Skip to main content

Dependability Issues of Pervasive Computing in a Healthcare Environment

  • Conference paper
Security in Pervasive Computing

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2802))

Abstract

This paper proposes that the healthcare domain can serve as an archetypical field of research in pervasive computing. We present this area from a technological perspective, arguing that it provides a wide range of possible applications of pervasive computing technology. We further recognize that pervasive computing technology is likely to create concerns about the security of healthcare systems, due to increased data aggregation, ubiquitous access, and increasing dependency on technical solutions. But we also justify why the same technology can help building more robust, more dependable systems that increase the quality of healthcare. We identify building blocks that are necessary to achieve this goal: a pervasive middleware, appropriate handling of exceptional situations, and dependability assertions for small devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Agency for Healthcare Research and Quality (February 2003), http://www.ahcpr.gov/qual/errorsix.htm

  2. Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99TR-028, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA (2000)

    Google Scholar 

  3. American Accounting Association (AAA), Home page http://accounting.rutgers.edu/raw/aaa/

  4. Anderson, R.J.: A Security Policy Model for Clinical Information Systems. In: IEEE Symposium on Security and Privacy (1996)

    Google Scholar 

  5. Arens, A.A., Loebbecke, J.K.: Auditing: An Integrated Approach, 8th edn. Prentice-Hall, Englewood Cliffs (1999)

    Google Scholar 

  6. Bacon, J., Moody, K., Yao, W.: Access Control and Trust in the Use of Widely Distributed Services. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 295. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Baldwin, F.D.: Putting your assets to work. Healthcare Informatics (April 2001)

    Google Scholar 

  8. Bardram, J.E., Christensen, H.B.: Middleware for Pervasive Healthcare. In: Advanced TopicWorkshop: Middleware for Mobile Computing. IFIP/ACMMiddleware 2001 Conference (2001), http://www.cs.arizona.edu/mmc/ , http://www.pervasivehealthcare.dk/

  9. Barrett, M.J.: The evolving computerized medical record. Healthcare Informatics (May 2000)

    Google Scholar 

  10. Bass, T.: Intrusion Detection Systems and Multisensor Data Fusion. Communications of the ACM 43(4), 99–105 (2000)

    Article  Google Scholar 

  11. Bernstein, P., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)

    Google Scholar 

  12. Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Allgegenwart und Verschwinden des Computers – Leben in einerWelt smarter Alltagsdinge. In: Grötker, R. (ed.) Privat! Kontrollierte Freiheit in einer vernetzten Welt, Heise-Verlag, Hannover (2003)

    Google Scholar 

  13. Brown, D.J., Suckow, B., Wang, T.: A Survey of Intrusion Detection Systems (2001)

    Google Scholar 

  14. Kunze, C., Grossmann, U., Storkand, W., Müller-Glaser, K.D.: Application of Ubiquitous Computing in Personal Health Monitoring Systems. In Biomedizinische Technik. Beiträge zur 36. Jahrestagung der Deutschen Gesellschaft für Biomedizinische Technik 47, 360–362 (2002), http://www.vde.com/de/fg/dgbmt/

  15. Cachin, C., Kursawe, K., Shoup, V.: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. In: Proceedings of the Symposium on Principles of Distributed Computing, Portland, Oregon, pp. 123–132 (2000)

    Google Scholar 

  16. cnn.com. Medical errors kill tens of thousands annually, panel says (November 1999), http://www.cnn.com/HEALTH/9911/29/medical.errors/

  17. DeJesus, E.: Disease management in a warehouse. Healthcare Informatics (September 1999)

    Google Scholar 

  18. Denley, I., Smith, S.W.: Privacy in Clinical Information Systems in Secondary Care. British Medical Journal 318, 1328–1330 (1999)

    Google Scholar 

  19. Flörkemeier, C., Lampe, M., Schoch, T.: The Smart Box Concept for Ubiquitous Computing Environments. In: Proc. of Smart Objects Conference SOC (2003)

    Google Scholar 

  20. Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. Computer 34(8), 57–66 (2001)

    Article  Google Scholar 

  21. The Health Insurance Portability and Accountability Act (HIPAA), http://www.hipaa.org/

  22. Healthcare Informatics. On record: New contracts and installations. Healthcare Informatics (1997) (today)

    Google Scholar 

  23. Joch, A.: Right place, right time. Healthcare Informatics (May 2000)

    Google Scholar 

  24. Kistler, J.J., Satyanarayanan, M.: Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems 10(1), 3–25 (1992)

    Article  Google Scholar 

  25. Kohn, L.T., Corrigan, J. (eds.): To Err Is Human: Building a Safer Health System. National Academy Press (2000), http://books.nap.edu/books/0309068371/html/index.html

  26. Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  27. Lunt, T.F.: Automated Audit Trail Analysis and Intrusion Detection: A Survey. In: Proceedings of the 11th National Computer Security Conference, Baltimore, MD (1988)

    Google Scholar 

  28. Marietti, C.: Delivering the goods: How healthcare can plug the leak of billions of supply-chain dollars. Healthcare Informatics (August 1999)

    Google Scholar 

  29. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  30. Napoli, M.: Preventing medical errors: A call to action. Health Facts (January 2000)

    Google Scholar 

  31. Clifford Neumann, B., Ts’o, T.: An authentication service for computer networks. IEEE Communications 32(9), 33–38 (1994)

    Article  Google Scholar 

  32. Várady, P., Benyó, Z., Benyó, B.: An Open Architecture Patient Monitoring System Using Standard Technologies. IEEE Transactions on Information Technology in Biomedicine 6(1), 95–98 (2002)

    Article  Google Scholar 

  33. McGraw-Hill Healthcare Information Programs. Industry Report: Health Insurance Portability and Accountability Act. Healthcare Informatics (2000)

    Google Scholar 

  34. Rabin, M.O.: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM 36(2), 335–348 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  35. Ranum, M.J.: Thinking About Firewalls. Technical report, Trusted Information Systems, Inc. Glenwood, Maryland (1993)

    Google Scholar 

  36. (February 2003), http://www.robocup.org/

  37. Stammer, L.: Seeking SAFETY. Healthcare Informatics (October 2000)

    Google Scholar 

  38. Tsudik, G., Summers, R.: AudES: An Expert System for Security Auditing. In: Proceedings of the AAAI Conference on Innovative Application in Artificial Intelligence (1990)

    Google Scholar 

  39. Weiser, M.: The Computer for the 21st Century. Scientific American, 94–104 (September 1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bohn, J., Gärtner, F., Vogt, H. (2004). Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds) Security in Pervasive Computing. Lecture Notes in Computer Science, vol 2802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39881-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39881-3_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20887-7

  • Online ISBN: 978-3-540-39881-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics