0000000000365082

AUTHOR

Mohamed Abomhara

0000-0001-9151-7694

showing 8 related works from this author

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

Sharing With Care - Multidisciplinary Teams and Secure Access to Electronic Health Records

2018

Published: Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies Vol 5 2018

EngineeringMedical education020205 medical informaticsbusiness.industryMultidisciplinary approach0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingJoint (building)02 engineering and technologyHealth recordsbusinessProceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Access Control Model for Cooperative Healthcare Environments: Modeling and Verification

2016

Integrated use of electronic health records (EHRs) seem both promising and necessary in improving the quality and delivery of health services. This allows healthcare providers access to information they require to provide rapid patient care. Of course, when sensitive information is shared among a group of people within or across organizations, enforceable security and privacy control over the information flow is a key aspect. In this study, an access control model for cooperative healthcare environments is presented. A work-based access control (WBAC) model is proposed by introducing the concept of team role and modifying the user-role assignment model from previous work. Verification indic…

Knowledge managementComputer sciencebusiness.industrymedia_common.quotation_subjectControl (management)Access control02 engineering and technologyInformation sensitivityWork (electrical)020204 information systemsHealth care0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingQuality (business)Information flow (information theory)businessmedia_common2016 IEEE International Conference on Healthcare Informatics (ICHI)
researchProduct

UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems

2016

A work-based access control (WBAC) model is proposed by introducing the team role concept and modifying the user-role assignment model from a previous work. The main goals of WBAC are flexibility, easy manageability, security, as well as suitability to support cooperative work of dynamic teams in healthcare environments. One of the major challenges of WBAC regards authorization constraints in terms of organizational policies. In this article, we show how Unified Modeling Language (UML) and Object Constraints Language (OCL) are utilized to design and analyze the authorization constraints of WBAC in cooperative engagements with complex scenarios in the collaborative healthcare domain. We also…

Flexibility (engineering)021110 strategic defence & security studies021103 operations researchKnowledge managementComputer sciencebusiness.industry0211 other engineering and technologiesAccess control02 engineering and technologyObject (computer science)Domain (software engineering)Work (electrical)Unified Modeling LanguagebusinessSoftware engineeringcomputerObject Constraint Languagecomputer.programming_languageEclipse2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

Towards Risk-aware Access Control Framework for Healthcare Information Sharing

2018

business.industryComputer scienceInformation sharingInternet privacyHealth care0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processingAccess control02 engineering and technologybusinessProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

Towards an Access Control Model for Collaborative Healthcare Systems

2016

In this study, an access control model for collaborative healthcare systems is proposed. Collaboration requirements, patient data confidentiality and the need for flexible access for healthcare providers through the actual work they must fulfill as part of their duties are carefully addressed. The main goal is to provide an access control model that strikes a balance between collaboration and safeguarding sensitive patient information.

Knowledge managementWork (electrical)business.industryComputer sciencePatient informationAccess controlConfidentialityPatient dataSafeguardingbusinessHealthcare providersHealthcare systemProceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies
researchProduct

An Access Control Model to Facilitate Healthcare Information Access in Context of Team Collaboration

2018

The delivery of healthcare relies on the sharing of patients information among a group of healthcare professionals (so-called multidisciplinary teams (MDTs)). At present, electronic health records (EHRs) are widely utilized system to create, manage and share patient healthcare information among MDTs. While it is necessary to provide healthcare professionals with privileges to access patient health information, providing too many privileges may backfire when healthcare professionals accidentally or intentionally abuse their privileges. Hence, finding a middle ground, where the necessary privileges are provided and malicious usage are avoided, is necessary. This thesis highlights the access c…

VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct