Al-Ghuraybi et al., 2024 - Google Patents
Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learningAl-Ghuraybi et al., 2024
- Document ID
- 4886491219363661595
- Author
- Al-Ghuraybi H
- AlZain M
- Soh B
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Abstract Medical Cyber-Physical Systems (MCPS) are increasingly prevalent in an era of rapid technological advancement. They hold significant importance for patients and healthcare professionals, as they leverage cyber-physical systems (CPS). These systems …
- 238000005516 engineering process 0 title abstract description 79
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
- G06F12/10—Address translation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sharma et al. | A comprehensive review on blockchain and Internet of Things in healthcare | |
| Ghadi et al. | The role of blockchain to secure internet of medical things | |
| Panwar et al. | A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud‐Based Data Lake | |
| CN105659238B (en) | Data driven mode for patient data exchange system | |
| Upadrista et al. | Secure data sharing with blockchain for remote health monitoring applications: a review | |
| Sai et al. | Internet of things-based e-health care: Key challenges and recommended solutions for future | |
| US12316610B1 (en) | Privacy network and unified trust model for privacy preserving computation and policy enforcement | |
| Al-Ghuraybi et al. | Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning | |
| Wani et al. | Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review | |
| Kumar et al. | A lightweight blockchain-based framework for medical cyber-physical system | |
| Sharma et al. | Healthify: a blockchain-based distributed application for health care | |
| Sujihelen | An efficient chain code for access control in hyper ledger fabric healthcare system | |
| Sathish et al. | RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications | |
| Sharma et al. | A secure blockchain framework for the internet of medical things | |
| Dalal et al. | Original Research Article A Blockchain-based secure Internet of Medical Things framework for smart healthcare | |
| Charyyev et al. | Modeling the adoption of internet of things in healthcare: A systems approach | |
| Ahmad Naqishbandi et al. | Secure blockchain-based mental healthcare framework:—a paradigm shift from traditional to advanced analytics | |
| Tyagi et al. | Blockchain for Enhancing Security and Privacy in the Smart Healthcare | |
| Othman et al. | Leveraging blockchain and IoMT for secure and interoperable electronic health records | |
| Mishra et al. | DiabeticChain: a novel blockchain approach for patient-centric diabetic data management | |
| Priyadharshini et al. | Intelligent patient monitoring through hybrid consensus algorithm based blockchain technology | |
| Kumari et al. | A manifesto for healthcare based blockchain: Research directions for the future generation | |
| Sasikumar et al. | Heart disease severity level identification system on Hyperledger consortium network | |
| Hakiri et al. | BlockCare: SDN-enabled blockchain framework for securing decentralized healthcare and precision medicine applications | |
| Elngar et al. | Data protection and privacy in healthcare: research and innovations |