Team for Research in
Ubiquitous Secure Technology

A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare
Weider D. Yu, Sriram Mudumbi, Roopa Gummadikayala

Citation
Weider D. Yu, Sriram Mudumbi, Roopa Gummadikayala. "A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare". Proceedings of the 10th IEEE International Conference on e-Health Networking, Applications and Services(HEALTHCOM), IEEE Computer Society, July, 2008.

Abstract
The framework provides various layers of security and privacy controls to access the patient information. It also maintains security levels both at system level and user level to constrain any attacks on the system. Data on the mobile device also is protected from being tampered or hacked using password protections and encryption. This application framework demonstrates a multi-tiered SOA (Service Oriented Architecture) involving Mobile client, Web services, Security Agents, business logic layer, data access layer and database in secured environments. This framework uses SAML (Security Assertion Markup Language) security assertions for exchanging the secured user identification information between the server and mobile clients.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Weider D. Yu, Sriram Mudumbi, Roopa Gummadikayala. <a
    href="http://www.truststc.org/pubs/433.html" >A
    Web-Based Wireless Mobile System Design of Security and
    Privacy Framework for u-Healthcare</a>, Proceedings of
    the 10th IEEE International Conference on e-Health
    Networking, Applications and Services(HEALTHCOM), IEEE
    Computer Society, July, 2008.
  • Plain text
    Weider D. Yu, Sriram Mudumbi, Roopa Gummadikayala. "A
    Web-Based Wireless Mobile System Design of Security and
    Privacy Framework for u-Healthcare". Proceedings of the
    10th IEEE International Conference on e-Health Networking,
    Applications and Services(HEALTHCOM), IEEE Computer Society,
    July, 2008.
  • BibTeX
    @inproceedings{YuMudumbiGummadikayala08_WebBasedWirelessMobileSystemDesignOfSecurityPrivacy,
        author = {Weider D. Yu and Sriram Mudumbi and Roopa
                  Gummadikayala},
        title = {A Web-Based Wireless Mobile System Design of
                  Security and Privacy Framework for u-Healthcare},
        booktitle = {Proceedings of the 10th IEEE International
                  Conference on e-Health Networking, Applications
                  and Services(HEALTHCOM)},
        organization = {IEEE Computer Society},
        month = {July},
        year = {2008},
        abstract = {The framework provides various layers of security
                  and privacy controls to access the patient
                  information. It also maintains security levels
                  both at system level and user level to constrain
                  any attacks on the system. Data on the mobile
                  device also is protected from being tampered or
                  hacked using password protections and encryption.
                  This application framework demonstrates a
                  multi-tiered SOA (Service Oriented Architecture)
                  involving Mobile client, Web services, Security
                  Agents, business logic layer, data access layer
                  and database in secured environments. This
                  framework uses SAML (Security Assertion Markup
                  Language) security assertions for exchanging the
                  secured user identification information between
                  the server and mobile clients.},
        URL = {http://www.truststc.org/pubs/433.html}
    }
    

Posted by Weider D. Yu on 19 Aug 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.