Design and implementation of a practical secure distributed healthcare application

Zaobin Gan*, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

Security plays a vital role in the design and practical deployment of distributed applications. All companies have to repeatedly spend considerable time, capital and effort on the implementation of the security mechanism for their applications, and the result is also unsatisfactory. Nowadays, more and more integrated security management tools are emerging. If we can properly use these tools in our practical applications, the development schedule of applications will be greatly cut down, the cost will be reduced considerably as well as the security of the applications can be guaranteed. In this paper, we investigate an integrated security management tool - ManageSecure, present a formal description of the healthcare system requirements. and then describe how to implement the healthcare system security objectives by means of ManageSecure. The result shows that the use of the integrated security management tool in the practice application is economical and feasible.

Original languageEnglish
Title of host publicationSECRYPT 2006 - International Conference on Security and Cryptography, Proceedings
EditorsJoaquim Filipe
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages431-436
Number of pages6
ISBN (Print)9728865635, 9789728865634
Publication statusPublished - 2006
EventInternational Conference on Security and Cryptography, SECRYPT 2006 - Setubal, Portugal
Duration: 7 Aug 200610 Aug 2006

Other

OtherInternational Conference on Security and Cryptography, SECRYPT 2006
Country/TerritoryPortugal
CitySetubal
Period7/08/0610/08/06

Keywords

  • Authentication
  • Authorization
  • Distributed application
  • Security management tool

Fingerprint

Dive into the research topics of 'Design and implementation of a practical secure distributed healthcare application'. Together they form a unique fingerprint.

Cite this