Data Security and Privacy Challenges in Adopting Solutions for IOT

@article{Supriya2016DataSA,
  title={Data Security and Privacy Challenges in Adopting Solutions for IOT},
  author={S. Supriya and Sagar Padaki},
  journal={2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)},
  year={2016},
  pages={410-415}
}
  • S. Supriya, Sagar Padaki
  • Published 2016
  • Business, Computer Science
  • 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • Advancements in medical imaging have revolutionized the way in which clinicians' approach diagnoses. From monitoring of disease to the treatment of illnesses is realized to be much more effective than ever before. The ability to exchange, connect and share information about human anatomy via non-invasive methods of radiology, nuclear medicine has opened up an entire new genre of medicine. Having said that, 'image distribution' in medical field has always been a challenge for the reasons known… CONTINUE READING
    5 Citations

    References

    SHOWING 1-10 OF 19 REFERENCES
    Big Data Security and Privacy Issues in Healthcare
    • 114
    • PDF
    Security and Privacy in eHealth: Is it possible?
    • T. Sahama, L. Simpson, B. Lane
    • Computer Science
    • 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)
    • 2013
    • 34
    • Highly Influential
    • PDF
    Privacy Challenges for the Internet of Things
    • 6
    • PDF
    Internet of Things (IoT): A vision, architectural elements, and future directions
    • 7,481
    • PDF
    Cryptography & Network Security
    • 202
    Digital Signature
    • R. Kaur, A. Kaur
    • Computer Science
    • 2012 International Conference on Computing Sciences
    • 2012
    • 67
    • PDF
    Threat Modelling with Stride and UML
    • 11
    • PDF
    Communication Networks: Fundamental Concepts and Key Architectures
    • 381
    • Highly Influential
    • PDF
    Cybersecurity and data protection: Helping healthcare clients protect patient information
    • 2016. [Online]. Available: https://www.lexisnexis.com/lexis-practice-advisor/thejournal/b/lpa/archive/2016/06/03/cybersecurity-and-data-protectionhelping-healthcare-clients-protect-patient-information.aspx.
    • 2016