Browse > Article

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System  

Noh, Si Choon (남서울대학교 컴퓨터학과)
Publication Information
Abstract
All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.
Keywords
Security Risk Assessment; Model Design; 5 Layers; u-Healthcare System; USN;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sensor Networks for Medical Care, Victor Shnayder, Bor-rong Chen, Konrad Lorincz, Thaddeus R. F. Fulford-Jones, and Matt Welsh. Harvard University Technical Report TR-08-05, April 2005.
2 Sichoon, Noh, Dong Chun Lee, "Assurance Method of HGigh Availability in Information Security Infrastructure System", SCIE LNCS 3794, 2005.12
3 Sichoon,Noh, "Building of an Integrated Multilevel Virus Protection Infrastructure", IEEE Computeer Society, 2005.12.
4 Sichoon,Noh, "A Securing Method of Multispectral Protection Infrastructure for Malicious Trafficin Intrne System", DCS, 2006.02
5 Sensor Networks for Emergency Response: Challenges and Opportunities, Konrad Lorincz, David Malan, Thaddeus R. F. Fulford-Jones, Alan Nawoj, Antony Clavel, Victor Shnayder, Geoff Mainland, Steve Moulton, and Matt Welsh. In IEEE Pervasive Computing, Special Issueon Pervasive Computing for First Response, Oct-Dec. 2004.
6 A Portable, Low-Power, Wireless Two-Lead EKG System, Thaddeus R. F. Fulford-Jones, Gu-Yeon Wei, and Matt Welsh. In Proceedings of The 26th IEEE EMBS Annual International Conference, San Francisco, September 2004.
7 Biomedical telemedicine - CSCI E-170 January 11, 2005
8 Healthwear: Medical Technology Becomes Wearable - 2004 IEEE
9 Perrig, A., Stankovic, J., and Wagner, D. 2004. Security in wireless sensor networks. Commun, ACM 47, 6 (Jun. 2004), 53-57