mHealth scenario as the security framework was
developed in a modular and independent way, using
available and well tested standards and technologies.
As future work, the solution will be validated for
its content, usability as well as legislation and privacy
requirements, and will integrate into the SoTRAACE
model (Moura, 2017). SoTRAACE allows to include
features that take into account a risk-based
personalized and contextual based decision, adapted
to every mHealth interaction. Delegation can be one
of those useful features on the way to a more patient
empowered, dynamic, usable and secure mHealth.
ACKNOWLEDGEMENTS
This work is supported by project NORTE-01-0247-
FEDER-033275, financed by the North Portugal
Regional Operational Programme (NORTE 2020),
under the PORTUGAL 2020 Partnership Agreement,
and through the European Regional Development
Fund (ERDF). A. Ferreira is also with TagUBig -
Taming Your Big Data (IF/00693/2015) from
Researcher FCT Program funded by National Funds
through FCT.
REFERENCES
AIRDOC, 2018. AIRDOC - Smart Mobile Application for
Individualized Support and Monitoring of the
Respiratory Function and Sounds of Chronic
Obstructive Patients. Available at:
http://cintesis.eu/en/portfolio-items/airdoc/ (Accessed:
September 2019).
Boulos, M., Brewer, A., Karimkhani, C., Buller, D.,
Dellavalle, R., 2014. Mobile medical and health apps:
state of the art, concerns, regulatory control and
certification. Online J Public Health Inform, 5, pp. 229-
229.
Ferretti, L., Marchetti, M., Colajanni, L., 2017. Verifiable
Delegated Authorization for User-Centric
Architectures and an OAuth2 Implementation. In IEEE
41st Annual Computer Software and Applications
Conference (COMPSAC), pp. 718-723.
FHIR, 2011. Fast Healthcare Interoperability Resources.
Standard for health care data exchange, published by
HL7®. Available at: https://www.hl7.org/fhir/
(Accessed October 2019).
HAPI-FHIR, 2014. Open-source implementation of the
FHIR specification in Java. Available at:
https://hapifhir.io/. (Accessed October 2019).
Kotz, D., Gunter, C., Kumar, S., Weiner, J., 2016. Privacy
and security in mobile health: a research agenda.
Computer, 49(6):22-30.
Li, L., Huang, D., Shen, Z., Bouzefrane, S., 2013. A Cloud
based Dual-Root Trust Model for Secure Mobile Online
Transactions. In IEEE Wireless Communications and
Networking Conference (WCNC), pp. 4404-4409.
Lu, J., Zhou, J., 2011. Preventing delegation-based mobile
authentications from man-in-the-middle attacks.
Computer Standards & Interfaces, 34, pp. 314-326.
Luo, J., Dong, Q., Huang, D., Kang, M., 2018. Attribute
Based Encryption for Information Sharing on Tactical
Mobile Networks. In IEEE Military Communications
Conference (MILCOM), pp. 1-9.
Ma, H., Zhang, R., Yang, G., Song, Z., He, K., Xiao, Y.,
2018. Efficient Fine-Grained Data Sharing Mechanism
for Electronic Medical Record Systems with Mobile
Devices. In IEEE Transactions on Dependable and
Secure Computing, pp. 1-1.
Moura, P., Fazendeiro, P., Vieira-Marques P., Ferreira, A.,
2017. SoTRAACE — socio-technical risk-adaptable
access control Model. In 2017 International Carnahan
Conference on Security Technology (ICCST), pp. 1–6.
Nguyen, D., Pathirana, P., Ding, M., Seneviratne, A., 2019.
Blockchain for secure EHRs sharing of mobile cloud
based ehealth systems. IEEE Access, 7, pp. 66792-
66806.
OAUTH 2, 2019. OAuth 2.0 [online]. Available at:
https://oauth.net/2/ (Accessed: August 2019).
Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E.,
Solanas, A., Patsakis, C., 2018. Security and privacy
analysis of mobile health applications: the alarming
state of practice. IEEE Access, 6:9390-9403.
Peng, W., Kanthawala, S., Yuan, S., Hussain, S., 2016. A
qualitative study of user perceptions of mobile health
apps.
BMC Public Health, 16.
Platt, D., 2016. The Joy of UX – User Experience and
Interactive Design for Developers. Addison-Wesley.
Prasad, A., Sorber, J., Stablein, T., Anthony, D., Kotz, d.,
2012. Understanding sharing preferences and behavior
for mHealth devices. In Proceedings of the 2012 ACM
workshop on Privacy in the electronic society, pp. 117-
128.
Pussewalage, H., Oleshchuk, V., 2017. Attribute based
access control scheme with controlled access
delegation for collaborative E-health environments.
Journal of Information Security and Applications, 37,
pp. 50-54.
Rabehaja, T., Pal, S., Hitchens, M., 2019. Design and
implementation of a secure and flexible access-right
delegation for resource constrained environments.
Future Generation Computer Systems, 99, pp. 593-608.
Schaad, A., Moffett, J., 2002. Delegation of Obligations. In
Proc. of the 3rd International Workshop on Policies for
Distributed Systems and Networks, pp. 25-35.
Schefer-Wenzl, Sigrid., Bukvova, H., Strembeck, Mark.,
2014. A Review of Delegation and Break-Glass Models
for Flexible Access Control Management. Lecture
Notes in Business Information Processing, 183.
Sciarreta, G., Carbone, R., Ranise, S., 2016. A delegated
authorization solution for smart-city mobile
applications. In IEEE 2nd International Forum on