Today: Thursday, 21 November 2024
-
Psychology
-
Advice
-
Educational Science
Investigating security strategies in pervasive healthcare
Volume 4, Issue 2, 2022, Pages 182 - 203
1 Master of Computer Software Engineering
Abstract :
Abstract The first step in examining security strategies in pervasive healthcare is cloud computing, because all of these strategies work based on these computations, so in the first step we need to complete our understanding of pervasive computing. In this article, we investigate all security strategies in pervasive healthcare, after identifying and then examine the security of these strategies in the science of pervasive healthcare against potential threats and dangers. We introduce all strategies in general and explain their advantages and disadvantages. Then we determine the advantages of each over the other and determine which strategy or suggestion can solve the shortcomings of the desired strategy.
Abstract The first step in examining security strategies in pervasive healthcare is cloud computing, because all of these strategies work based on these computations, so in the first step we need to complete our understanding of pervasive computing. In this article, we investigate all security strategies in pervasive healthcare, after identifying and then examine the security of these strategies in the science of pervasive healthcare against potential threats and dangers. We introduce all strategies in general and explain their advantages and disadvantages. Then we determine the advantages of each over the other and determine which strategy or suggestion can solve the shortcomings of the desired strategy.
Keywords :
pervasive healthcare, physiological values, MPEG-21I PMP, RFID, EPR
pervasive healthcare, physiological values, MPEG-21I PMP, RFID, EPR
-
790
-
363
-
2022/07/14
-
2022/07/14
-
2022/07/14