Skip to main content
Top

2015 | OriginalPaper | Chapter

28. Implementation of Policy-Based Personalized Wellness Service in IoT Environment

Author : Namje Park

Published in: Future Information Technology - II

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID-based wellness service in IoT Environment. We propose a secure mobile RFID-based wellness service framework leveraging mobile networking. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized wellness service.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kang T, Lee H, Park D, Bang H, Park N (2013) Creation mechanism for access group based on user privacy policy-based protection. In: MUSIC, pp 125–130 Kang T, Lee H, Park D, Bang H, Park N (2013) Creation mechanism for access group based on user privacy policy-based protection. In: MUSIC, pp 125–130
2.
go back to reference Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B et al (eds) Information computing and applications, vol 106. Springer, Berlin, pp 72–79 Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B et al (eds) Information computing and applications, vol 106. Springer, Berlin, pp 72–79
3.
go back to reference Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8:205–219CrossRef Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8:205–219CrossRef
4.
go back to reference Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI, vol 1, pp 488–496 Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI, vol 1, pp 488–496
5.
go back to reference Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: ICHIT, vol 2, pp 467–474 Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: ICHIT, vol 2, pp 467–474
6.
go back to reference Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R, Chiu T, Hong C et al (eds) Semantic methods for knowledge management and communication, vol 381. Springer, Berlin, pp 319–327 Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R, Chiu T, Hong C et al (eds) Semantic methods for knowledge management and communication, vol 381. Springer, Berlin, pp 319–327
7.
go back to reference Park N (2012) Cell phone-based mobile RFID: models, mechanisms and its security. Int J Radio Freq Identif Technol Appl 4:67–101 Park N (2012) Cell phone-based mobile RFID: models, mechanisms and its security. Int J Radio Freq Identif Technol Appl 4:67–101
8.
go back to reference Park N (2012) Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park JH, Kim J, Zou D et al (eds) Information technology convergence, secure and trust computing, and data management, vol 180. Springer, Netherlands, pp 265–271 Park N (2012) Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park JH, Kim J, Zou D et al (eds) Information technology convergence, secure and trust computing, and data management, vol 180. Springer, Netherlands, pp 265–271
9.
go back to reference Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, vol 17, Springer, pp 653–664 Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, vol 17, Springer, pp 653–664
10.
go back to reference Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: APWeb workshops, pp 741–748 Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: APWeb workshops, pp 741–748
Metadata
Title
Implementation of Policy-Based Personalized Wellness Service in IoT Environment
Author
Namje Park
Copyright Year
2015
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-9558-6_28