Identifying security requirements and privacy concerns in digital health applications

10Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security and privacy by design are important paradigms for establishing high protection levels in the eHealth domain. This means that security requirements and privacy concerns are considered and analyzed from the very beginning of any system design. For a reliable and robust system architecture and specification we recommend a four-step approach: (1) Decompose the system and identify the assets on the basis of the multilateral security concept, i.e., taking all participants of an eHealth scenario as potential attackers into account; (2) evaluate threats based on STRIDE for a holistic and systematic modelling of threats; (3) define use case-specific security requirements and privacy concerns as well as their relevance; and (4) mitigate threats by deciding what countermeasures should be implemented. After the introduction of each step this chapter illustrates the practical use in a step-by-step walkthrough with a real-world eHealth scenario and discusses advantages of security and privacy by design as well as its limitations.

Cite

CITATION STYLE

APA

Brost, G. S., & Hoffmann, M. (2015). Identifying security requirements and privacy concerns in digital health applications. In Requirements Engineering for Digital Health (pp. 133–154). Springer International Publishing. https://doi.org/10.1007/978-3-319-09798-5_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free