ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
0
references
Top references
cited by
7
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,461
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
IoT Security Risk Management Model for Secured Practice in Healthcare Environment
Author(s):
Huraizah Zakaria
,
Nur Abu Bakar
,
Noor Hafizah Hassan
,
Suraya Yaacob
,
H Zakaria
,
NA Abu Bakar
,
NH Hassan
,
S. Yaacob
Publication date:
2019
Journal:
Procedia Computer Science
Read this article at
ScienceOpen
Publisher
Further versions
open (via page says license)
Powered by
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Blockchain in Healthcare Today
Author and article information
Journal
DOI::
10.1016/j.procs.2019.11.238
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,461
Blockchain for Securing Healthcare Data Using Squirrel Search Optimization Algorithm
Authors:
B. Jaishankar
,
Santosh Vishwakarma
,
Prakash Mohan
…
Situation-Aware Dynamic Service Coordination in an IoT Environment
Authors:
Bo Cheng
,
Ming Wang
,
Shuai Zhao
…
On Synthesis of Runtime Security Monitor for Real-time IoT Applications
Authors:
Muhammad Taimoor Khan
,
Dimitrios Serpanos
,
Howard Shrobe
See all similar
Cited by
7
Smart City Dimensions and Associated Risks: Review of literature
Authors:
Reem Al Sharif
,
Shaligram Pokharel
Internet of Things Based Intelligent Techniques in Workable Computing: An Overview
Authors:
Jiayi Guo
,
Shah Nazir
,
Zhongguo Yang
Risk and UCON-based access control model for healthcare big data
Authors:
Rong Jiang
,
Xue Chen
,
Yimin Yu
…
See all cited by