Skip to main content

2015 | OriginalPaper | Buchkapitel

28. Implementation of Policy-Based Personalized Wellness Service in IoT Environment

verfasst von : Namje Park

Erschienen in: Future Information Technology - II

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID-based wellness service in IoT Environment. We propose a secure mobile RFID-based wellness service framework leveraging mobile networking. The framework provides a means for safe use of mobile phone-based RFID services by providing security to personalized wellness service.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kang T, Lee H, Park D, Bang H, Park N (2013) Creation mechanism for access group based on user privacy policy-based protection. In: MUSIC, pp 125–130 Kang T, Lee H, Park D, Bang H, Park N (2013) Creation mechanism for access group based on user privacy policy-based protection. In: MUSIC, pp 125–130
2.
Zurück zum Zitat Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B et al (eds) Information computing and applications, vol 106. Springer, Berlin, pp 72–79 Park N (2010) Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu R, Zhang Y, Liu B et al (eds) Information computing and applications, vol 106. Springer, Berlin, pp 72–79
3.
Zurück zum Zitat Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8:205–219CrossRef Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8:205–219CrossRef
4.
Zurück zum Zitat Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI, vol 1, pp 488–496 Park N (2011) Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In: ICCCI, vol 1, pp 488–496
5.
Zurück zum Zitat Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: ICHIT, vol 2, pp 467–474 Park N (2011) Customized healthcare infrastructure using privacy weight level based on smart device. In: ICHIT, vol 2, pp 467–474
6.
Zurück zum Zitat Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R, Chiu T, Hong C et al (eds) Semantic methods for knowledge management and communication, vol 381. Springer, Berlin, pp 319–327 Park N (2011) Secure data access control scheme using type-based re-encryption in cloud environment. In: Katarzyniak R, Chiu T, Hong C et al (eds) Semantic methods for knowledge management and communication, vol 381. Springer, Berlin, pp 319–327
7.
Zurück zum Zitat Park N (2012) Cell phone-based mobile RFID: models, mechanisms and its security. Int J Radio Freq Identif Technol Appl 4:67–101 Park N (2012) Cell phone-based mobile RFID: models, mechanisms and its security. Int J Radio Freq Identif Technol Appl 4:67–101
8.
Zurück zum Zitat Park N (2012) Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park JH, Kim J, Zou D et al (eds) Information technology convergence, secure and trust computing, and data management, vol 180. Springer, Netherlands, pp 265–271 Park N (2012) Mobile RFID/NFC linkage based on UHF/HF dual band’s integration in U-sensor network era. In: Park JH, Kim J, Zou D et al (eds) Information technology convergence, secure and trust computing, and data management, vol 180. Springer, Netherlands, pp 265–271
9.
Zurück zum Zitat Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, vol 17, Springer, pp 653–664 Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, vol 17, Springer, pp 653–664
10.
Zurück zum Zitat Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: APWeb workshops, pp 741–748 Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: APWeb workshops, pp 741–748
Metadaten
Titel
Implementation of Policy-Based Personalized Wellness Service in IoT Environment
verfasst von
Namje Park
Copyright-Jahr
2015
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-9558-6_28

Neuer Inhalt