Dependability Issues of Pervasive Computing in a Healthcare Environment

  • Jürgen Bohn
  • Felix Gärtner
  • Harald Vogt
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2802)


This paper proposes that the healthcare domain can serve as an archetypical field of research in pervasive computing. We present this area from a technological perspective, arguing that it provides a wide range of possible applications of pervasive computing technology. We further recognize that pervasive computing technology is likely to create concerns about the security of healthcare systems, due to increased data aggregation, ubiquitous access, and increasing dependency on technical solutions. But we also justify why the same technology can help building more robust, more dependable systems that increase the quality of healthcare. We identify building blocks that are necessary to achieve this goal: a pervasive middleware, appropriate handling of exceptional situations, and dependability assertions for small devices.


Access Control Access Point Intrusion Detection System Pervasive Computing Dependability Issue 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Agency for Healthcare Research and Quality (February 2003),
  2. 2.
    Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of the Practice of Intrusion Detection Technologies. Technical Report CMU/SEI-99TR-028, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213-3890, USA (2000)Google Scholar
  3. 3.
    American Accounting Association (AAA), Home page
  4. 4.
    Anderson, R.J.: A Security Policy Model for Clinical Information Systems. In: IEEE Symposium on Security and Privacy (1996)Google Scholar
  5. 5.
    Arens, A.A., Loebbecke, J.K.: Auditing: An Integrated Approach, 8th edn. Prentice-Hall, Englewood Cliffs (1999)Google Scholar
  6. 6.
    Bacon, J., Moody, K., Yao, W.: Access Control and Trust in the Use of Widely Distributed Services. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 295. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Baldwin, F.D.: Putting your assets to work. Healthcare Informatics (April 2001)Google Scholar
  8. 8.
    Bardram, J.E., Christensen, H.B.: Middleware for Pervasive Healthcare. In: Advanced TopicWorkshop: Middleware for Mobile Computing. IFIP/ACMMiddleware 2001 Conference (2001),,
  9. 9.
    Barrett, M.J.: The evolving computerized medical record. Healthcare Informatics (May 2000)Google Scholar
  10. 10.
    Bass, T.: Intrusion Detection Systems and Multisensor Data Fusion. Communications of the ACM 43(4), 99–105 (2000)CrossRefGoogle Scholar
  11. 11.
    Bernstein, P., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)Google Scholar
  12. 12.
    Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Allgegenwart und Verschwinden des Computers – Leben in einerWelt smarter Alltagsdinge. In: Grötker, R. (ed.) Privat! Kontrollierte Freiheit in einer vernetzten Welt, Heise-Verlag, Hannover (2003)Google Scholar
  13. 13.
    Brown, D.J., Suckow, B., Wang, T.: A Survey of Intrusion Detection Systems (2001)Google Scholar
  14. 14.
    Kunze, C., Grossmann, U., Storkand, W., Müller-Glaser, K.D.: Application of Ubiquitous Computing in Personal Health Monitoring Systems. In Biomedizinische Technik. Beiträge zur 36. Jahrestagung der Deutschen Gesellschaft für Biomedizinische Technik 47, 360–362 (2002),
  15. 15.
    Cachin, C., Kursawe, K., Shoup, V.: Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement Using Cryptography. In: Proceedings of the Symposium on Principles of Distributed Computing, Portland, Oregon, pp. 123–132 (2000)Google Scholar
  16. 16. Medical errors kill tens of thousands annually, panel says (November 1999),
  17. 17.
    DeJesus, E.: Disease management in a warehouse. Healthcare Informatics (September 1999)Google Scholar
  18. 18.
    Denley, I., Smith, S.W.: Privacy in Clinical Information Systems in Secondary Care. British Medical Journal 318, 1328–1330 (1999)Google Scholar
  19. 19.
    Flörkemeier, C., Lampe, M., Schoch, T.: The Smart Box Concept for Ubiquitous Computing Environments. In: Proc. of Smart Objects Conference SOC (2003)Google Scholar
  20. 20.
    Hightower, J., Borriello, G.: Location Systems for Ubiquitous Computing. Computer 34(8), 57–66 (2001)CrossRefGoogle Scholar
  21. 21.
    The Health Insurance Portability and Accountability Act (HIPAA),
  22. 22.
    Healthcare Informatics. On record: New contracts and installations. Healthcare Informatics (1997) (today)Google Scholar
  23. 23.
    Joch, A.: Right place, right time. Healthcare Informatics (May 2000)Google Scholar
  24. 24.
    Kistler, J.J., Satyanarayanan, M.: Disconnected Operation in the Coda File System. ACM Transactions on Computer Systems 10(1), 3–25 (1992)CrossRefGoogle Scholar
  25. 25.
    Kohn, L.T., Corrigan, J. (eds.): To Err Is Human: Building a Safer Health System. National Academy Press (2000),
  26. 26.
    Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)zbMATHCrossRefGoogle Scholar
  27. 27.
    Lunt, T.F.: Automated Audit Trail Analysis and Intrusion Detection: A Survey. In: Proceedings of the 11th National Computer Security Conference, Baltimore, MD (1988)Google Scholar
  28. 28.
    Marietti, C.: Delivering the goods: How healthcare can plug the leak of billions of supply-chain dollars. Healthcare Informatics (August 1999)Google Scholar
  29. 29.
    Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  30. 30.
    Napoli, M.: Preventing medical errors: A call to action. Health Facts (January 2000)Google Scholar
  31. 31.
    Clifford Neumann, B., Ts’o, T.: An authentication service for computer networks. IEEE Communications 32(9), 33–38 (1994)CrossRefGoogle Scholar
  32. 32.
    Várady, P., Benyó, Z., Benyó, B.: An Open Architecture Patient Monitoring System Using Standard Technologies. IEEE Transactions on Information Technology in Biomedicine 6(1), 95–98 (2002)CrossRefGoogle Scholar
  33. 33.
    McGraw-Hill Healthcare Information Programs. Industry Report: Health Insurance Portability and Accountability Act. Healthcare Informatics (2000)Google Scholar
  34. 34.
    Rabin, M.O.: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM 36(2), 335–348 (1989)zbMATHCrossRefMathSciNetGoogle Scholar
  35. 35.
    Ranum, M.J.: Thinking About Firewalls. Technical report, Trusted Information Systems, Inc. Glenwood, Maryland (1993)Google Scholar
  36. 36.
    (February 2003),
  37. 37.
    Stammer, L.: Seeking SAFETY. Healthcare Informatics (October 2000)Google Scholar
  38. 38.
    Tsudik, G., Summers, R.: AudES: An Expert System for Security Auditing. In: Proceedings of the AAAI Conference on Innovative Application in Artificial Intelligence (1990)Google Scholar
  39. 39.
    Weiser, M.: The Computer for the 21st Century. Scientific American, 94–104 (September 1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jürgen Bohn
    • 1
  • Felix Gärtner
    • 2
  • Harald Vogt
    • 1
  1. 1.Department for Computer Science, Distributed Systems GroupEidgenössische Technische Hochschule Zürich (ETHZ)ZürichSwitzerland
  2. 2.Departement de Systèmes de Communications, Laboratoire de Programmation DistribuéeÉcole Polytechnique Fédérale de Lausanne (EPFL)LausanneSwitzerland

Personalised recommendations