A Trusted Computing Architecture for Health Care
Contribution to Book
Proceedings of the International Conference on Information Networking
Software integrity and medical data secrecy in health care applications are at risk. The existing health care computing infrastructures lack the support of critical cybersecurity features, such as dynamic software integrity verifications and role-based authorization. Health-related operations are being administered and delivered to patients without proper knowledge or awareness about the integrity status of the underlying software component. To address these problems, we propose a trusted computing architecture that supports the integration of: (1) fine-grained active medical software components integrity verification techniques and (2) fine-grained active role-based authorization mechanisms. The new architecture makes use of code attestation-based technology for isolating sensitive and safety-critical code execution in health-related applications, using a minimal Trusted Computing Base (TCB). With this architecture, caregivers can perform dynamic software integrity monitoring and active role-based authorization during their medical practice.
"A Trusted Computing Architecture for Health Care."
Proceedings of the International Conference on Information Networking: 46-50 Da Neng, Vietnam: IEEE.
doi: 10.1109/ICOIN.2017.7899472 source: https://ieeexplore.ieee.org/document/7899472 isbn: 978-1-5090-5124-3