JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service
Kim, Donghyun; Kim, Seoksoo;
  PDF(new window)
 Abstract
The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.
 Keywords
Key Management;Health Information;Ubiquitous Healthcare;Key Tree;Information Security;
 Language
Korean
 Cited by
1.
ICT와 인성교육 융합 프로그램 개발 및 수업설계,이명숙;장진영;

디지털융복합연구, 2016. vol.14. 9, pp.9-18 crossref(new window)
2.
일 상급종합병원 의료서비스 불만족 내용의 의료 융합적 분석,김정숙;엄애현;유문숙;

한국융합학회논문지, 2016. vol.7. 5, pp.117-125 crossref(new window)
3.
의료정보처리를 위한 시스템 개선에 관한 연구,유진호;

디지털융복합연구, 2016. vol.14. 11, pp.283-288 crossref(new window)
4.
국민건강영양조사를 활용한 대사증후군 유병 예측모형 개발을 위한 융복합 연구: 데이터마이닝을 활용하여,김한결;최근호;임성원;이현실;

디지털융복합연구, 2016. vol.14. 2, pp.325-332 crossref(new window)
5.
코드 분할 다중화 방식을 이용한 체내삽입장치의 안전한 생체 정보 전달 기법,정윤수;

디지털융복합연구, 2016. vol.14. 3, pp.235-241 crossref(new window)
6.
일부도시 입원 아동 부모의 건강정보원에 대한 신뢰도와 전자 건강문해력이 건강정보지향에 미치는 영향,김경자;이인숙;

디지털융복합연구, 2016. vol.14. 6, pp.295-307 crossref(new window)
7.
체육과 표현활동 영역 창의·인성 성취기준 개발,홍희정;

디지털융복합연구, 2016. vol.14. 6, pp.519-525 crossref(new window)
8.
축산분야와 ICT 융합을 통한 한우 원격진료방안,구지희;이상락;

디지털융복합연구, 2016. vol.14. 12, pp.217-224 crossref(new window)
9.
효과적인 암환자 관리를 위한 개인건강기록 관리 시스템,송제민;서성보;신문선;한혜숙;박정석;류근호;

디지털융복합연구, 2016. vol.14. 12, pp.65-72 crossref(new window)
1.
Medical Convergence Analysis of Complaint about Medical Service in an Affiliated Hospital, Journal of the Korea Convergence Society, 2016, 7, 5, 117  crossref(new windwow)
2.
Telemedicine System for Korean Beef Cattle Converging Livestock Farming Practices & ICT, Journal of Digital Convergence, 2016, 14, 12, 217  crossref(new windwow)
3.
The influence of health information source credibility and e health literacy on health information orientation of parents of local hospitalized children, Journal of Digital Convergence, 2016, 14, 6, 295  crossref(new windwow)
4.
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates, Symmetry, 2016, 8, 11, 129  crossref(new windwow)
5.
Development of Prediction Model for Prevalence of Metabolic Syndrome Using Data Mining: Korea National Health and Nutrition Examination Study, Journal of Digital Convergence, 2016, 14, 2, 325  crossref(new windwow)
6.
Secure biometric information delivery scheme of implantable device using code-division multiplexing method, Journal of Digital Convergence, 2016, 14, 3, 235  crossref(new windwow)
7.
Program Develope and Class Design for Convergence ICT and Character Education, Journal of Digital Convergence, 2016, 14, 9, 9  crossref(new windwow)
8.
Personal Health Record System for Efficient Monitoring of Cancer Therapy, Journal of Digital Convergence, 2016, 14, 12, 65  crossref(new windwow)
9.
Development achievement criteria of Creativity and Personality in Expressive Activity, Journal of Digital Convergence, 2016, 14, 6, 519  crossref(new windwow)
 References
1.
A. Berler, S. Pavlopoulos, D. Koutsouris, "Design of an interoperability framework in a regional healthcare system", In:Proceedings of Engineering in Medicine and Biology Society, Vol. 2, pp. 3093-3096, 2004.

2.
R. Heeks, "Health information systems: Failure, success and improvisation", International journal of medical informatics Vol. 75, No. 2, pp. 125-137, 2006. crossref(new window)

3.
S.K. Katsikas, "Health care management and information systems security:awareness, training or education", In:Int. J.Med. Informatics 60, pp. 129-135, 2000. crossref(new window)

4.
S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", In:ACM Computing Surveys 35, Vol. 3, pp. 309-329, 2003. crossref(new window)

5.
T. Rindfleisch, "Privacy, information technology, and health care", In:Communications of the ACM, Vol. 40, No. 8, pp. 92-100, 1997.

6.
J. Bohn, F. Gartner, H. Vogt, Dependability Issues of Pervasive Computing in a Healthcare Environment", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol.2802, pp.53-70, 2004. crossref(new window)

7.
S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2004.

8.
Y.B. Kim, M. Kim, Y.J. Lee, "COSMOS: a middleware platform for sensor networks and a u-healthcare service", Proceedings of the 2008 ACM symposium on Applied computing. pp. 512-513, 2008.

9.
L. Zhang, B. Chu, "A Role-Based Delegation Framework for Healthcare Information Systems", In:ACM Symposium on Access Control Models And Technologies(SACMAT), pp. 125-134, 2002.

10.
C. Wong, M. Gouda, S. Lam, "Secure group communications using key graphs, Networking", IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, 1998.

11.
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "A Novel Architecture for Efficient Key Management in Humanware Applications", In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918-1922, 2009.

12.
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "TIMAR: an efficient key management scheme for ubiquitous health care environments", In:Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom, p. 33, 2009.

13.
J.S. Shapiro, G. Kuperman, Health information exchange." Medical informatics: An executive primer, (Ed. Ong, KR) Healthcare Information & Management Systems Society, pp. 147-16, 2011.

14.
M. Das, A. Saxena, V. Gulati, D. Phatak, "Hierarchical key management scheme using polynomial interpolation", SIGOPS Operational Systematic Review, Vol. 39, No. 1, pp. 40-47, 2005. crossref(new window)

15.
D. Dolev, A.C. Yao, On the security of public key protocols." Information Theory, IEEE Transactions on, Vol. 29, No. 2, pp. 198-208, 1983.