Today: Thursday, 31 October 2024
INTERNATIONAL STANDARD SERIAL NUMBER

INTERNATIONAL CENTER

Investigating security strategies in pervasive healthcare
Volume 4, Issue 2, 2022, Pages 182 - 203
Author(s) : Hamed Yarahmadi* 1

1 Master of Computer Software Engineering

Abstract :
Abstract The first step in examining security strategies in pervasive healthcare is cloud computing, because all of these strategies work based on these computations, so in the first step we need to complete our understanding of pervasive computing. In this article, we investigate all security strategies in pervasive healthcare, after identifying and then examine the security of these strategies in the science of pervasive healthcare against potential threats and dangers. We introduce all strategies in general and explain their advantages and disadvantages. Then we determine the advantages of each over the other and determine which strategy or suggestion can solve the shortcomings of the desired strategy.
Keywords :
pervasive healthcare, physiological values, MPEG-21I PMP, RFID, EPR
online support through WhatsApp

Dear researchers, we answer your questions through WhatsApp!


Click here to send a message on WhatsApp!