Healthcare Networks: Architecture, Security, and Recent Developments
VerifiedAdded on  2023/06/05
|13
|2923
|142
AI Summary
This report discusses about network architecture of the healthcare system. Various developments in the healthcare networks and importance of security have been discussed in the report. This report outlines solutions to the threats in the healthcare networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: Healthcare networks
Healthcare Networks
Name of the Student
Name of the University
Author’s Note
Healthcare Networks
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2
HEALTHCARE NETWORKS
Table of Contents
Introduction......................................................................................................................................3
Architecture of healthcare network.................................................................................................3
Recent developments in healthcare networks..................................................................................5
Importance of Security in Healthcare networks..............................................................................6
Possible security issues....................................................................................................................7
Solutions..........................................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
HEALTHCARE NETWORKS
Table of Contents
Introduction......................................................................................................................................3
Architecture of healthcare network.................................................................................................3
Recent developments in healthcare networks..................................................................................5
Importance of Security in Healthcare networks..............................................................................6
Possible security issues....................................................................................................................7
Solutions..........................................................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
3
HEALTHCARE NETWORKS
Introduction
Healthcare industry has been one of the most important sector in the world. Healthcare
services are required by most of the individual in the world. Integration of IT in the healthcare
has been a great step towards the development of the industry. Modern healthcare systems are far
better than traditional healthcare systems. A network system in the healthcare system has been
playing an evident role in the healthcare system. However, there have been threats and risks in
the networking system of the healthcare industry.
This report discusses about network architecture of the healthcare system. Various
developments in the healthcare networks and importance of security have been discussed in the
report. This report outlines solutions to the threats in the healthcare networks.
Architecture of healthcare network
A proposed healthcare network architecture has been discussed below:
HEALTHCARE NETWORKS
Introduction
Healthcare industry has been one of the most important sector in the world. Healthcare
services are required by most of the individual in the world. Integration of IT in the healthcare
has been a great step towards the development of the industry. Modern healthcare systems are far
better than traditional healthcare systems. A network system in the healthcare system has been
playing an evident role in the healthcare system. However, there have been threats and risks in
the networking system of the healthcare industry.
This report discusses about network architecture of the healthcare system. Various
developments in the healthcare networks and importance of security have been discussed in the
report. This report outlines solutions to the threats in the healthcare networks.
Architecture of healthcare network
A proposed healthcare network architecture has been discussed below:
4
HEALTHCARE NETWORKS
Figure1: Proposed healthcare network architecture
(Source: [1])
The above diagram refers to a network architecture that help in connecting various
computers and users within a network. This network architecture has been prepared for
scalability and flexibility in use. Cisco architectural approach has been used in designing this
network [2]. Therefore, all the guidelines and security protocol have been added in this security
network architecture. Each structural component have been connected in a specific topology and
communication has been done through logical interfaces. The customer segment has a grounds
arrange topology, pleasing an expansive access organize, every one of the end terminals having
particular programming running. Through the graphical UI of this product, access to medicinal
assets is conceded in view of client consents [3]. The assets are situated at the server site. This
auxiliary segment has a server cultivate topology and contains a Domain Controller that oversees
clients and a database server that holds the real assets. The customer and server destinations are
interconnected through the Framework segment that comprises of portals that total outbound
activity from every one of the locales. This segment guarantees information security of the
activity passing through either open or private systems.
This network architecture contains routers, servers, computers, switches, external devices
and firewall. Routers have been playing an important role in connecting other components
through wireless connection. The server of the healthcare network has been secured by a strong
firewall. Firewall is a software that helps in restricting harmful viruses and malwares from
entering and attacking the server of the network [4]. Firewall helps in detecting viruses and
removing them from network. Therefore, all data and information stored in the server has been
secured properly.
HEALTHCARE NETWORKS
Figure1: Proposed healthcare network architecture
(Source: [1])
The above diagram refers to a network architecture that help in connecting various
computers and users within a network. This network architecture has been prepared for
scalability and flexibility in use. Cisco architectural approach has been used in designing this
network [2]. Therefore, all the guidelines and security protocol have been added in this security
network architecture. Each structural component have been connected in a specific topology and
communication has been done through logical interfaces. The customer segment has a grounds
arrange topology, pleasing an expansive access organize, every one of the end terminals having
particular programming running. Through the graphical UI of this product, access to medicinal
assets is conceded in view of client consents [3]. The assets are situated at the server site. This
auxiliary segment has a server cultivate topology and contains a Domain Controller that oversees
clients and a database server that holds the real assets. The customer and server destinations are
interconnected through the Framework segment that comprises of portals that total outbound
activity from every one of the locales. This segment guarantees information security of the
activity passing through either open or private systems.
This network architecture contains routers, servers, computers, switches, external devices
and firewall. Routers have been playing an important role in connecting other components
through wireless connection. The server of the healthcare network has been secured by a strong
firewall. Firewall is a software that helps in restricting harmful viruses and malwares from
entering and attacking the server of the network [4]. Firewall helps in detecting viruses and
removing them from network. Therefore, all data and information stored in the server has been
secured properly.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5
HEALTHCARE NETWORKS
Recent developments in healthcare networks
There has been various development on the healthcare network in recent years. The up
gradation in technology have been helping in enhancing healthcare services in the industry. The
e-human services framework that we have created is based on the GSM Networks. It gives all
around characterized interfaces to customer applications and isolates the interfaces from their
executions [5]. It permits benefit abilities and interfaces to be actualized as an accumulation of
procedures. GSM Systems give higher data transfer capacity of transmission and high clearness
to speak with the doctor's PDA. The Service Functionality of our e-social insurance framework
comprises of three layers as appeared in Figure 1. The best layer gives the Web Services
interfaces. The base layer contains the human services administrations. The Services Coordinator
inside the center layer controls the stream of messages in the framework from the Web Services
interfaces to the social insurance administrations and the other way around. The GSM
engineering which is outlined in our methodology gives measured help and interoperability over
the distinctive Networks and stages of fluctuating working framework.
Individual Health Information is secret, so access to such data must be confined to
confirmed and approved clients [6]. Secure transmission of such data must be supplemented with
secure capacity of the information. There has been an important corner for the security in
network architecture. System based applications have changed for all intents and purposes each
industry, and social insurance is no special case. Arrangements that enable access to electronic
therapeutic records (EMRs), restorative administration frameworks, imaging, biomedical data,
material administration, persistent bookkeeping, conceding data, and online cases entries are
getting to be typical in remote, wired, and versatile situations.
HEALTHCARE NETWORKS
Recent developments in healthcare networks
There has been various development on the healthcare network in recent years. The up
gradation in technology have been helping in enhancing healthcare services in the industry. The
e-human services framework that we have created is based on the GSM Networks. It gives all
around characterized interfaces to customer applications and isolates the interfaces from their
executions [5]. It permits benefit abilities and interfaces to be actualized as an accumulation of
procedures. GSM Systems give higher data transfer capacity of transmission and high clearness
to speak with the doctor's PDA. The Service Functionality of our e-social insurance framework
comprises of three layers as appeared in Figure 1. The best layer gives the Web Services
interfaces. The base layer contains the human services administrations. The Services Coordinator
inside the center layer controls the stream of messages in the framework from the Web Services
interfaces to the social insurance administrations and the other way around. The GSM
engineering which is outlined in our methodology gives measured help and interoperability over
the distinctive Networks and stages of fluctuating working framework.
Individual Health Information is secret, so access to such data must be confined to
confirmed and approved clients [6]. Secure transmission of such data must be supplemented with
secure capacity of the information. There has been an important corner for the security in
network architecture. System based applications have changed for all intents and purposes each
industry, and social insurance is no special case. Arrangements that enable access to electronic
therapeutic records (EMRs), restorative administration frameworks, imaging, biomedical data,
material administration, persistent bookkeeping, conceding data, and online cases entries are
getting to be typical in remote, wired, and versatile situations.
6
HEALTHCARE NETWORKS
Importance of Security in Healthcare networks
Today, social insurance frameworks can blend these instruments into one framework to
all the more adequately convey and team up, lessen mistakes, and enhance persistent
consideration and proficiency. This outcomes in lower cost for understanding consideration. As
social insurance suppliers embrace new innovations, they additionally confront new security
dangers. Hackers, PC infections, offended representatives, and human blunder present genuine
threats to medicinal services systems [7]. Luckily, most security ruptures can be avoided, and
there are various arrange security devices accessible that are anything but difficult to send and
utilize.
The Cisco Medical Review Network is one of a kind in its capacity to give finish
protection to data, applications, and administrations. Security must be viewed as a procedure, not
an item based point arrangement. The initial step an association should take to build up a
protected system foundation is to build up a formal security strategy to characterize the jobs,
duties, worthy utilize, and security hones. In the wake of building up the arrangement, the
association should then screen and survey, utilizing built up best practices as a benchmark [10].
Suppliers ought to nearly look at and test their system foundations to recognize potential
vulnerabilities, including physical security, to set up a weakness/hazard network. Medical
institution over the world have been implementing technology in their systems for developing in
the market. Healthcare information systems (HIS) have been helping in maintaining the security
of data and information stored over the healthcare network [1]. Internet facility have been
creating a revolution in the industry by connecting various number of computers within a
network. The up degree in innovation have been helping in upgrading social insurance benefits
in the business. The e-human administrations structure that we have made depends on the GSM
HEALTHCARE NETWORKS
Importance of Security in Healthcare networks
Today, social insurance frameworks can blend these instruments into one framework to
all the more adequately convey and team up, lessen mistakes, and enhance persistent
consideration and proficiency. This outcomes in lower cost for understanding consideration. As
social insurance suppliers embrace new innovations, they additionally confront new security
dangers. Hackers, PC infections, offended representatives, and human blunder present genuine
threats to medicinal services systems [7]. Luckily, most security ruptures can be avoided, and
there are various arrange security devices accessible that are anything but difficult to send and
utilize.
The Cisco Medical Review Network is one of a kind in its capacity to give finish
protection to data, applications, and administrations. Security must be viewed as a procedure, not
an item based point arrangement. The initial step an association should take to build up a
protected system foundation is to build up a formal security strategy to characterize the jobs,
duties, worthy utilize, and security hones. In the wake of building up the arrangement, the
association should then screen and survey, utilizing built up best practices as a benchmark [10].
Suppliers ought to nearly look at and test their system foundations to recognize potential
vulnerabilities, including physical security, to set up a weakness/hazard network. Medical
institution over the world have been implementing technology in their systems for developing in
the market. Healthcare information systems (HIS) have been helping in maintaining the security
of data and information stored over the healthcare network [1]. Internet facility have been
creating a revolution in the industry by connecting various number of computers within a
network. The up degree in innovation have been helping in upgrading social insurance benefits
in the business. The e-human administrations structure that we have made depends on the GSM
7
HEALTHCARE NETWORKS
Networks. It gives all around portrayed interfaces to client applications and detaches the
interfaces from their executions [8]. It grants advantage capacities and interfaces to be completed
as a collection of systems. GSM Systems give higher information exchange limit of transmission
and high clearness to talk with the researcher’s PDA. Therefore, a proper network architecture is
required for healthcare organizations for connecting with each other.
Possible security issues
As the usage proceeds with, suppliers should constantly assess every territory of
organize, decide potential dangers, and execute suitable safety efforts to alleviate them. Various
chances that the supplier does not have a specialized security master, Cisco and its qualified
accomplices can help with building up a suitable design that will meet the built up security
approaches of the human services association. Possible security issues have been discussed
below:
Denial of service attack: Maybe the most generally broadcasted type of assault, a DoS
can be started utilizing programs that are accessible on the Internet [15]. It centers around
making an administration inaccessible for ordinary utilize, regularly by depleting an asset on the
system, working framework, or application.
Man-in-the-middle attack: Hackers who approach bundles that move over a wired or
remote system can start a man-in-the-center assault [18]. Amid this assault, hackers seize a
system session to access private system assets, take data, or dissect activity to find out about a
system and its clients.
Viruses, Trojan horses, and worms: End-client PCs and workstations are particularly
powerless against infections and Trojan steed assaults. An infection is malignant programming
HEALTHCARE NETWORKS
Networks. It gives all around portrayed interfaces to client applications and detaches the
interfaces from their executions [8]. It grants advantage capacities and interfaces to be completed
as a collection of systems. GSM Systems give higher information exchange limit of transmission
and high clearness to talk with the researcher’s PDA. Therefore, a proper network architecture is
required for healthcare organizations for connecting with each other.
Possible security issues
As the usage proceeds with, suppliers should constantly assess every territory of
organize, decide potential dangers, and execute suitable safety efforts to alleviate them. Various
chances that the supplier does not have a specialized security master, Cisco and its qualified
accomplices can help with building up a suitable design that will meet the built up security
approaches of the human services association. Possible security issues have been discussed
below:
Denial of service attack: Maybe the most generally broadcasted type of assault, a DoS
can be started utilizing programs that are accessible on the Internet [15]. It centers around
making an administration inaccessible for ordinary utilize, regularly by depleting an asset on the
system, working framework, or application.
Man-in-the-middle attack: Hackers who approach bundles that move over a wired or
remote system can start a man-in-the-center assault [18]. Amid this assault, hackers seize a
system session to access private system assets, take data, or dissect activity to find out about a
system and its clients.
Viruses, Trojan horses, and worms: End-client PCs and workstations are particularly
powerless against infections and Trojan steed assaults. An infection is malignant programming
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8
HEALTHCARE NETWORKS
code that is appended to another program to execute an undesirable capacity on a client's PC
[13]. Trojan steed assaults are like infections, yet they mask the application to resemble
something unique. Worms are malignant duplicating programs.
Solutions
There are various solutions to these attacks. However, in this section solutions for
preventing virus, malwares and worms attack have been provided.
Antivirus software packages: These bundles counter most infection dangers, whenever
refreshed frequently and looked after effectively.
• Secure system foundation: Switches and switches have equipment and programming
highlights that help secure availability, edge security, interruption insurance, character
administrations, and security administration.
• Dedicated system security gadgets and programming: Tools, for example, firewalls are
basic for shielding inner frameworks from outside dangers over the Internet [14]. IDS
arrangements screen the system to identify and kill security breaks. Endpoint security
programming offers day-zero risk insurance for organize administrations what's more,
applications.
• Identity administrations: Authentication, approval, and bookkeeping administrations
help to recognize clients and control their exercises and exchanges on the system.
Administrations incorporate passwords, advanced endorsements, and computerized verification
keys.
• Encryption: Encryption guarantees that information cannot be blocked, messed with, or
on the other hand perused by anybody other than the approved beneficiary.
HEALTHCARE NETWORKS
code that is appended to another program to execute an undesirable capacity on a client's PC
[13]. Trojan steed assaults are like infections, yet they mask the application to resemble
something unique. Worms are malignant duplicating programs.
Solutions
There are various solutions to these attacks. However, in this section solutions for
preventing virus, malwares and worms attack have been provided.
Antivirus software packages: These bundles counter most infection dangers, whenever
refreshed frequently and looked after effectively.
• Secure system foundation: Switches and switches have equipment and programming
highlights that help secure availability, edge security, interruption insurance, character
administrations, and security administration.
• Dedicated system security gadgets and programming: Tools, for example, firewalls are
basic for shielding inner frameworks from outside dangers over the Internet [14]. IDS
arrangements screen the system to identify and kill security breaks. Endpoint security
programming offers day-zero risk insurance for organize administrations what's more,
applications.
• Identity administrations: Authentication, approval, and bookkeeping administrations
help to recognize clients and control their exercises and exchanges on the system.
Administrations incorporate passwords, advanced endorsements, and computerized verification
keys.
• Encryption: Encryption guarantees that information cannot be blocked, messed with, or
on the other hand perused by anybody other than the approved beneficiary.
9
HEALTHCARE NETWORKS
• Wireless security: Advanced verification and encryption apparatuses enable doctors to
get to quiet records with a remote tablet or PDA without the danger of unapproved clients
catching remote transmissions.
• VPNs: Virtual private systems give a profoundly secure, scrambled association over a
specialist organization arrange or the Internet [11]. They empower doctors to safely associate to
the system from essentially anyplace a remote doctor's facility or center, a meeting site, or on the
other hand even from home.
• Security administration: Includes the apparatuses for observing and looking after
security. It is the control component for the other building squares of a solid security
arrangement. Cisco compositional methodology has been utilized in outlining this system.
Subsequently, every one of the rules and security convention have been included this security
organize design. Each basic segment have been associated in a particular topology and
correspondence has been done through coherent interfaces. The client and server goals are
interconnected through the Framework section that contains entries that aggregate outbound
movement from each one of the areas [7]. This portion ensures data security of the movement
going through either open or private frameworks. There has been different improvement on the
social insurance organize lately.
Conclusion
It can be concluded that healthcare network have been developed from traditional
network architecture. The modern network architecture has been focused on security of data and
information. The client portion has a grounds orchestrate topology, satisfying an extensive access
compose, each one of the end terminals having specific programming running. Through the
HEALTHCARE NETWORKS
• Wireless security: Advanced verification and encryption apparatuses enable doctors to
get to quiet records with a remote tablet or PDA without the danger of unapproved clients
catching remote transmissions.
• VPNs: Virtual private systems give a profoundly secure, scrambled association over a
specialist organization arrange or the Internet [11]. They empower doctors to safely associate to
the system from essentially anyplace a remote doctor's facility or center, a meeting site, or on the
other hand even from home.
• Security administration: Includes the apparatuses for observing and looking after
security. It is the control component for the other building squares of a solid security
arrangement. Cisco compositional methodology has been utilized in outlining this system.
Subsequently, every one of the rules and security convention have been included this security
organize design. Each basic segment have been associated in a particular topology and
correspondence has been done through coherent interfaces. The client and server goals are
interconnected through the Framework section that contains entries that aggregate outbound
movement from each one of the areas [7]. This portion ensures data security of the movement
going through either open or private frameworks. There has been different improvement on the
social insurance organize lately.
Conclusion
It can be concluded that healthcare network have been developed from traditional
network architecture. The modern network architecture has been focused on security of data and
information. The client portion has a grounds orchestrate topology, satisfying an extensive access
compose, each one of the end terminals having specific programming running. Through the
10
HEALTHCARE NETWORKS
graphical UI of this item, access to restorative resources is yielded in perspective of customer
assents. The benefits are arranged at the server site. This helper fragment has a server develop
topology and contains a Domain Controller that manages customers and a database server that
holds the genuine resources.
HEALTHCARE NETWORKS
graphical UI of this item, access to restorative resources is yielded in perspective of customer
assents. The benefits are arranged at the server site. This helper fragment has a server develop
topology and contains a Domain Controller that manages customers and a database server that
holds the genuine resources.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11
HEALTHCARE NETWORKS
References
[1] Gope, Prosanta, and Tzonelih Hwang. "BSN-Care: A secure IoT-based modern
healthcare system using body sensor network." IEEE Sensors Journal 16, no. 5 (2016):
1368-1376.
[2] Zhang, Kuan, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo.
"Security and privacy for mobile healthcare networks: from a quality of protection
perspective." IEEE Wireless Communications 22, no. 4 (2015): 104-112.
[3] Mainanwal, Vikash, Mansi Gupta, and Shravan Kumar Upadhayay. "A survey on
wireless body area network: Security technology and its design methodology issue."
In Innovations in information, embedded and communication systems (ICIIECS), 2015
international conference on, pp. 1-5. IEEE, 2015.
[4] Kruse, Clemens Scott, Benjamin Frederick, Taylor Jacobson, and D. Kyle Monticone.
"Cybersecurity in healthcare: A systematic review of modern threats and
trends." Technology and Health Care 25, no. 1 (2017): 1-10.
[5] Moosavi, Sanaz Rahimi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir M. Rahmani, Seppo
Virtanen, Hannu Tenhunen, and Jouni Isoaho. "End-to-end security scheme for mobility
enabled healthcare Internet of Things." Future Generation Computer Systems 64 (2016):
108-124.
[6] Boddy, Aaron, William Hurst, Michael Mackay, and Abdennour El Rhalibi. "A study
into data analysis and visualisation to increase the cyber-resilience of healthcare
infrastructures." In Proceedings of the 1st International Conference on Internet of Things
and Machine Learning, p. 32. ACM, 2017.
HEALTHCARE NETWORKS
References
[1] Gope, Prosanta, and Tzonelih Hwang. "BSN-Care: A secure IoT-based modern
healthcare system using body sensor network." IEEE Sensors Journal 16, no. 5 (2016):
1368-1376.
[2] Zhang, Kuan, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo.
"Security and privacy for mobile healthcare networks: from a quality of protection
perspective." IEEE Wireless Communications 22, no. 4 (2015): 104-112.
[3] Mainanwal, Vikash, Mansi Gupta, and Shravan Kumar Upadhayay. "A survey on
wireless body area network: Security technology and its design methodology issue."
In Innovations in information, embedded and communication systems (ICIIECS), 2015
international conference on, pp. 1-5. IEEE, 2015.
[4] Kruse, Clemens Scott, Benjamin Frederick, Taylor Jacobson, and D. Kyle Monticone.
"Cybersecurity in healthcare: A systematic review of modern threats and
trends." Technology and Health Care 25, no. 1 (2017): 1-10.
[5] Moosavi, Sanaz Rahimi, Tuan Nguyen Gia, Ethiopia Nigussie, Amir M. Rahmani, Seppo
Virtanen, Hannu Tenhunen, and Jouni Isoaho. "End-to-end security scheme for mobility
enabled healthcare Internet of Things." Future Generation Computer Systems 64 (2016):
108-124.
[6] Boddy, Aaron, William Hurst, Michael Mackay, and Abdennour El Rhalibi. "A study
into data analysis and visualisation to increase the cyber-resilience of healthcare
infrastructures." In Proceedings of the 1st International Conference on Internet of Things
and Machine Learning, p. 32. ACM, 2017.
12
HEALTHCARE NETWORKS
[7] Bhatt, Chintan, Nilanjan Dey, and Amira S. Ashour, eds. "Internet of things and big data
technologies for next generation healthcare." (2017): 978-3.
[8] Fabian, Benjamin, Tatiana Ermakova, and Philipp Junghanns. "Collaborative and secure
sharing of healthcare data in multi-clouds." Information Systems 48 (2015): 132-150.
[9] Horster, Patrick, ed. Communications and Multimedia Security II. Springer, 2016.
[10] Moosavi, Sanaz Rahimi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia
Nigussie, Seppo Virtanen, Jouni Isoaho, and Hannu Tenhunen. "SEA: a secure and
efficient authentication and authorization architecture for IoT-based healthcare using
smart gateways." Procedia Computer Science 52 (2015): 452-459.
[11] Castiglione, Arcangelo, Raffaele Pizzolante, Alfredo De Santis, Bruno Carpentieri,
Aniello Castiglione, and Francesco Palmieri. "Cloud-based adaptive compression and
secure management services for 3D healthcare data." Future Generation Computer
Systems 43 (2015): 120-134.
[12] Hutton, Scott A., Kelly Vance, Jesse Burgard, Susan Grace, and Lynn Van Male.
"Workplace violence prevention standardization using lean principles across a healthcare
network." International journal of health care quality assurancejust-accepted (2018): 00-
00.
[13] Huang, C. Derrick, Ravi S. Behara, and Jahyun Goo. "Optimal information security
investment in a Healthcare Information Exchange: An economic analysis." Decision
Support Systems61 (2014): 1-11.
[14] Terry, Michael, and Ogbeide Derrick Oigiagbe. "A comprehensive security assessment
toolkit for healthcare systems." Colonial Academic Alliance Undergraduate Research
Journal 4, no. 6 (2015): 1-27.
HEALTHCARE NETWORKS
[7] Bhatt, Chintan, Nilanjan Dey, and Amira S. Ashour, eds. "Internet of things and big data
technologies for next generation healthcare." (2017): 978-3.
[8] Fabian, Benjamin, Tatiana Ermakova, and Philipp Junghanns. "Collaborative and secure
sharing of healthcare data in multi-clouds." Information Systems 48 (2015): 132-150.
[9] Horster, Patrick, ed. Communications and Multimedia Security II. Springer, 2016.
[10] Moosavi, Sanaz Rahimi, Tuan Nguyen Gia, Amir-Mohammad Rahmani, Ethiopia
Nigussie, Seppo Virtanen, Jouni Isoaho, and Hannu Tenhunen. "SEA: a secure and
efficient authentication and authorization architecture for IoT-based healthcare using
smart gateways." Procedia Computer Science 52 (2015): 452-459.
[11] Castiglione, Arcangelo, Raffaele Pizzolante, Alfredo De Santis, Bruno Carpentieri,
Aniello Castiglione, and Francesco Palmieri. "Cloud-based adaptive compression and
secure management services for 3D healthcare data." Future Generation Computer
Systems 43 (2015): 120-134.
[12] Hutton, Scott A., Kelly Vance, Jesse Burgard, Susan Grace, and Lynn Van Male.
"Workplace violence prevention standardization using lean principles across a healthcare
network." International journal of health care quality assurancejust-accepted (2018): 00-
00.
[13] Huang, C. Derrick, Ravi S. Behara, and Jahyun Goo. "Optimal information security
investment in a Healthcare Information Exchange: An economic analysis." Decision
Support Systems61 (2014): 1-11.
[14] Terry, Michael, and Ogbeide Derrick Oigiagbe. "A comprehensive security assessment
toolkit for healthcare systems." Colonial Academic Alliance Undergraduate Research
Journal 4, no. 6 (2015): 1-27.
13
HEALTHCARE NETWORKS
[15] Khan, Mobeen, Muhammad Taha Jilani, Muhammad Khalid Khan, and Maaz Bin
Ahmed. "A security framework for wireless body area network based smart healthcare
system." In International Conference for Young Researchers in Informatics, Mathematics
and Engineering,(ICYRIME), Kaunas, Lithuania, pp. 80-85. 2017.
[16] Bradai, Nourchène, Lamia Chaari Fourati, and Lotfi Kamoun. "WBAN data scheduling
and aggregation under WBAN/WLAN healthcare network." Ad Hoc Networks 25 (2015):
251-262.
[17] Zhang, Kuan, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin Sherman
Shen. "Security and privacy in smart city applications: Challenges and solutions." IEEE
Communications Magazine 55, no. 1 (2017): 122-129.
[18] Islam, SM Riazul, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain, and Kyung-
Sup Kwak. "The internet of things for health care: a comprehensive survey." IEEE
Access 3 (2015): 678-708.
HEALTHCARE NETWORKS
[15] Khan, Mobeen, Muhammad Taha Jilani, Muhammad Khalid Khan, and Maaz Bin
Ahmed. "A security framework for wireless body area network based smart healthcare
system." In International Conference for Young Researchers in Informatics, Mathematics
and Engineering,(ICYRIME), Kaunas, Lithuania, pp. 80-85. 2017.
[16] Bradai, Nourchène, Lamia Chaari Fourati, and Lotfi Kamoun. "WBAN data scheduling
and aggregation under WBAN/WLAN healthcare network." Ad Hoc Networks 25 (2015):
251-262.
[17] Zhang, Kuan, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin Sherman
Shen. "Security and privacy in smart city applications: Challenges and solutions." IEEE
Communications Magazine 55, no. 1 (2017): 122-129.
[18] Islam, SM Riazul, Daehan Kwak, MD Humaun Kabir, Mahmud Hossain, and Kyung-
Sup Kwak. "The internet of things for health care: a comprehensive survey." IEEE
Access 3 (2015): 678-708.
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.