Por favor, use este identificador para citar o enlazar este ítem:
10.1109/ACCESS.2023.3338170
Twittear
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | López Martínez, Antonio | - |
dc.contributor.author | Gil Pérez, Manuel | - |
dc.contributor.author | Ruiz-Martínez, Antonio | - |
dc.contributor.other | Facultades, Departamentos, Servicios y Escuelas::Departamentos de la UMU::Ingeniería de la Información y las Comunicaciones | es |
dc.date.accessioned | 2024-02-06T07:54:51Z | - |
dc.date.available | 2024-02-06T07:54:51Z | - |
dc.date.issued | 2023-11-30 | - |
dc.identifier.citation | IEEE Access, vol. 11, pp. 137083-137098, 2023 | - |
dc.identifier.issn | 2169-3536 (electrónico) | - |
dc.identifier.uri | http://hdl.handle.net/10201/138683 | - |
dc.description | ©<2023>. This manuscript version is made available under the CC-BY license http://creativecommons.org/licenses/ccby /4.0/ This document is the Published, version of a Published Work that appeared in final form in [IEEE Access]. To access the final edited and published work see [https://doi.org/ 10.1109/ACCESS.2023.3338170] | - |
dc.description.abstract | The clinical environment is one of the most important sources of sensitive patient data in healthcare. These data have attracted cybercriminals who pursue the theft of this information for personal gain. Therefore, protecting these data is a critical issue. This paper focuses on an analysis of the clinical environment, presents its general ecosystem and stakeholders, and inspects the main protocols implemented between the clinical components from a security and privacy perspective. Additionally, this article defines a complete use case to describe the typical workflow within a clinical setting: the life cycle of a patient sample. Moreover, we present and categorize crucial clinical information and divide it into two sensitivity levels: High and Very Sensitive, while considering the severe risks of cybercriminal access. The threat model for the use case has also been identified, in conjunction with the use case’s security and privacy needs. This work served us as basis to develop the minimum security and privacy requirements to protect the use case. Accordingly, we have defined protection mechanisms for each sensitivity level with the enabling technologies needed to satisfy each requirement. Finally, the main challenges and future steps for the use case are presented. | es |
dc.format | application/pdf | es |
dc.format.extent | 16 | es |
dc.language | eng | es |
dc.publisher | IEEE | es |
dc.relation | This work has been partially funded by the strategic project CDL-TALENTUM from the Spanish National Institute of Cybersecurity (INCIBE) and by the Recovery, Transformation and Resilience Plan, Next Generation EU | es |
dc.rights | info:eu-repo/semantics/openAccess | es |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Clinical scenario | - |
dc.subject | Patient data | - |
dc.subject | Threat model | - |
dc.subject | Threat model | - |
dc.subject | Privacy | - |
dc.subject | Security | - |
dc.title | A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario | es |
dc.type | info:eu-repo/semantics/article | es |
dc.identifier.doi | 10.1109/ACCESS.2023.3338170 | - |
Aparece en las colecciones: | Artículos: Ingeniería de la Información y las Comunicaciones |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
P04-A Comprehensive Model for Securing Sensitive Patient Data in a Clinical Scenario-2023.pdf | 2,76 MB | Adobe PDF | Visualizar/Abrir |
Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons