Affiliation:
1. University of Carthage, Tunisia
Abstract
Healthcare applications are increasingly being used due to the safety and convenience brought to patients' life and healthcare professionals, respectively. Nevertheless, the use of weak authentication techniques and vulnerable communication protocols makes these applications threatened by specific classes of security attacks and e-crimes. The latter threaten the privacy, the safety and even the life of the persons using these applications, due to the fact that they handle sensitive information and implement complex and critical features. This chapter focuses on postmortem investigation of crimes on healthcare applications. After classifying crimes targeting healthcare applications, the requirements for the design of appropriate postmortem investigation system, are discussed. A literature review of proposals related to the investigation of crimes in healthcare applications together with a discussion of the advanced issues are also provided in this chapter.
Reference30 articles.
1. A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient.;M.Al-Qurishi;International Journal of Distributed Sensor Networks,2015
2. E-AMBULANCE: Real-Time Integration Platform for Heterogeneous Medical Telemetry System
3. Wireless Sensor Networks for Ambient Assisted Living
4. Astorga, J., Astorga, J. C., Jacob, E., Toledo, N., & Higuero, M. (2014). Securing access to next generation IP-enabled pacemakers and ICDs using Ladon. Journal of Ambient Intelligence and Smart Environments, 6(2), 157-177.
5. Categories of digital investigation analysis techniques based on the computer history model