메뉴 건너뛰기




Volumn 3-4, Issue , 2017, Pages 39-74

A policy enforcement framework for Internet of Things applications in the smart health

Author keywords

Internet of Things; Policy enforcement; Security; Smart health

Indexed keywords

ARTICLE; COMPUTER LANGUAGE; COMPUTER SECURITY; DATA PROCESSING; HEALTH CARE SYSTEM; HEALTH SERVICE; HUMAN; INFORMATION PROCESSING; INFORMATION TECHNOLOGY; INTERNET OF THINGS; SMART HEALTH CARE SYSTEM;

EID: 85042006841     PISSN: None     EISSN: 23526483     Source Type: Journal    
DOI: 10.1016/j.smhl.2017.06.001     Document Type: Article
Times cited : (48)

References (45)
  • 1
    • 84883725153 scopus 로고    scopus 로고
    • Low power link layer security for IoT: Implementation and performance analysis. In Proceedings of International Wireless Communications and Mobile Computing Conference (IWCMC)
    • Altolini, D., Lakkundi, V., Bui, N., Tapparello, C., Rossi, M. (2013). Low power link layer security for IoT: Implementation and performance analysis. In Proceedings of International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 919–925.
    • (2013) , pp. 919-925
    • Altolini, D.1    Lakkundi, V.2    Bui, N.3    Tapparello, C.4    Rossi, M.5
  • 2
    • 84962781973 scopus 로고    scopus 로고
    • Access control for multi-tenancy in cloud-based health information systems. In Proceedings of IEEE International Conference on Cyber Security and Cloud Computing
    • Anwar, M., Imran, A. (2015). Access control for multi-tenancy in cloud-based health information systems. In Proceedings of IEEE International Conference on Cyber Security and Cloud Computing, pp. 104–110.
    • (2015) , pp. 104-110
    • Anwar, M.1    Imran, A.2
  • 4
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Atzori, L., Iera, A., Morabito, G., The internet of things: A survey. Comput Network 54:15 (2010), 2787–2805.
    • (2010) Comput Network , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 79960904737 scopus 로고    scopus 로고
    • Proposed embedded security framework for internet of things (iot). In Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India
    • Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R. (2011). Proposed embedded security framework for internet of things (iot). In Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, pp. 1 – 5.
    • (2011) , pp. 1-5
    • Babar, S.1    Stango, A.2    Prasad, N.3    Sen, J.4    Prasad, R.5
  • 7
    • 85162466379 scopus 로고    scopus 로고
    • Towards the definition of a framework for service development in the agrofood domain: A conceptual model. In WEBIST 2012, Porto, Portugal.
    • Barbagallo, D., Cappiello, C., Coen-Porisini, A., Colombo, P., Comerio, M., Paoli, F.D., Francalanci, C., Sicari, S. (2012). Towards the definition of a framework for service development in the agrofood domain: A conceptual model. In WEBIST 2012, Porto, Portugal.
    • (2012)
    • Barbagallo, D.1    Cappiello, C.2    Coen-Porisini, A.3    Colombo, P.4    Comerio, M.5    Paoli, F.D.6    Francalanci, C.7    Sicari, S.8
  • 8
    • 79960586120 scopus 로고    scopus 로고
    • Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
    • Barua, M., Liang, X., Lu, R., Shen, X. (2011). Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975.
    • (2011) , pp. 970-975
    • Barua, M.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 9
    • 84891569276 scopus 로고    scopus 로고
    • M2M communications: A systems approach
    • 1st Edition Wiley Publishing New York, USA
    • Boswarthick, D., Elloumi, O., Hersent, O., M2M communications: A systems approach. 1st Edition, 2012, Wiley Publishing, New York, USA.
    • (2012)
    • Boswarthick, D.1    Elloumi, O.2    Hersent, O.3
  • 11
    • 84866914974 scopus 로고    scopus 로고
    • Challenges in middleware solutions for the internet of things. In 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO
    • Chaqfeh, M.A., Mohamed, N. (2012). Challenges in middleware solutions for the internet of things. In 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, pp. 21–26.
    • (2012) , pp. 21-26
    • Chaqfeh, M.A.1    Mohamed, N.2
  • 12
    • 85103229175 scopus 로고    scopus 로고
    • Privacy aware systems: from models to patterns. igi global Edition.
    • Coen Porisini, A., Colombo, P., Sicari, S. (2011). Privacy aware systems: from models to patterns. igi global Edition.
    • (2011)
    • Coen Porisini, A.1    Colombo, P.2    Sicari, S.3
  • 13
    • 84875268254 scopus 로고    scopus 로고
    • Hipolds: A hierarchical security policy language for distributed systems. Information Security Technical Report 17 (3).
    • Dell'Amico, M., Serme, M.S.I.G., de Oliveira, A.S., Roudier, Y. (2013). Hipolds: A hierarchical security policy language for distributed systems. Information Security Technical Report 17 (3) pp. 81–92.
    • (2013) , pp. 81-92
    • Dell'Amico, M.1    Serme, M.S.I.G.2    de Oliveira, A.S.3    Roudier, Y.4
  • 14
    • 84858738793 scopus 로고    scopus 로고
    • Access control for healthcare data using extended xacml-srbac model. In Proceedings of International Conference on Computer Communication and Informatics
    • El-Aziz, A.A.A., Kannan, A. (2012). Access control for healthcare data using extended xacml-srbac model. In Proceedings of International Conference on Computer Communication and Informatics, pp. 1–4.
    • (2012) , pp. 1-4
    • El-Aziz, A.A.A.1    Kannan, A.2
  • 15
    • 79960590167 scopus 로고    scopus 로고
    • M2M: The Internet of 50 billion devices
    • Emmerson, B., M2M: The Internet of 50 billion devices. Huawei Win-Win Magazine Journal 4 (2010), 19–22.
    • (2010) Huawei Win-Win Magazine Journal , vol.4 , pp. 19-22
    • Emmerson, B.1
  • 16
    • 79954593491 scopus 로고    scopus 로고
    • The policy machine: A novel architecture and framework for access control policy specification and enforcement. Journal of Systems Architecture 57 (4).
    • Ferraiolo, D., Atluri, V. and Gavrila, S. (2011). The policy machine: A novel architecture and framework for access control policy specification and enforcement. Journal of Systems Architecture 57 (4) pp. 412–424.
    • (2011) , pp. 412-424
    • Ferraiolo, D.1    Atluri, V.2    Gavrila, S.3
  • 17
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98.
    • (2006) , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 18
    • 84891583935 scopus 로고    scopus 로고
    • The internet of things: Key applications and protocols
    • 2nd Edition Wiley Publishing New York, USA
    • Hersent, O., Boswarthick, D., Elloumi, O., The internet of things: Key applications and protocols. 2nd Edition, 2012, Wiley Publishing, New York, USA.
    • (2012)
    • Hersent, O.1    Boswarthick, D.2    Elloumi, O.3
  • 19
    • 84946921719 scopus 로고    scopus 로고
    • The internet of things for health care: A comprehensive survey
    • Islam, S.M.R., Kwak, D., Kabir, M.H., Hossain, M., Kwak, K.S., The internet of things for health care: A comprehensive survey. IEEE Access 3 (2015), 678–708, 10.1109/ACCESS.2015.2437951.
    • (2015) IEEE Access , vol.3 , pp. 678-708
    • Islam, S.M.R.1    Kwak, D.2    Kabir, M.H.3    Hossain, M.4    Kwak, K.S.5
  • 20
    • 84957922466 scopus 로고    scopus 로고
    • Fine-grained access control to medical records in digital healthcare enterprises. In Computers and Communications (ISNCC)
    • Khan, M.F.F., Sakamura, K. (2015). Fine-grained access control to medical records in digital healthcare enterprises. In Proceedings of International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6.
    • (2015) Proceedings of International Symposium on Networks , pp. 1-6
    • Khan, M.F.F.1    Sakamura, K.2
  • 21
    • 84974603425 scopus 로고    scopus 로고
    • The internet of things in healthcare: Potential applications and challenges
    • Laplante, P.A., Laplante, N., The internet of things in healthcare: Potential applications and challenges. IT Professional 18:3 (2016), 2–4.
    • (2016) IT Professional , vol.18 , Issue.3 , pp. 2-4
    • Laplante, P.A.1    Laplante, N.2
  • 22
    • 84861997111 scopus 로고    scopus 로고
    • Survey internet of things: Vision, applications and research challenges
    • Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I., Survey internet of things: Vision, applications and research challenges. Ad Hoc Network 10:7 (2012), 1497–1516.
    • (2012) Ad Hoc Network , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 23
    • 85103229108 scopus 로고    scopus 로고
    • Enforcement of security policy rules for the internet of things. In Proceedings of IEEE WiMob, Larnaca, Cyprus
    • Neisse, R., Steri, G., Baldini, G. (2014). Enforcement of security policy rules for the internet of things. In Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 120–127.
    • (2014) , pp. 120-127
    • Neisse, R.1    Steri, G.2    Baldini, G.3
  • 24
    • 34548016110 scopus 로고    scopus 로고
    • Privacy-aware role based access control. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, USA.
    • Ni, Q., Trombetta, A., Bertino, E., Lobo, J. (2007). Privacy-aware role based access control. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, USA.
    • (2007)
    • Ni, Q.1    Trombetta, A.2    Bertino, E.3    Lobo, J.4
  • 27
    • 85006339796 scopus 로고    scopus 로고
    • An attribute based access control scheme for secure sharing of electronic health records. In Proceedings of IEEE International Conference on e-Health Networking, Applications and Services (Healthcom)
    • Pussewalage, H.S.G., Oleshchuk, V.A. (2016). An attribute based access control scheme for secure sharing of electronic health records. In Proceedings of IEEE International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1–6. http://dx.doi.org/10.1109/HealthCom.2016.7749516.
    • (2016) , pp. 1-6
    • Pussewalage, H.S.G.1    Oleshchuk, V.A.2
  • 28
    • 58049196928 scopus 로고    scopus 로고
    • A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
    • Rao, J., Sardinha, A., Sadeh, N., A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources. Web Semantics: Science, Services and Agents on the World Wide Web 7:1 (2009), 40–56.
    • (2009) Web Semantics: Science, Services and Agents on the World Wide Web , vol.7 , Issue.1 , pp. 40-56
    • Rao, J.1    Sardinha, A.2    Sadeh, N.3
  • 29
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed internet of things. Computer Networks 57:10 (2013), 2266–2279.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 30
    • 80755190141 scopus 로고    scopus 로고
    • Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks
    • Sicari, S., Grieco, L.A., Boggia, G., Coen-Porsini, A., Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software 88:1 (2012), 152–166.
    • (2012) Journal of Systems and Software , vol.88 , Issue.1 , pp. 152-166
    • Sicari, S.1    Grieco, L.A.2    Boggia, G.3    Coen-Porsini, A.4
  • 31
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A., Security, privacy and trust in internet of things: The road ahead. Computer Networks 76 (2015), 146–164.
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 34
    • 84884208871 scopus 로고    scopus 로고
    • Dare: evaluating data accuracy using node reputation, Elsevier Computer Networks 57, (15)
    • Sicari, S., Coen-Porisini, A., Riggio, R. (2013). Dare: evaluating data accuracy using node reputation, Elsevier Computer Networks 57, (15), pp. 3098–3111.
    • (2013) , pp. 3098-3111
    • Sicari, S.1    Coen-Porisini, A.2    Riggio, R.3
  • 35
    • 84891684101 scopus 로고    scopus 로고
    • SETA: A secure sharing of tasks in clustered wireless sensor networks. In Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, Lyon, France
    • Sicari, S., Grieco, L., Rizzardi, A., Boggia, G., Coen-Porisini, A. (2013). SETA: A secure sharing of tasks in clustered wireless sensor networks. In Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, Lyon, France, pp. 239–246.
    • (2013) , pp. 239-246
    • Sicari, S.1    Grieco, L.2    Rizzardi, A.3    Boggia, G.4    Coen-Porisini, A.5
  • 36
    • 85103229149 scopus 로고    scopus 로고
    • Privacy and Trust Management in the Internet of Things era- SePriT, 11th Edition, Special Issue of Ad Hoc networks, Elsevier.
    • Sicari, S., Hailes, S., Turgut, D., Sharaffedine, S., Desai, D.U. (2013). Privacy and Trust Management in the Internet of Things era- SePriT, 11th Edition, Special Issue of Ad Hoc networks, Elsevier.
    • (2013)
    • Sicari, S.1    Hailes, S.2    Turgut, D.3    Sharaffedine, S.4    Desai, D.U.5
  • 37
    • 84917690758 scopus 로고    scopus 로고
    • A NFP model for internet of things applications. In Proceedings of the 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Larnaca, Cyprus
    • Sicari, S., Rizzardi, A., Coen-Porisini, A., Cappiello, C. (2014). A NFP model for internet of things applications. In Proceedings of the 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Larnaca, Cyprus, pp. 265–272.
    • (2014) , pp. 265-272
    • Sicari, S.1    Rizzardi, A.2    Coen-Porisini, A.3    Cappiello, C.4
  • 38
    • 84961805878 scopus 로고    scopus 로고
    • Secure om2m service platform. In Proceedings of IEEE International Conference on Autonomic Computing (ICAC)
    • Sicari, S., Rizzardi, A., Coen-Porisini, A., Grieco, L.A., Monteil, T. (2015). Secure om2m service platform. In Proceedings of IEEE International Conference on Autonomic Computing (ICAC), pp. 313–318.
    • (2015) , pp. 313-318
    • Sicari, S.1    Rizzardi, A.2    Coen-Porisini, A.3    Grieco, L.A.4    Monteil, T.5
  • 39
    • 84974578142 scopus 로고    scopus 로고
    • Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of IEEE International Conference on Intelligent Systems Engineering (ICISE)
    • Ullah, K., Shah, M.A., Zhang, S. (2016). Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of IEEE International Conference on Intelligent Systems Engineering (ICISE), pp. 372–379.
    • (2016) , pp. 372-379
    • Ullah, K.1    Shah, M.A.2    Zhang, S.3
  • 40
    • 84863085349 scopus 로고    scopus 로고
    • Decision-cache based XACML authorisation and anonymisation for XML documents
    • Ulltveit-Moe, N., Oleshchuk, V., Decision-cache based XACML authorisation and anonymisation for XML documents. Computer Standards Interfaces 34:6 (2012), 527–534.
    • (2012) Computer Standards Interfaces , vol.34 , Issue.6 , pp. 527-534
    • Ulltveit-Moe, N.1    Oleshchuk, V.2
  • 41
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things - new security and privacy challenges
    • Weber, R.H., Internet of things - new security and privacy challenges. Computer Law Security Review 26:1 (2010), 23–30.
    • (2010) Computer Law Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 42
    • 79955663408 scopus 로고    scopus 로고
    • An innovative simulation environment for cross-domain policy enforcement
    • Wu, Z., Wang, L., An innovative simulation environment for cross-domain policy enforcement. Simulation Modelling Practice and Theory 19:7 (2011), 1558–1583.
    • (2011) Simulation Modelling Practice and Theory , vol.19 , Issue.7 , pp. 1558-1583
    • Wu, Z.1    Wang, L.2
  • 43
    • 84900834753 scopus 로고    scopus 로고
    • Ubiquitous data accessing method in iot-based information system for emergency medical services
    • Xu, B., Xu, L.D., Cai, H., Xie, C., Hu, J., Bu, F., Ubiquitous data accessing method in iot-based information system for emergency medical services. IEEE Transactions on Industrial Informatics 10:2 (2014), 1578–1586.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1578-1586
    • Xu, B.1    Xu, L.D.2    Cai, H.3    Xie, C.4    Hu, J.5    Bu, F.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.