Gestão de Identidades na Web das Coisas: Um Estudo de Caso em Saúde Eletrônica
Resumo
Prover a gestão de identidades (IdM) no cenário da Web das Coisas (WoT) é um requisito importante para garantir a proteção de dados disponibilizados ou consumidas por dispositivos na WoT. Este trabalho visa avaliar os impactos causados em uma aplicação de saúde eletrônica (e-health) decorrentes do uso de um sistema de IdM centrado no usuário que faz uso do OpenID Connect e que está alinhado aos requisitos exigidos por esta aplicação. Testes não funcionais, incluindo os de segurança, serão executados para avaliar os impactos decorrentes do uso do sistema de IdM proposto por uma aplicação Web de assistência médica remota.Referências
Aramudhan, M. e Mohan, K. (2010). “New Secure Communication Protocols for Mobile EHealth System”, In: Communications in Computer and Information Science, Networked Digital Technologies, 1, Volume 88, Prague. Proceedings…, Springer Berlim Heidelberg, Prague, p. 639-647.
CTEC (2008). “Future networks and the internet: Early Challenges regarding the “Internet of Things””, Commission Staff Working Document, European Union.
Guinard, D. e Trifa, V. (2009), “Towards the Web of Things: Web Mashups for Embedded Devices”, In: International World Wide Web conferences, Proceedings of Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web, 9, 2009, Piscataway. Proceedings…, IEEE Press, Piscataway, p. 196-199.
Jøsang, A. e Pope, S. (2005), “User centric identity management”, In: AusCERT Asia Pacific Information Technology Security Conference, 22, 2005, Gold Coast. Proceedings…, Springer Berlim Heidelberg, Berlim.
ITU-T (2009), “NGN identity management framework. Recommendation Y.2720”, [link], Maio 2013.
Liu, Jing, Xiao, Yang e Chen, C.L.P. (2012), “Authentication And Access Control in the Internet of Things”, In: 32nd International Conference, Distributed Computing Systems Workshops, 32, 2012, Macau, Proceedings…, IEEE Computer Society, Macau, p. 588592.
Mahalle, Parikshit et al. (2010), “Identity Management Framework towards Internet of Things (IoT) Roadmap and Key Challenges”, In: Recent Trends in Network Security and Applications. 1, Volume 89, 2010, Aalborg. Proceedings…, Springer Berlin Heidelberg, Aalborg, p. 430 – 439.
Mirkovic, J., Bryhni, H. e Ruland, C.M. (2011), “Secure solution for mobile access to patient's health care record”, In: 13th IEEE International Conference, E-health Network Applications and Services, 13, 2011, Columbia. Proceedings…, IEEE Computer Society, Columbia, p. 196-303.
Peyton, L. et al. (2007), “Addressing Privacy in a Federated Identity Management Network for E-health”, In: Eight World Congress WCMeB 2007, 8, Toronto. Proceedings..., IEEE Computer Society, Toronto, p. 12.
CTEC (2008). “Future networks and the internet: Early Challenges regarding the “Internet of Things””, Commission Staff Working Document, European Union.
Guinard, D. e Trifa, V. (2009), “Towards the Web of Things: Web Mashups for Embedded Devices”, In: International World Wide Web conferences, Proceedings of Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web, 9, 2009, Piscataway. Proceedings…, IEEE Press, Piscataway, p. 196-199.
Jøsang, A. e Pope, S. (2005), “User centric identity management”, In: AusCERT Asia Pacific Information Technology Security Conference, 22, 2005, Gold Coast. Proceedings…, Springer Berlim Heidelberg, Berlim.
ITU-T (2009), “NGN identity management framework. Recommendation Y.2720”, [link], Maio 2013.
Liu, Jing, Xiao, Yang e Chen, C.L.P. (2012), “Authentication And Access Control in the Internet of Things”, In: 32nd International Conference, Distributed Computing Systems Workshops, 32, 2012, Macau, Proceedings…, IEEE Computer Society, Macau, p. 588592.
Mahalle, Parikshit et al. (2010), “Identity Management Framework towards Internet of Things (IoT) Roadmap and Key Challenges”, In: Recent Trends in Network Security and Applications. 1, Volume 89, 2010, Aalborg. Proceedings…, Springer Berlin Heidelberg, Aalborg, p. 430 – 439.
Mirkovic, J., Bryhni, H. e Ruland, C.M. (2011), “Secure solution for mobile access to patient's health care record”, In: 13th IEEE International Conference, E-health Network Applications and Services, 13, 2011, Columbia. Proceedings…, IEEE Computer Society, Columbia, p. 196-303.
Peyton, L. et al. (2007), “Addressing Privacy in a Federated Identity Management Network for E-health”, In: Eight World Congress WCMeB 2007, 8, Toronto. Proceedings..., IEEE Computer Society, Toronto, p. 12.
Publicado
11/11/2013
Como Citar
SANTOS, Marciel de Liz; DOMENECH, Marlon; WANGHAM, Michelle S..
Gestão de Identidades na Web das Coisas: Um Estudo de Caso em Saúde Eletrônica. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 13. , 2013, Manaus.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2013
.
p. 346-349.
DOI: https://doi.org/10.5753/sbseg.2013.19558.