. Usable Privacy Secur., Mountain View, CA, USA, 2009.
    • (2009) The 5th Symp. Usable Privacy Secur.
    • Goecks, J.1    Edwards, W.K.2    Mynatt, E.D.3
  • 33
    • 84867301818 scopus 로고    scopus 로고
    • A privacy-strengthened scheme for E-healthcare monitoring system
    • C. Huang, H. Lee, and D. H. Lee, "A privacy-strengthened scheme for E-healthcare monitoring system," J. Med. Syst., vol. 36, no. 5, pp. 2959-2971, 2012, doi: 10.1007/s10916-011-9774-2.
    • (2012) J. Med. Syst. , vol.36 , Issue.5 , pp. 2959-2971
    • Huang, C.1    Lee, H.2    Lee, D.H.3
  • 34
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Baltimore, MD, USA
    • Z. Huang, W. Du, and B. Chen, "Deriving private information from randomized data," presented at the ACM SIGMOD Int. Conf. Manag. Data, Baltimore, MD, USA, 2005.
    • (2005) The ACM SIGMOD Int. Conf. Manag. Data
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 38
    • 84871969604 scopus 로고    scopus 로고
    • Lightweight cryptography for the Internet of Things
    • M. Katagi and S. Moriai, "Lightweight cryptography for the Internet of Things," Sony Corp., pp. 7-10, 2008.
    • (2008) Sony Corp. , pp. 7-10
    • Katagi, M.1    Moriai, S.2
  • 39
    • 70349618430 scopus 로고    scopus 로고
    • Applying consistency-based trust definition to collaborative filtering
    • H. D. Kim, "Applying consistency-based trust definition to collaborative filtering," KSII Trans. Internet Inf. Syst., vol. 3, no. 4, pp. 366-374, 2009.
    • (2009) KSII Trans. Internet Inf. Syst. , vol.3 , Issue.4 , pp. 366-374
    • Kim, H.D.1
  • 40
    • 10944253573 scopus 로고    scopus 로고
    • Sensor networks for emergency response: Challenges and opportunities
    • Apr.
    • K. Lorincz, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Comput., vol. 3, no. 4, pp. 16-23, Apr. 2004, doi: 10.1109/mprv.18.
    • (2004) IEEE Pervasive Comput. , vol.3 , Issue.4 , pp. 16-23
    • Lorincz, K.1
  • 42
    • 84961227396 scopus 로고    scopus 로고
    • [Online]
    • J. Manyika. (2015). Unlocking the Potential of the Internet of Things. [Online]. Available: http://www.mckinsey.com/business-functions/business-technology/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world
    • (2015) Unlocking the Potential of the Internet of Things
    • Manyika, J.1
  • 43
    • 85009191604 scopus 로고    scopus 로고
    • [Online] html and http://Market Research.com
    • (2015). IoT Deployments in Healthcare to Reach $117 Billion by 2020, Says New Mind Commerce Report. [Online]. Available: http://www.prnewswire.com/news-releases/marketresearchcom-iot-deployments-in-healthcare-to-reach-117-billion-by-2020-says-new-mind-commerce-report-300070129.html and http://Market Research.com
    • (2015) IoT Deployments in Healthcare to Reach $117 Billion by 2020, Says New Mind Commerce Report
  • 47
    • 3843049042 scopus 로고    scopus 로고
    • PocketLens: Toward a personal recommender system
    • [Online]
    • B. N. Miller, J. A. Konstan, and J. Riedl, "PocketLens: Toward a personal recommender system," ACM Trans. Inf. Syst., vol. 22, no. 3, pp. 437-476, 2004, doi:10.1145/1010614.1010618. [Online]. Available: http://doi.acm.org/
    • (2004) ACM Trans. Inf. Syst. , vol.22 , Issue.3 , pp. 437-476
    • Miller, B.N.1    Konstan, J.A.2    Riedl, J.3
  • 52
    • 85009165433 scopus 로고    scopus 로고
    • The first big Internet of Things security breach is just around the corner
    • D. Palmer, "The first big Internet of Things security breach is just around the corner," ZDNet, Tech Rep., 2016.
    • (2016) ZDNet Tech Rep.
    • Palmer, D.1
  • 53
    • 85047227272 scopus 로고    scopus 로고
    • Privacy preserving data obfuscation for inherently clustered data
    • R. Parameswaran and D. M. Blough, "Privacy preserving data obfuscation for inherently clustered data," Int. J. Inf. Comput. Secur., vol. 2, no. 1, pp. 4-26, 2008, doi: 10.1504/ijics.016819.
    • (2008) Int. J. Inf. Comput. Secur. , vol.2 , Issue.1 , pp. 4-26
    • Parameswaran, R.1    Blough, D.M.2
  • 54
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," presented at the 3rd IEEE Int. Conf. Data Mining, 2003.
    • (2003) The 3rd IEEE Int. Conf. Data Mining
    • Polat, H.1    Du, W.2
  • 55
    • 33644514610 scopus 로고    scopus 로고
    • SVD-based collaborative filtering with privacy
    • Santa Fe, NM, USA
    • H. Polat and W. Du, "SVD-based collaborative filtering with privacy," presented at the ACM Symp. Appl. Comput., Santa Fe, NM, USA, 2005.
    • (2005) The ACM Symp. Appl. Comput.
    • Polat, H.1    Du, W.2
  • 57
    • 80053007654 scopus 로고    scopus 로고
    • On QoS provisioning in context-aware wireless sensor networks for healthcare
    • Jul.
    • M. Souil and A. Bouabdallah, "On QoS provisioning in context-aware wireless sensor networks for healthcare," presented at 20th Int. Conf. Comput. Commun. Netw. (ICCCN), Jul. 2011.
    • (2011) 20th Int. Conf. Comput. Commun. Netw. (ICCCN)
    • Souil, M.1    Bouabdallah, A.2
  • 58
    • 84973872464 scopus 로고    scopus 로고
    • MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks
    • D. Storm, "MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks," Computerworld, Tech. Rep., 2015.
    • (2015) Computerworld Tech. Rep.
    • Storm, D.1
  • 59
    • 70449562519 scopus 로고    scopus 로고
    • IBE-lite: A lightweight identity-based cryptography for body sensor networks
    • Jun.
    • C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-lite: A lightweight identity-based cryptography for body sensor networks," Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Jun. 2009, doi: 10.1109/titb.2033055.
    • (2009) Trans. Inf. Technol. Biomed. , vol.13 , Issue.6 , pp. 926-932
    • Tan, C.C.1    Wang, H.2    Zhong, S.3    Li, Q.4
  • 60
    • 84971269044 scopus 로고    scopus 로고
    • The Wall Street Journal [Online]
    • E. J. Topol. (2015). The Future of Medicine is in Your Smartphone. The Wall Street Journal. [Online]. Available: http://www.wsj.com/articles/the-future-of-medicine-is-in-your-smartphone-1420828632
    • (2015) The future of medicine is in your smartphone
    • Topol, E.J.1
  • 61
    • 34548269952 scopus 로고    scopus 로고
    • Pervasive healthcare and wireless health monitoring
    • U. Varshney, "Pervasive healthcare and wireless health monitoring," Mob. Netw. Appl., vol. 12, nos. 2-3, pp. 113-127, 2007, doi: 10.1007/s11036-007-0017-1.
    • (2007) Mob. Netw. Appl. , vol.12 , Issue.2-3 , pp. 113-127
    • Varshney, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.