Today: Thursday, 25 April 2024
Investigating security strategies in pervasive healthcare
دوره 4، شماره 2، 2022، صفحات 182 - 203
نویسندگان : Hamed Yarahmadi * 1

1 Master of Computer Software Engineering

چکیده :
Abstract The first step in examining security strategies in pervasive healthcare is cloud computing, because all of these strategies work based on these computations, so in the first step we need to complete our understanding of pervasive computing. In this article, we investigate all security strategies in pervasive healthcare, after identifying and then examine the security of these strategies in the science of pervasive healthcare against potential threats and dangers. We introduce all strategies in general and explain their advantages and disadvantages. Then we determine the advantages of each over the other and determine which strategy or suggestion can solve the shortcomings of the desired strategy.
کلمات کلیدی :
pervasive healthcare, physiological values, MPEG-21I PMP, RFID, EPR
online support through WhatsApp

Dear researchers, we answer your questions through WhatsApp!


Click here to send a message on WhatsApp!