Research Article
Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare
@INPROCEEDINGS{10.4108/icst.collaboratecom.2013.254212, author={Julian Jang-Jaccard and Jane Li and Surya Nepal and Leila Alem}, title={Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare}, proceedings={The 8th IEEE International Workshop on Trusted Collaboration}, publisher={ICST}, proceedings_a={TRUSTCOL}, year={2013}, month={11}, keywords={mobile devices security analysis health applications collaboration}, doi={10.4108/icst.collaboratecom.2013.254212} }
- Julian Jang-Jaccard
Jane Li
Surya Nepal
Leila Alem
Year: 2013
Security Analysis of Mobile Applications: A Case Study of a Collaboration Tool in Healthcare
TRUSTCOL
ICST
DOI: 10.4108/icst.collaboratecom.2013.254212
Abstract
Mobile-based collaboration tools are increasingly used for communication and information sharing in delivering healthcare services that need collaboration across different geographical locations. Some of the typical features found in the collaboration tools include video conferencing facility, images/documents exchange in real-time, and annotations to point and draw on shared rich media content. Though the innovations and conveniences of such collaboration tools are well understood, security implications of such systems are often overlooked. As a result, necessary security mechanisms are not supported by them. This can lead to serious security threats and privacy violations. In this paper, we first present a collaboration tool which was developed to facilitate the collaborations among health care providers using pervasive mobile devices for delivering health services to remote and regional areas. We provide a comprehensive security analysis of the tool. The aim of the analysis is to understand a variety of end-to-end security mechanisms needed in different layers of the system. We also provide security recommendations which can improve the overall security of the system.