Different IT applications require different security services. We have been working in the area of e-health applications in a mobile environment, and we have needed to integrate specific security services. We present those security services for mobile e-health services and how we have implemented them. First, the different security threats specially oriented to the e-health applications are described, like patients' data eavesdropping and manipulation. Afterwards, the different security mechanisms to address these specific security threats are described, e.g. data confidentiality and integrity, together with the restrictions of dynamic IP addresses. Following, the specification of security services requirements and the implementation possibilities to address them in the mobile e-health services are described. As an example of security services integrated into an e-health system, we include the description of the mobile e-health service MobiHealth, an application developed under the MobiHealth project, cofunded by the European Commission (IST-2001-36006), focused on the security services added to it.
[1]
Thomas G. Zimmerman,et al.
: Near-field
,
2022
.
[2]
Christopher Allen,et al.
The TLS Protocol Version 1.0
,
1999,
RFC.
[3]
Dimitri Konstantas,et al.
Healthcare PANs: Personal Area Networks for trauma care and home care
,
2001
.
[4]
Thoams Guthrie Zimmerman.
Personal area networks (PAN) : near-field intra-body communication
,
1995
.
[5]
Stephen T. Kent,et al.
Security Architecture for the Internet Protocol
,
1998,
RFC.
[6]
Hugo Krawczyk,et al.
A Security Architecture for the Internet Protocol
,
1999,
IBM Syst. J..
[7]
Eric Rescorla,et al.
HTTP Over TLS
,
2000,
RFC.