SlideShare a Scribd company logo
1 of 13
Download to read offline
Securing Mobile e-Health Environments by
Design: A Holistic Architectural Approach
Massimiliano Masi
Joint work with Helder Aranha, Tanja Pavleska, and Giovanni
Paolo Sellitto
massimiliano.masi@tiani-spirit.com
eHPWAS, Barcelona, October 21, 2019
Introduction
Employing wireless devices (e.g., sensors, remote controllers) is the
norm in medical workflows.
Their data traverses existing IT infrastructure (from the
hospital datacenter to regional healthcare information
exchanges) usually through public internet
A vulnerability could endanger the patients’ privacy and even
their lives
Interoperability is crucial: devices are procured from different
vendors and they are long-term investments.
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 2/13
Using standards
Using standards is not enough
“Standards alone are not enough to guarantee
interoperability” (G. Lewis)
“The nice thing about standards is that you have so many to
choose from” (A. Tanenbaum)
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 3/13
The NIS directive
Article 4 and Annex II of the NIS directive (EU 2016/1148) defines
Healthcare as a critical sector
Security is not only a technical, but also a legal requirement
The regulatory prescriptions in terms of security requirements
span all of the levels of the healthcare environment
But security expertise is a scarce resource! According to
European Commission estimates, the cybersecurity workforce
gap in Europe will reach 350.000 by 2022
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 4/13
Our contribution
We propose a novel approach based on the combination of
RMIAS to cope with the scarcity of cybersecurity expertise
throughout the lifecycle of medical devices
RAMI 4.0 to tackle interoperability and sustainability aspects
of Internet of Medical Things
IHE and FHIR standards, as selected by international
healthcare bodies (USA, and Europe)
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 5/13
RMIAS
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 6/13
RMIAS / 2
Business analysts and IT Security Architects use the Security
Goals as helper to find countermeasures
RMIAS cycles depends on a specific Security Development
Life Cycle (SDLC)
SDLC is not prescribed ⇒ RMIAS specifications allow
flexibility
We introduce RAMI 4.0 as SDLC
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 7/13
RAMI 4.0
The Reference Architectural
Model for Industry 4.0 aims
at uniforming sector-neutral
standards for services and
their semantics, creating
value chains spanning
different sectors.
Used in I-IoT, in Smart
Grids, self-driving cars,
Smart Cities
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 8/13
IHE and FHIR
IHE and FHIR are standards recognized by the WHO, EU
commission, and the USA Health IT dept to establish IT
Healthcare infrastructures
FHIR provides standards to connect medical devices to IT
infrastructures
IHE governs FHIR (and Continua) standards to provide
sustainability
Our approach
We dissect the requirements of an IHE-based infrastructure
integrating ubiquitous medical devices into corresponding RAMI
layers, and for each layer, we apply a RMIAS cycle
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 9/13
MOSAA
We are developing MOdular Security Aware Architecture
Description Language, MOSAA, with the aim to enable the IT
Security Architect with a toolchain to build solution
architectures using the RMIAS and IHE models
It is based on formal methods: MOSAA has a simple syntax
(inspired by JSON) and a formal semantics
The execution of MOSAA results in a set of SMT-LIBv2 files
to be evaluated by a SMT solver (we use Microsoft Z3)
If the SMT solver returns sat, then the architecture is secure
by design (i.e., fulfills the security policy expressed using
goals and countermeasures)
It is under development using xText and Xtend, to allow the
building of Web-Based and Standalone user interfaces
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 10/13
Conclusions
Healthcare is a critical sector, and investments on IT
infrastructures and medical devices have to be sustained over
years
To support this investment, we introduced the use of RAMI
4.0, the architectural model of I-IoT, that, combined with
RMIAS and IHE/FHIR, enables the creation of architecture
which are secure-by-design
We are developing a toolchain, MOSAA, which uses formal
methods to create SDLC-agnostic architectures
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 11/13
Input from Attendees / Discussion
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 12/13
Thank You
Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 13/13

More Related Content

What's hot

Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Manoo Ordeedolchest
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
IoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarIoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarVishal Kumar
 
Korea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoTKorea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoTRaffaele Giaffreda
 
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)pijans
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
2020 Technologies
2020 Technologies2020 Technologies
2020 TechnologiesNaga Muruga
 
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators Decide
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators DecideI211 p30-33 Viewpoint - Open or End-to-End Systems Integrators Decide
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators DecideYohanes Edo Pribadi
 
Cyber Security on Transactions in Smart Metering Systems usign Blockchain
Cyber Security on Transactions in Smart Metering Systems usign BlockchainCyber Security on Transactions in Smart Metering Systems usign Blockchain
Cyber Security on Transactions in Smart Metering Systems usign BlockchainJuan Carlos Olivares Rojas
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...ijseajournal
 
Integrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryIntegrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryAboul Ella Hassanien
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Nepal’s network readiness index (nri)
Nepal’s network readiness index (nri)Nepal’s network readiness index (nri)
Nepal’s network readiness index (nri)Bhupendra Jha
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud SystemsHong-Linh Truong
 
Clsb 2020 cfp
Clsb 2020 cfpClsb 2020 cfp
Clsb 2020 cfppijans
 

What's hot (18)

Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
DW2020 Data Models - FIWARE Platform
DW2020 Data Models - FIWARE PlatformDW2020 Data Models - FIWARE Platform
DW2020 Data Models - FIWARE Platform
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
IoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_KumarIoT_analysis_Vishal_Kumar
IoT_analysis_Vishal_Kumar
 
Korea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoTKorea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoT
 
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
CALL FOR PAPERS - International Journal on AdHoc Networking Systems (IJANS)
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
2020 Technologies
2020 Technologies2020 Technologies
2020 Technologies
 
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators Decide
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators DecideI211 p30-33 Viewpoint - Open or End-to-End Systems Integrators Decide
I211 p30-33 Viewpoint - Open or End-to-End Systems Integrators Decide
 
Cyber Security on Transactions in Smart Metering Systems usign Blockchain
Cyber Security on Transactions in Smart Metering Systems usign BlockchainCyber Security on Transactions in Smart Metering Systems usign Blockchain
Cyber Security on Transactions in Smart Metering Systems usign Blockchain
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
Integrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industryIntegrating the IIoT with the digital twins for the drugs industry
Integrating the IIoT with the digital twins for the drugs industry
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Nepal’s network readiness index (nri)
Nepal’s network readiness index (nri)Nepal’s network readiness index (nri)
Nepal’s network readiness index (nri)
 
TUW-ASE Summer 2015: IoT Cloud Systems
TUW-ASE Summer 2015:  IoT Cloud SystemsTUW-ASE Summer 2015:  IoT Cloud Systems
TUW-ASE Summer 2015: IoT Cloud Systems
 
Clsb 2020 cfp
Clsb 2020 cfpClsb 2020 cfp
Clsb 2020 cfp
 

Similar to Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach

Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachMassimiliano Masi
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHEMassimiliano Masi
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...AM Publications
 
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th international conference on mobile (5)
9th international conference on mobile (5)9th international conference on mobile (5)
9th international conference on mobile (5)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)ijmnct
 
One datum and many values for sustainable Industry 4.0: a prognostic and hea...
One datum and many values for sustainable Industry 4.0: a  prognostic and hea...One datum and many values for sustainable Industry 4.0: a  prognostic and hea...
One datum and many values for sustainable Industry 4.0: a prognostic and hea...IJECEIAES
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)ijassn
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)ijassn
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Petar Radanliev
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
Call for Papers - 15th International Conference on Wireless & Mobile Networks...
Call for Papers - 15th International Conference on Wireless & Mobile Networks...Call for Papers - 15th International Conference on Wireless & Mobile Networks...
Call for Papers - 15th International Conference on Wireless & Mobile Networks...ijgca
 

Similar to Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach (20)

Enabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approachEnabling Security-by-design in Smart Grids: An architecture-based approach
Enabling Security-by-design in Smart Grids: An architecture-based approach
 
Achieving Interoperability Through IHE
Achieving Interoperability Through IHEAchieving Interoperability Through IHE
Achieving Interoperability Through IHE
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
 
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th international conference on mobile (5)
9th international conference on mobile (5)9th international conference on mobile (5)
9th international conference on mobile (5)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
One datum and many values for sustainable Industry 4.0: a prognostic and hea...
One datum and many values for sustainable Industry 4.0: a  prognostic and hea...One datum and many values for sustainable Industry 4.0: a  prognostic and hea...
One datum and many values for sustainable Industry 4.0: a prognostic and hea...
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...Cyber risk at the edge: current and future trends on cyber risk analytics and...
Cyber risk at the edge: current and future trends on cyber risk analytics and...
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
PAPER SUBMISSION -9th International Conference on Mobile & Wireless Networks ...
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
Call for Papers - 15th International Conference on Wireless & Mobile Networks...
Call for Papers - 15th International Conference on Wireless & Mobile Networks...Call for Papers - 15th International Conference on Wireless & Mobile Networks...
Call for Papers - 15th International Conference on Wireless & Mobile Networks...
 

More from Massimiliano Masi

Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Massimiliano Masi
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionMassimiliano Masi
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Massimiliano Masi
 
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipCorso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipMassimiliano Masi
 
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLCorso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLMassimiliano Masi
 
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciCorso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciMassimiliano Masi
 
Corso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertCorso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertMassimiliano Masi
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...Massimiliano Masi
 
Automating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignAutomating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignMassimiliano Masi
 
Introduction to Blockchain Technologies
Introduction to Blockchain TechnologiesIntroduction to Blockchain Technologies
Introduction to Blockchain TechnologiesMassimiliano Masi
 
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/Massimiliano Masi
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...Massimiliano Masi
 
Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Massimiliano Masi
 

More from Massimiliano Masi (14)

Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023Cybersecurity Task Force at ASECAP Days 2023
Cybersecurity Task Force at ASECAP Days 2023
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
 
A Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure ProtectionA Cybersecurity Digital Twin for Critical Infrastructure Protection
A Cybersecurity Digital Twin for Critical Infrastructure Protection
 
Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...Security and Safety by Design in the Internet of Actors an Architectural Appr...
Security and Safety by Design in the Internet of Actors an Architectural Appr...
 
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black TulipCorso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip
 
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSLCorso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL
 
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai AsimmetriciCorso IFTS CyberSecurity Expert - Cifrai Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici
 
Corso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity ExpertCorso IFTS CyberSecurity Expert
Corso IFTS CyberSecurity Expert
 
The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...The need for interoperability in blockchain-based initiatives to facilitate c...
The need for interoperability in blockchain-based initiatives to facilitate c...
 
Automating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture DesignAutomating Smart Grid Solution Architecture Design
Automating Smart Grid Solution Architecture Design
 
Introduction to Blockchain Technologies
Introduction to Blockchain TechnologiesIntroduction to Blockchain Technologies
Introduction to Blockchain Technologies
 
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/
 
A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...A governance model for ubiquitous medical devices accessing eHealth data: the...
A governance model for ubiquitous medical devices accessing eHealth data: the...
 
Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles Addressing Security and Provide through IHE Profiles
Addressing Security and Provide through IHE Profiles
 

Recently uploaded

如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查awo24iot
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一ga6c6bdl
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...Amil baba
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一ss ss
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证gwhohjj
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfchapmanellie27
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Servicesnajka9823
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls in Delhi
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一ga6c6bdl
 
Papular No 1 Online Istikhara Amil Baba Pakistan Amil Baba In Karachi Amil B...
Papular No 1 Online Istikhara Amil Baba Pakistan  Amil Baba In Karachi Amil B...Papular No 1 Online Istikhara Amil Baba Pakistan  Amil Baba In Karachi Amil B...
Papular No 1 Online Istikhara Amil Baba Pakistan Amil Baba In Karachi Amil B...Authentic No 1 Amil Baba In Pakistan
 
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookvip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurSuhani Kapoor
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 

Recently uploaded (20)

如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
如何办理伦敦大学伯贝克学院毕业证(BBK毕业证) 成绩单留信学历认证原版一比一
 
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
如何办理(Adelaide毕业证)阿德莱德大学毕业证成绩单Adelaide学历认证真实可查
 
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
如何办理(NUS毕业证书)新加坡国立大学毕业证成绩单留信学历认证原版一比一
 
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
young call girls in  Khanpur,🔝 9953056974 🔝 escort Serviceyoung call girls in  Khanpur,🔝 9953056974 🔝 escort Service
young call girls in Khanpur,🔝 9953056974 🔝 escort Service
 
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
NO1 Qualified Best Black Magic Specialist Near Me Spiritual Healer Powerful L...
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
 
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvfPresentation.pptxjnfoigneoifnvoeifnvklfnvf
Presentation.pptxjnfoigneoifnvoeifnvklfnvf
 
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best ServicesVip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
Vip Udupi Call Girls 7001305949 WhatsApp Number 24x7 Best Services
 
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall AvailableCall Girls In Munirka>༒9599632723 Incall_OutCall Available
Call Girls In Munirka>༒9599632723 Incall_OutCall Available
 
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls KolkataCall Girls Service Kolkata Aishwarya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Call Girls Service Kolkata Aishwarya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Serviceyoung call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
young call girls in Gtb Nagar,🔝 9953056974 🔝 escort Service
 
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
定制宾州州立大学毕业证(PSU毕业证) 成绩单留信学历认证原版一比一
 
Papular No 1 Online Istikhara Amil Baba Pakistan Amil Baba In Karachi Amil B...
Papular No 1 Online Istikhara Amil Baba Pakistan  Amil Baba In Karachi Amil B...Papular No 1 Online Istikhara Amil Baba Pakistan  Amil Baba In Karachi Amil B...
Papular No 1 Online Istikhara Amil Baba Pakistan Amil Baba In Karachi Amil B...
 
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Bookvip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
vip Model Basti Call Girls 9999965857 Call or WhatsApp Now Book
 
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls Kolkata Chhaya 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls Kolkata Chhaya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service SaharanpurVIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
VIP Call Girl Saharanpur Aashi 8250192130 Independent Escort Service Saharanpur
 
Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 
Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565Low rate Call girls in Delhi Justdial | 9953330565
Low rate Call girls in Delhi Justdial | 9953330565
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 

Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach

  • 1. Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach Massimiliano Masi Joint work with Helder Aranha, Tanja Pavleska, and Giovanni Paolo Sellitto massimiliano.masi@tiani-spirit.com eHPWAS, Barcelona, October 21, 2019
  • 2. Introduction Employing wireless devices (e.g., sensors, remote controllers) is the norm in medical workflows. Their data traverses existing IT infrastructure (from the hospital datacenter to regional healthcare information exchanges) usually through public internet A vulnerability could endanger the patients’ privacy and even their lives Interoperability is crucial: devices are procured from different vendors and they are long-term investments. Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 2/13
  • 3. Using standards Using standards is not enough “Standards alone are not enough to guarantee interoperability” (G. Lewis) “The nice thing about standards is that you have so many to choose from” (A. Tanenbaum) Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 3/13
  • 4. The NIS directive Article 4 and Annex II of the NIS directive (EU 2016/1148) defines Healthcare as a critical sector Security is not only a technical, but also a legal requirement The regulatory prescriptions in terms of security requirements span all of the levels of the healthcare environment But security expertise is a scarce resource! According to European Commission estimates, the cybersecurity workforce gap in Europe will reach 350.000 by 2022 Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 4/13
  • 5. Our contribution We propose a novel approach based on the combination of RMIAS to cope with the scarcity of cybersecurity expertise throughout the lifecycle of medical devices RAMI 4.0 to tackle interoperability and sustainability aspects of Internet of Medical Things IHE and FHIR standards, as selected by international healthcare bodies (USA, and Europe) Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 5/13
  • 6. RMIAS Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 6/13
  • 7. RMIAS / 2 Business analysts and IT Security Architects use the Security Goals as helper to find countermeasures RMIAS cycles depends on a specific Security Development Life Cycle (SDLC) SDLC is not prescribed ⇒ RMIAS specifications allow flexibility We introduce RAMI 4.0 as SDLC Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 7/13
  • 8. RAMI 4.0 The Reference Architectural Model for Industry 4.0 aims at uniforming sector-neutral standards for services and their semantics, creating value chains spanning different sectors. Used in I-IoT, in Smart Grids, self-driving cars, Smart Cities Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 8/13
  • 9. IHE and FHIR IHE and FHIR are standards recognized by the WHO, EU commission, and the USA Health IT dept to establish IT Healthcare infrastructures FHIR provides standards to connect medical devices to IT infrastructures IHE governs FHIR (and Continua) standards to provide sustainability Our approach We dissect the requirements of an IHE-based infrastructure integrating ubiquitous medical devices into corresponding RAMI layers, and for each layer, we apply a RMIAS cycle Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 9/13
  • 10. MOSAA We are developing MOdular Security Aware Architecture Description Language, MOSAA, with the aim to enable the IT Security Architect with a toolchain to build solution architectures using the RMIAS and IHE models It is based on formal methods: MOSAA has a simple syntax (inspired by JSON) and a formal semantics The execution of MOSAA results in a set of SMT-LIBv2 files to be evaluated by a SMT solver (we use Microsoft Z3) If the SMT solver returns sat, then the architecture is secure by design (i.e., fulfills the security policy expressed using goals and countermeasures) It is under development using xText and Xtend, to allow the building of Web-Based and Standalone user interfaces Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 10/13
  • 11. Conclusions Healthcare is a critical sector, and investments on IT infrastructures and medical devices have to be sustained over years To support this investment, we introduced the use of RAMI 4.0, the architectural model of I-IoT, that, combined with RMIAS and IHE/FHIR, enables the creation of architecture which are secure-by-design We are developing a toolchain, MOSAA, which uses formal methods to create SDLC-agnostic architectures Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 11/13
  • 12. Input from Attendees / Discussion Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 12/13
  • 13. Thank You Masi et al.: MOSAA CC Massimiliano Masi eHPWAS, Barcelona, October 21, 2019 13/13