2011
Authors
Campos, MJ; Correia, ME; Antunes, L;
Publication
2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST)
Abstract
Many heterogeneous and highly specialized software applications for eHealth were implemented and deployed by diverse health organizations, such as public and private hospitals and health care centers. The rational management of these eHealth assets together with their efficient and interoperable integration represents today a major hitherto unresolved challenge for the health sector at a global level. One of the present implications is the serious interoperability issues that arise by the lack of widely accepted standards for the homogeneous integration of the diverse identity and authentication mechanisms used by the eHealth applications ecosystem. Unfortunately this has not yet been a major infrastructure concern for the eHealth context and thus constitutes a major road block for the realization of these applications full integration potential. In this work a high level model and some critical infrastructure components are proposed. Together with the Portuguese eID smart-card, allowed to delineate a novel and more flexible infrastructure for secure identity management and authentication services for eHealth. The secure privacy oriented identity infrastructure proposed fits well the highly demanding and specific needs of a heterogeneous and integrated modern identity infrastructure for eHealth applications, precisely because it provides strong foundations, upon which more reliable, secure, trustworthy and inter-operable eHealth applications can be built.
2012
Authors
Augusto, AB; Correia, ME;
Publication
INFORMATION SECURITY AND PRIVACY RESEARCH
Abstract
Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with these developments, Internet application providers like Google and Facebook are developing and deploying an ever increasing set of personal services that are being aggregated and structured over personal user accounts were an ever increasing set of personal private sensitive attributes is being massively aggregated. In this paper we describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a framework for user centric identity management that provides an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users identity attributes to offer a versatile set of identity services. In OFELIA personal attributes are distributed among and protected by several otherwise unrelated AAs (Attribute Authorities). Only the user mobile device knows how to aggregate these scattered AAs identity attributes back into some useful identifiable entity identity. Moreover by recurring to an IdB (Identity Broker), acting as a privacy enhancing blind caching-proxy, in OFELIA the identity attributes location in the Internet is hidden from the RP/SP (Relying Party, Service Provider) that wants to have temporary access to the users personal data. The mobile device thus becomes the means by which the user can asynchronously exercise discretionary access control over their most sensitive dynamic identity attributes in a simple but highly transparent way.
2010
Authors
Falcao Reis, F; Correia, ME;
Publication
MEDICAL AND CARE COMPUNETICS 6
Abstract
With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.
2012
Authors
Santos Pereira, C; Augusto, AB; Correia, ME; Ferreira, A; Cruz Correia, R;
Publication
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Abstract
The Internet has proved the enormous benefits that can be accrued to all players involved in online services. However, it has also clearly demonstrated the risks involved in exposing personal data to the outside world and constitutes at the same time a teeming breeding ground of innovation for highly flexible security solutions that can minimize these risks. It is now widely believed that the benefits of online services to healthcare in general supplant the risks involved, provided adequate security measures are taken and the role played by all the parties involved, be they physicians, nurses or patients are clearly outlined. Due to the highly sensitive nature of the data held on the Electronic Health Record (EHR), it is commonly agreed that providing online access to patients EHR to the outside world carries an unacceptable level of risk not only to the patients but also to the healthcare institution that plays a custodian to that sensitive data. However, by sharing these risks with the patients, healthcare institutions can start to equate the possibility of providing controlled exterior online access to patients EHR. The mobile phone is nowadays the preferred mean by which people can interact with each other at a distance. Not only that, the smartphone constitutes the full embodiment of the truly personal device users carry constantly with them, everywhere. They are therefore the ideal means by which the user can casually and conveniently interact with information systems. In this paper we propose a discretionary online access rights management mechanism based on the Role Based Access Control (RBAC) model that takes advantage on the personal/technical characteristics and data communications capabilities of the smartphone in order to provide patients with the means by which they can conveniently exercise safe discretionary online access permissions to their own EHR. © 2012 Springer-Verlag.
2007
Authors
Bessa, S; Correia, ME; Brandao, P;
Publication
2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3
Abstract
In this paper we present the development, implementation and simulation of a simple Distributed Hash Table (DHT) protocol for a Peer to peer (P2P) overlay network inspired by small world [3, 2] concepts. Our simulation and implementation, done on the Peersim [10] java network simulator, showed results consistent with other state of the art DHT implementations with a more simple and pragmatic approach for the graph construction algorithm. We present the results Of Simulating this protocol on large P2P networks and compare them with the results obtained in Symphony [14], another small world inspired DHT.
2009
Authors
Baptista, N; Prior, R; Correia, ME;
Publication
2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS
Abstract
Several studies have demonstrated the advantages of using IVR (Interactive Voice Response) technologies[5], which allow the users to phone a computer and access services by pressing the appropriate touch-tone keys on their telephones. Because it offers substantial benefits in terms of cost and time efficiency, there is a continuous pursuit for increased automation using IVR. The real challenge lies in providing a user-friendly, yet cost-effective interface to users in order to improve their interaction with existing services, making them more usable and useful, providing an experience that fits their specific objectives and utilization contexts. This paper describes a method and system for providing customizable audio access to email messages kept in several IMAP (Internet Message Access Protocol) backstorages using an IVR application that takes full advantage of TTS (Text-To-Speech) software.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.