+

Al-Ghuraybi et al., 2024 - Google Patents

Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning

Al-Ghuraybi et al., 2024

Document ID
4886491219363661595
Author
Al-Ghuraybi H
AlZain M
Soh B
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Abstract Medical Cyber-Physical Systems (MCPS) are increasingly prevalent in an era of rapid technological advancement. They hold significant importance for patients and healthcare professionals, as they leverage cyber-physical systems (CPS). These systems …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/08Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
    • G06F12/10Address translation

Similar Documents

Publication Publication Date Title
Sharma et al. A comprehensive review on blockchain and Internet of Things in healthcare
Ghadi et al. The role of blockchain to secure internet of medical things
Panwar et al. A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud‐Based Data Lake
CN105659238B (en) Data driven mode for patient data exchange system
Upadrista et al. Secure data sharing with blockchain for remote health monitoring applications: a review
Sai et al. Internet of things-based e-health care: Key challenges and recommended solutions for future
US12316610B1 (en) Privacy network and unified trust model for privacy preserving computation and policy enforcement
Al-Ghuraybi et al. Ensuring authentication in Medical Cyber-Physical Systems: A comprehensive literature review of blockchain technology integration with machine learning
Wani et al. Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review
Kumar et al. A lightweight blockchain-based framework for medical cyber-physical system
Sharma et al. Healthify: a blockchain-based distributed application for health care
Sujihelen An efficient chain code for access control in hyper ledger fabric healthcare system
Sathish et al. RETRACTED ARTICLE: A survey on Blockchain mechanisms (BCM) based on internet of things (IoT) applications
Sharma et al. A secure blockchain framework for the internet of medical things
Dalal et al. Original Research Article A Blockchain-based secure Internet of Medical Things framework for smart healthcare
Charyyev et al. Modeling the adoption of internet of things in healthcare: A systems approach
Ahmad Naqishbandi et al. Secure blockchain-based mental healthcare framework:—a paradigm shift from traditional to advanced analytics
Tyagi et al. Blockchain for Enhancing Security and Privacy in the Smart Healthcare
Othman et al. Leveraging blockchain and IoMT for secure and interoperable electronic health records
Mishra et al. DiabeticChain: a novel blockchain approach for patient-centric diabetic data management
Priyadharshini et al. Intelligent patient monitoring through hybrid consensus algorithm based blockchain technology
Kumari et al. A manifesto for healthcare based blockchain: Research directions for the future generation
Sasikumar et al. Heart disease severity level identification system on Hyperledger consortium network
Hakiri et al. BlockCare: SDN-enabled blockchain framework for securing decentralized healthcare and precision medicine applications
Elngar et al. Data protection and privacy in healthcare: research and innovations
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载