A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medical device and patient information allows efficient forensic analysis in cases of adverse events or attacks on interoperable medical devices. A secure logger as such must meet requirements of confidentiality and integrity of message logs and provide tamper-detection and tamper-evidence. In this paper, we propose a design for such a cloud-based secure logger using the Intel Software Guard Extensions (SGX) and the Trusted Platform Module (TPM). The proposed logger receives medical device information from a dongle attached to a medical device. The logger relies on SGX, TPM and standard encryption to maintain a secure communication channel even on...
Many hospitals and medical clinics have been using a wearable sensor in its health care system becau...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
Secure storage for medical data when using cloud systems is a problem of high importance to healthca...
Medical information systems facilitate ambulatory patient care, and increase safer and more intellig...
Medical devices have been changing in revolutionary ways in recent years. One is in their form-facto...
A Log records are very important information which is related to activities of systems, applications...
與國外學者合著 Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
Users in a datacenter or cloud system, including privileged users (e.g., root-level users), should b...
The Internet of Medical Things (IoMT) is widely known as the worldwide network of interconnected hea...
Many hospitals and medical clinics have been using a wearable sensor in its health care system becau...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medic...
As devices in the Internet of Things (IoT) increase in number and integrate with everyday lives, lar...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
Secure storage for medical data when using cloud systems is a problem of high importance to healthca...
Medical information systems facilitate ambulatory patient care, and increase safer and more intellig...
Medical devices have been changing in revolutionary ways in recent years. One is in their form-facto...
A Log records are very important information which is related to activities of systems, applications...
與國外學者合著 Design of a secure and effective medical cyber-physical system for ubiquitous telemonitoring...
In View Of The Fact That Log Files Hold Record Of Most System Events Including User Activities They ...
After two recent security attacks against implantable medical devices (IMDs) have been reported, the...
Users in a datacenter or cloud system, including privileged users (e.g., root-level users), should b...
The Internet of Medical Things (IoMT) is widely known as the worldwide network of interconnected hea...
Many hospitals and medical clinics have been using a wearable sensor in its health care system becau...
Part 3: Trusted ExecutionInternational audienceRemote mobile and embedded devices are used to delive...
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared...