Indian Journal of Science and Technology
DOI: 10.17485/ijst/2015/v8i25/85945
Year: 2015, Volume: 8, Issue: 25, Pages: 1-6
Original Article
Junghan Lee1 , Joon Tae Ahn1 , Myung Gon Kim1 , Su Jin Park1 , Gil Hong Park1 , Dong Min Kim2*
1 Department of Biochemistry and Molecular Biology, College of Medicine, Korea University, Korea
2 Department of Creative Arts Therapy, College of Medical Science, Jeonju University, Korea
The present study aimed to develop a security evaluation methodology and criteria for a ubiquitous healthcare (u health) system. For this purpose, first, we classified the components of a u-health system. Second, security core technologies were selected that could be applied to a u-health system in three aspects, such as administrative safeguards dealing with the operator, policies, documents, systems, and user education, physical safeguards, dealing with control of entrance and exit, and screens or shared instruments, and technical safeguards, dealing with computer system-related technological elements. Then, each security core technology was assigned to each component of a u-health system, and the relative significance of each was determined. Finally, a methodology and criteria for the evaluation of security and privacy were developed. In conclusion, the outcome can be used for enhancing the security level in the design of a u-health system and setting authentication standards for authorization processes for security.
Keywords: Authentication Criteria, Personal Medical Information, Privacy, Security, Test Methodology, U-Health System
Subscribe now for latest articles and news.