About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Conference on Pervasive Computing Technologies for Healthcare

Research Article

Privacy Preserving Trust Negotiation for Pervasive Healthcare

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/PCTHEALTH.2006.361626,
        author={Changyu  Dong and Naranker  Dulay},
        title={Privacy Preserving Trust Negotiation for Pervasive Healthcare},
        proceedings={1st International ICST Conference on Pervasive Computing Technologies for Healthcare},
        publisher={IEEE},
        proceedings_a={PERVASIVEHEALTH},
        year={2007},
        month={5},
        keywords={Access protocols  Biomedical monitoring  Java  Medical services  Mobile handsets  Patient monitoring  Privacy  Remote monitoring  Security  Sensor systems},
        doi={10.1109/PCTHEALTH.2006.361626}
    }
    
  • Changyu Dong
    Naranker Dulay
    Year: 2007
    Privacy Preserving Trust Negotiation for Pervasive Healthcare
    PERVASIVEHEALTH
    IEEE
    DOI: 10.1109/PCTHEALTH.2006.361626
Changyu Dong1,*, Naranker Dulay1,*
  • 1: Department of Computing, Imperial College London, London, UK SW7 2AZ
*Contact email: cd04@doc.ic.ac.uk, nd@doc.ic.ac.uk

Abstract

Healthcare systems are being extended to monitor patients with body sensors wirelessly linked to a mobile phone that interacts with remote healthcare services and staff. As such systems become more widespread, with multiple healthcare providers and security domains, the establishment of trust between users, providers and medical staff will become important. In this paper we implement the ETTG privacy-preserving trust negotiation protocol and show how it can be used to automatically establish mutual trust between interacting parties in compliance with access-control and disclosure policies. The protocol is implemented in Java and can be run on J2ME platforms. The trust negotiation steps are logged and the resulting trust graphs can be visualised to show how policy compliance was achieved. We also develop a new easier-to-understand syntax for ETTG and use it to define access-control and disclosure policies for a small pervasive healthcare scenario

Keywords
Access protocols Biomedical monitoring Java Medical services Mobile handsets Patient monitoring Privacy Remote monitoring Security Sensor systems
Published
2007-05-21
Publisher
IEEE
Modified
2011-11-08
http://dx.doi.org/10.1109/PCTHEALTH.2006.361626
Copyright © 2006–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL