SlideShare a Scribd company logo
1 of 18
Download to read offline
 	
  
Guidelines for the technological
development in the e-health
application domain 
Ivano Malavolta
Università degli Studi dell’Aquila
Introduction

Great progress in the health sector applied to












 etc.







However, the health sector currently lags behind other sectors in
the use of advanced data management software à there is great
potential for rapid, sustained growth
image acquisition
image elaboration
 robotics
Introduction

The E-Health Technology project focusses on






Remote assistance via mobile devices
Modernization of business processes 
Design of new services in the cloud
Introduction

The role of University of L’Aquila in the project
Research
Prototypes
development
Research actions
State of the art
Architectural
solutions
Introduction

In this talk we will present the main solutions for architecting an
e-health software system in terms of its
Security engineering 
Reliability assurance
etc.
Data management infrastructure
 	
  
Remainder of the talk

•  Introduction
•  Cloud computing
•  User authentication
•  User authorization
•  Data encryption
•  Sensitive data separation
•  Conclusions
Cloud computing


The use of computing power that is located “elsewhere”à in the cloud

Advantages:

no infrastructure
elasticity
low risk
Cloud computing


Challenges in the e-health application domain:
Who can enter the system?
Who can do what in the system?
Who can read my data?
Where is my data?
User authentication


Strong authentication is mandatory
•  one possible implementation: two-factor + challenge-response
Something you know
 Something you have
ex. username and password
 ex. card or security token
+
OATH1


Open standard for the interoperability of authentication methods
•  Supports both hardware and software implementations
http://www.openauthentication.org/
Advantages:

•  always with the user
•  low investment risk
•  scalable
•  customizable
•  no waiting time for issuing a
new token
User authorization


Access control is the basis of Information Security






 
 
 
 
 prevent disclosure to unauthorized users

 
 
 prevent modification by unauthorized users
Confidentiality
Integrity
XACML


Open standard proposing
•  a declarative language for defining access control policies
•  a run-time architecture for enforcing the policies
defining
enforcing
Data encryption


Data encryption is the process of encoding messages or
information in such a way that only authorized parties can read it

In our project we encrypt data at two levels:









 
 
 
 
 prevent information disclosure while sending data

 
 
 prevent reading saved data in the database
Communication
Database
Sensitive data separation


Multi-tenant architecture with a dedicated database for each agency

Advantages:

•  data isolation ( required by law)
•  customized services
•  easy disaster recovery
Conclusions (i)
Conclusions (ii)


What is not covered in this talk:
•  digital documents with legal validity
•  Analog copies of digital documents
•  Graphometric signatures with legal
validity
These aspects are covered in
our research article*
* available also in English	
  
 	
  
Contact


Ivano Malavolta
Università degli Studi dell’Aquila

ivano.malavolta@univaq.it
http://www.di.univaq.it/malavolta
Images credits


•  http://www.tutorialspoint.com/shorttutorials/cloud-computing-from-the-home
•  https://www.tcnp3.com/home/cloud-technology/what-is-cloud-computing-infographic/
•  http://www.carestreamdental.com/it/it-it/computedradiography
•  http://www.kavo.it/Prodotti/Imaging-Radiologia/Tomografia-volumetrica-3D.aspx
•  http://www.siriweb.com/wp/?product_cat=ecograf_multi
•  http://cdn.bills.com/images/articles/originals/rate-lock.jpg
•  http://www.ftsafe.com/product/otp/hotp
•  https://www.hidglobal.com/partner-products/single-button-time-based-oath-otp
•  http://www.solidpass.com/authentication-methods/time-synchronized-security-token.html
•  http://www.partnerdata.it/prodotti/identificazione/one-time-pw/modelli-epass/
•  http://www.telos.com/secure-communications/secure-unified-directory/

More Related Content

What's hot

eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?chronaki
 
The Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyThe Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyPeter Killcommons
 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)Greenway Health
 
E-Commerce Meets Healthcare
E-Commerce Meets Healthcare E-Commerce Meets Healthcare
E-Commerce Meets Healthcare arrayhealth
 
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamHCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamApollo Hospitals Group and ATNF
 
Mobile health trends and markets in india
Mobile health trends and markets in indiaMobile health trends and markets in india
Mobile health trends and markets in indiaDr Neelesh Bhandari
 
HCS 483 Final Project
HCS 483 Final ProjectHCS 483 Final Project
HCS 483 Final Projectikearne
 
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
eStandards: eHealth Standards & Profiles in Action for  Europe and beyondeStandards: eHealth Standards & Profiles in Action for  Europe and beyond
eStandards: eHealth Standards & Profiles in Action for Europe and beyondchronaki
 
mHealth Project
mHealth ProjectmHealth Project
mHealth ProjectSour Punk
 
Health care transformation in the pandemic era
Health care transformation in the pandemic eraHealth care transformation in the pandemic era
Health care transformation in the pandemic eraVeerendra Singh
 
Mobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareMobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareDavid Lee Scher, MD
 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13howch1961
 
National digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetNational digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetYogesh Arora
 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareDr. Priyanka Wandhe
 
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment ReportDigital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Reportcadhri_unc
 

What's hot (20)

eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?eHealth Practice in Europe: where do we stand?
eHealth Practice in Europe: where do we stand?
 
The Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st CenturyThe Growth of Telemedicine in the 21st Century
The Growth of Telemedicine in the 21st Century
 
Ehealth
EhealthEhealth
Ehealth
 
Health Information Exchange (HIE)
Health Information Exchange (HIE)Health Information Exchange (HIE)
Health Information Exchange (HIE)
 
E-Commerce Meets Healthcare
E-Commerce Meets Healthcare E-Commerce Meets Healthcare
E-Commerce Meets Healthcare
 
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap KwankamHCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
HCIT is the beginning and the end for ensuring Health by Yunkap Kwankam
 
2009 Kegler Brown HIT Seminar
2009 Kegler Brown HIT Seminar2009 Kegler Brown HIT Seminar
2009 Kegler Brown HIT Seminar
 
Mobile health trends and markets in india
Mobile health trends and markets in indiaMobile health trends and markets in india
Mobile health trends and markets in india
 
HCS 483 Final Project
HCS 483 Final ProjectHCS 483 Final Project
HCS 483 Final Project
 
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
eStandards: eHealth Standards & Profiles in Action for  Europe and beyondeStandards: eHealth Standards & Profiles in Action for  Europe and beyond
eStandards: eHealth Standards & Profiles in Action for Europe and beyond
 
mHealth Project
mHealth ProjectmHealth Project
mHealth Project
 
Connected Health Progress Report
Connected Health Progress ReportConnected Health Progress Report
Connected Health Progress Report
 
Health care transformation in the pandemic era
Health care transformation in the pandemic eraHealth care transformation in the pandemic era
Health care transformation in the pandemic era
 
Mobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of HealthcareMobile Health Technologies: Future Tools of Healthcare
Mobile Health Technologies: Future Tools of Healthcare
 
Uptake of eHealth in Australia
Uptake of eHealth in AustraliaUptake of eHealth in Australia
Uptake of eHealth in Australia
 
Care.data 17 09-13
Care.data 17 09-13Care.data 17 09-13
Care.data 17 09-13
 
National digital health mission- Dr. Gurmeet
National digital health mission- Dr. GurmeetNational digital health mission- Dr. Gurmeet
National digital health mission- Dr. Gurmeet
 
Mobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in HealthcareMobile Health(mHealth): A Technology in Healthcare
Mobile Health(mHealth): A Technology in Healthcare
 
Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,Master Class on EMR/EHR Standards by Baljit Singh Bedi,
Master Class on EMR/EHR Standards by Baljit Singh Bedi,
 
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment ReportDigital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
Digital Health at UNC Chapel Hill CaDHRI Needs Assessment Report
 

Viewers also liked

Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Walid Maalej
 
Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Chris Richardson
 
Understand your Business Domain
Understand your Business DomainUnderstand your Business Domain
Understand your Business DomainFrank H. Ritz
 
Model Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresModel Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresMarkus Lanthaler
 
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Alberto Brandolini
 
The People Capability Maturity Model Overviewew
The People Capability Maturity Model OverviewewThe People Capability Maturity Model Overviewew
The People Capability Maturity Model Overviewewtheairliner
 
Career options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainCareer options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainMukesh Chauhan
 
Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10koolkampus
 
A Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation SlidesA Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation Slidesthinkddd
 
BDD with JBehave and Selenium
BDD with JBehave and SeleniumBDD with JBehave and Selenium
BDD with JBehave and SeleniumNikolay Vasilev
 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineeringPreeti Mishra
 

Viewers also liked (16)

JSON Schema MegaWat
JSON Schema MegaWatJSON Schema MegaWat
JSON Schema MegaWat
 
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
Business Rules In Practice - An Empirical Study (IEEE RE'14 Paper)
 
Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)Improving application design with a rich domain model (springone 2007)
Improving application design with a rich domain model (springone 2007)
 
Understand your Business Domain
Understand your Business DomainUnderstand your Business Domain
Understand your Business Domain
 
Simple Java Programs
Simple Java ProgramsSimple Java Programs
Simple Java Programs
 
Model Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON StructuresModel Your Application Domain, Not Your JSON Structures
Model Your Application Domain, Not Your JSON Structures
 
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
Loosely Coupled Complexity - Unleash the power of your Domain Model with Comm...
 
The People Capability Maturity Model Overviewew
The People Capability Maturity Model OverviewewThe People Capability Maturity Model Overviewew
The People Capability Maturity Model Overviewew
 
Career options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domainCareer options for ECE engineers in VLSI and Embedded systems domain
Career options for ECE engineers in VLSI and Embedded systems domain
 
Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10Architectural Design in Software Engineering SE10
Architectural Design in Software Engineering SE10
 
A Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation SlidesA Practical Guide to Domain Driven Design: Presentation Slides
A Practical Guide to Domain Driven Design: Presentation Slides
 
Domain Modeling
Domain ModelingDomain Modeling
Domain Modeling
 
BDD with JBehave and Selenium
BDD with JBehave and SeleniumBDD with JBehave and Selenium
BDD with JBehave and Selenium
 
Domain Driven Design 101
Domain Driven Design 101Domain Driven Design 101
Domain Driven Design 101
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 
Architecture design in software engineering
Architecture design in software engineeringArchitecture design in software engineering
Architecture design in software engineering
 

Similar to Guidelines for the technological development in the e-health application domain

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4sophiabelthome
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).pptVarioTechnology
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 

Similar to Guidelines for the technological development in the e-health application domain (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
B018211016
B018211016B018211016
B018211016
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 

More from Ivano Malavolta

Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Ivano Malavolta
 
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)Ivano Malavolta
 
Software sustainability and Green IT
Software sustainability and Green ITSoftware sustainability and Green IT
Software sustainability and Green ITIvano Malavolta
 
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Ivano Malavolta
 
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]Ivano Malavolta
 
Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Ivano Malavolta
 
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Ivano Malavolta
 
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Ivano Malavolta
 
Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Ivano Malavolta
 
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Ivano Malavolta
 
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Ivano Malavolta
 
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Ivano Malavolta
 
Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Ivano Malavolta
 
[2017/2018] Agile development
[2017/2018] Agile development[2017/2018] Agile development
[2017/2018] Agile developmentIvano Malavolta
 
Reconstructing microservice-based architectures
Reconstructing microservice-based architecturesReconstructing microservice-based architectures
Reconstructing microservice-based architecturesIvano Malavolta
 
[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design LanguageIvano Malavolta
 
[2017/2018] Architectural languages
[2017/2018] Architectural languages[2017/2018] Architectural languages
[2017/2018] Architectural languagesIvano Malavolta
 
[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software ArchitectureIvano Malavolta
 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineeringIvano Malavolta
 

More from Ivano Malavolta (20)

Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
Conducting Experiments on the Software Architecture of Robotic Systems (QRARS...
 
The H2020 experience
The H2020 experienceThe H2020 experience
The H2020 experience
 
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)The Green Lab - Research cocktail  @Vrije Universiteit Amsterdam (October 2020)
The Green Lab - Research cocktail @Vrije Universiteit Amsterdam (October 2020)
 
Software sustainability and Green IT
Software sustainability and Green ITSoftware sustainability and Green IT
Software sustainability and Green IT
 
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...Navigation-aware and Personalized Prefetching of Network Requests in Android ...
Navigation-aware and Personalized Prefetching of Network Requests in Android ...
 
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]How Maintainability Issues of Android Apps Evolve [ICSME 2018]
How Maintainability Issues of Android Apps Evolve [ICSME 2018]
 
Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...Collaborative Model-Driven Software Engineering: a Classification Framework a...
Collaborative Model-Driven Software Engineering: a Classification Framework a...
 
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
Experimenting on Mobile Apps Quality - a tale about Energy, Performance, and ...
 
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
Modeling objects interaction via UML sequence diagrams [Software Design] [Com...
 
Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...Modeling behaviour via UML state machines [Software Design] [Computer Science...
Modeling behaviour via UML state machines [Software Design] [Computer Science...
 
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...Object-oriented design patterns in UML [Software Design] [Computer Science] [...
Object-oriented design patterns in UML [Software Design] [Computer Science] [...
 
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
Structure modeling with UML [Software Design] [Computer Science] [Vrije Unive...
 
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
Requirements engineering with UML [Software Design] [Computer Science] [Vrije...
 
Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...Modeling and abstraction, software development process [Software Design] [Com...
Modeling and abstraction, software development process [Software Design] [Com...
 
[2017/2018] Agile development
[2017/2018] Agile development[2017/2018] Agile development
[2017/2018] Agile development
 
Reconstructing microservice-based architectures
Reconstructing microservice-based architecturesReconstructing microservice-based architectures
Reconstructing microservice-based architectures
 
[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language[2017/2018] AADL - Architecture Analysis and Design Language
[2017/2018] AADL - Architecture Analysis and Design Language
 
[2017/2018] Architectural languages
[2017/2018] Architectural languages[2017/2018] Architectural languages
[2017/2018] Architectural languages
 
[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture[2017/2018] Introduction to Software Architecture
[2017/2018] Introduction to Software Architecture
 
[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering[2017/2018] RESEARCH in software engineering
[2017/2018] RESEARCH in software engineering
 

Recently uploaded

Derma Pharmaceutical Franchise Company - Solace Biotech Limited
Derma Pharmaceutical Franchise Company - Solace Biotech LimitedDerma Pharmaceutical Franchise Company - Solace Biotech Limited
Derma Pharmaceutical Franchise Company - Solace Biotech LimitedSBL DIGITAL
 
Basic of Thyroid Hormone:- An In-depth Analysis
Basic of Thyroid Hormone:- An In-depth AnalysisBasic of Thyroid Hormone:- An In-depth Analysis
Basic of Thyroid Hormone:- An In-depth AnalysisAshishMaletha2
 
Neurological Evaluation of Acute Ischemic stroke in Emergency Room
Neurological Evaluation of Acute Ischemic stroke in Emergency RoomNeurological Evaluation of Acute Ischemic stroke in Emergency Room
Neurological Evaluation of Acute Ischemic stroke in Emergency RoomSudhir Kumar
 
Ayurveda research in Hypothyroidism, P
Ayurveda  research  in Hypothyroidism, PAyurveda  research  in Hypothyroidism, P
Ayurveda research in Hypothyroidism, PDr.Shalu Jain
 
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTION
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTIONANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTION
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTIONojaswinihemane
 
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdf
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdfSGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdf
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdfHongBiThi1
 
Reproductive and Child Health Services ppt.pptx
Reproductive and Child Health Services ppt.pptxReproductive and Child Health Services ppt.pptx
Reproductive and Child Health Services ppt.pptxVeereshDemashetti
 
SMA Implementation science seminar (Day 1).pptx
SMA Implementation science seminar (Day 1).pptxSMA Implementation science seminar (Day 1).pptx
SMA Implementation science seminar (Day 1).pptxAbdirahmanWaseem
 
clean rooms and its classification .pptx
clean rooms and its classification .pptxclean rooms and its classification .pptx
clean rooms and its classification .pptxushakiranmai4
 
Ovarian tumors Lecture notes for MBBS.pptx
Ovarian tumors Lecture notes for MBBS.pptxOvarian tumors Lecture notes for MBBS.pptx
Ovarian tumors Lecture notes for MBBS.pptxSizan Thapa
 
Neutraceuticals, Herb-drug & Herb-food inetractions
Neutraceuticals, Herb-drug & Herb-food inetractionsNeutraceuticals, Herb-drug & Herb-food inetractions
Neutraceuticals, Herb-drug & Herb-food inetractionsPradnya Wadekar
 
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptx
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptxANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptx
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptxsiddharthroy26587
 
Brief introduction to information ecosystem x public health.pptx
Brief introduction to information ecosystem x public health.pptxBrief introduction to information ecosystem x public health.pptx
Brief introduction to information ecosystem x public health.pptxTina Purnat
 
Histology of lymph node(lymph node histology)
Histology of lymph node(lymph node histology)Histology of lymph node(lymph node histology)
Histology of lymph node(lymph node histology)pranavguleria2
 
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...Genesis Institute of Pharmacy, Radhanagari.
 
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdf
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdfEMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdf
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdfMayuriGamit2
 
Methicillin-resistant Staphylococcus Aureus (MRSA)
Methicillin-resistant Staphylococcus Aureus (MRSA)Methicillin-resistant Staphylococcus Aureus (MRSA)
Methicillin-resistant Staphylococcus Aureus (MRSA)Ahmad Thanin
 
TARGET DELINEATION IN VULVAL CANCER BY DR KANHU
TARGET DELINEATION IN VULVAL CANCER BY DR KANHUTARGET DELINEATION IN VULVAL CANCER BY DR KANHU
TARGET DELINEATION IN VULVAL CANCER BY DR KANHUKanhu Charan
 

Recently uploaded (20)

Derma Pharmaceutical Franchise Company - Solace Biotech Limited
Derma Pharmaceutical Franchise Company - Solace Biotech LimitedDerma Pharmaceutical Franchise Company - Solace Biotech Limited
Derma Pharmaceutical Franchise Company - Solace Biotech Limited
 
Basic of Thyroid Hormone:- An In-depth Analysis
Basic of Thyroid Hormone:- An In-depth AnalysisBasic of Thyroid Hormone:- An In-depth Analysis
Basic of Thyroid Hormone:- An In-depth Analysis
 
Neurological Evaluation of Acute Ischemic stroke in Emergency Room
Neurological Evaluation of Acute Ischemic stroke in Emergency RoomNeurological Evaluation of Acute Ischemic stroke in Emergency Room
Neurological Evaluation of Acute Ischemic stroke in Emergency Room
 
Catalysts for Change in SCLC: Optimizing the Use of Standard Therapies and Ac...
Catalysts for Change in SCLC: Optimizing the Use of Standard Therapies and Ac...Catalysts for Change in SCLC: Optimizing the Use of Standard Therapies and Ac...
Catalysts for Change in SCLC: Optimizing the Use of Standard Therapies and Ac...
 
Ayurveda research in Hypothyroidism, P
Ayurveda  research  in Hypothyroidism, PAyurveda  research  in Hypothyroidism, P
Ayurveda research in Hypothyroidism, P
 
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTION
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTIONANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTION
ANTIPERSPIRANTS AND DEODORANTS : MECHANISM OF ACTION
 
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdf
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdfSGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdf
SGK BỆNH LÝ GOUT YHN hay lắm nha aaaa.pdf
 
Reproductive and Child Health Services ppt.pptx
Reproductive and Child Health Services ppt.pptxReproductive and Child Health Services ppt.pptx
Reproductive and Child Health Services ppt.pptx
 
Evolving Concepts in the Pathogenesis of Inflammatory Dermatologic Disorders ...
Evolving Concepts in the Pathogenesis of Inflammatory Dermatologic Disorders ...Evolving Concepts in the Pathogenesis of Inflammatory Dermatologic Disorders ...
Evolving Concepts in the Pathogenesis of Inflammatory Dermatologic Disorders ...
 
SMA Implementation science seminar (Day 1).pptx
SMA Implementation science seminar (Day 1).pptxSMA Implementation science seminar (Day 1).pptx
SMA Implementation science seminar (Day 1).pptx
 
clean rooms and its classification .pptx
clean rooms and its classification .pptxclean rooms and its classification .pptx
clean rooms and its classification .pptx
 
Ovarian tumors Lecture notes for MBBS.pptx
Ovarian tumors Lecture notes for MBBS.pptxOvarian tumors Lecture notes for MBBS.pptx
Ovarian tumors Lecture notes for MBBS.pptx
 
Neutraceuticals, Herb-drug & Herb-food inetractions
Neutraceuticals, Herb-drug & Herb-food inetractionsNeutraceuticals, Herb-drug & Herb-food inetractions
Neutraceuticals, Herb-drug & Herb-food inetractions
 
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptx
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptxANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptx
ANATOMY OF THE CEREBRUM WITH CLINICAL ANATOMY.pptx
 
Brief introduction to information ecosystem x public health.pptx
Brief introduction to information ecosystem x public health.pptxBrief introduction to information ecosystem x public health.pptx
Brief introduction to information ecosystem x public health.pptx
 
Histology of lymph node(lymph node histology)
Histology of lymph node(lymph node histology)Histology of lymph node(lymph node histology)
Histology of lymph node(lymph node histology)
 
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...
HDT Unit 2: Nutraceuticals Global Market Overview And Growth Of Nutraceutical...
 
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdf
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdfEMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdf
EMBRYOLOGY AND FOETAL DEVELOPMENT-mayu.pdf
 
Methicillin-resistant Staphylococcus Aureus (MRSA)
Methicillin-resistant Staphylococcus Aureus (MRSA)Methicillin-resistant Staphylococcus Aureus (MRSA)
Methicillin-resistant Staphylococcus Aureus (MRSA)
 
TARGET DELINEATION IN VULVAL CANCER BY DR KANHU
TARGET DELINEATION IN VULVAL CANCER BY DR KANHUTARGET DELINEATION IN VULVAL CANCER BY DR KANHU
TARGET DELINEATION IN VULVAL CANCER BY DR KANHU
 

Guidelines for the technological development in the e-health application domain

  • 1.     Guidelines for the technological development in the e-health application domain Ivano Malavolta Università degli Studi dell’Aquila
  • 2. Introduction Great progress in the health sector applied to etc. However, the health sector currently lags behind other sectors in the use of advanced data management software à there is great potential for rapid, sustained growth image acquisition image elaboration robotics
  • 3. Introduction The E-Health Technology project focusses on Remote assistance via mobile devices Modernization of business processes Design of new services in the cloud
  • 4. Introduction The role of University of L’Aquila in the project Research Prototypes development Research actions State of the art Architectural solutions
  • 5. Introduction In this talk we will present the main solutions for architecting an e-health software system in terms of its Security engineering Reliability assurance etc. Data management infrastructure
  • 6.     Remainder of the talk •  Introduction •  Cloud computing •  User authentication •  User authorization •  Data encryption •  Sensitive data separation •  Conclusions
  • 7. Cloud computing The use of computing power that is located “elsewhere”à in the cloud Advantages: no infrastructure elasticity low risk
  • 8. Cloud computing Challenges in the e-health application domain: Who can enter the system? Who can do what in the system? Who can read my data? Where is my data?
  • 9. User authentication Strong authentication is mandatory •  one possible implementation: two-factor + challenge-response Something you know Something you have ex. username and password ex. card or security token +
  • 10. OATH1 Open standard for the interoperability of authentication methods •  Supports both hardware and software implementations http://www.openauthentication.org/ Advantages: •  always with the user •  low investment risk •  scalable •  customizable •  no waiting time for issuing a new token
  • 11. User authorization Access control is the basis of Information Security prevent disclosure to unauthorized users prevent modification by unauthorized users Confidentiality Integrity
  • 12. XACML Open standard proposing •  a declarative language for defining access control policies •  a run-time architecture for enforcing the policies defining enforcing
  • 13. Data encryption Data encryption is the process of encoding messages or information in such a way that only authorized parties can read it In our project we encrypt data at two levels: prevent information disclosure while sending data prevent reading saved data in the database Communication Database
  • 14. Sensitive data separation Multi-tenant architecture with a dedicated database for each agency Advantages: •  data isolation ( required by law) •  customized services •  easy disaster recovery
  • 16. Conclusions (ii) What is not covered in this talk: •  digital documents with legal validity •  Analog copies of digital documents •  Graphometric signatures with legal validity These aspects are covered in our research article* * available also in English  
  • 17.     Contact Ivano Malavolta Università degli Studi dell’Aquila ivano.malavolta@univaq.it http://www.di.univaq.it/malavolta
  • 18. Images credits •  http://www.tutorialspoint.com/shorttutorials/cloud-computing-from-the-home •  https://www.tcnp3.com/home/cloud-technology/what-is-cloud-computing-infographic/ •  http://www.carestreamdental.com/it/it-it/computedradiography •  http://www.kavo.it/Prodotti/Imaging-Radiologia/Tomografia-volumetrica-3D.aspx •  http://www.siriweb.com/wp/?product_cat=ecograf_multi •  http://cdn.bills.com/images/articles/originals/rate-lock.jpg •  http://www.ftsafe.com/product/otp/hotp •  https://www.hidglobal.com/partner-products/single-button-time-based-oath-otp •  http://www.solidpass.com/authentication-methods/time-synchronized-security-token.html •  http://www.partnerdata.it/prodotti/identificazione/one-time-pw/modelli-epass/ •  http://www.telos.com/secure-communications/secure-unified-directory/