Software Engineering for Assisted Living. Gunter, C., A. In Proceedings of the ACM workshop on Security and privacy in medical and home-care systems, 11, 2009. ACM Press.
bibtex   
@inProceedings{
 title = {Software Engineering for Assisted Living},
 type = {inProceedings},
 year = {2009},
 keywords = {fixnot-doi,healthcare,summarized,ubicomp},
 month = {11},
 publisher = {ACM Press},
 id = {e52b76b3-7350-3fad-835a-da564bbb7749},
 created = {2018-07-12T21:30:51.738Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:30:51.738Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {gunter:assisted-living},
 source_type = {inproceedings},
 notes = {Keynote lecture<br/>[dave] No paper in the proceedings. Assisted-living facilities are increasingly interested in improving efficiency, ie, maintaining residents' health while reducing costs. Tech may help. Challenges: usability, reliability, interoperability, extensibility, demonstrating confidence, security, privacy. Case study about home-security monitoring; needs to be usable and to easily weed out false positives. Assisted-living paradox: the more remote-monitoring is needed, the less easily it can be used (because elderly people may be less able to live with the technology, and staff physicians are busy with many patients). Limit IT responsibilities of residents and clinicians, out-source the IT management to IT professionals. They have an i-living prototype architecture; implementation based on SOAP. Use nested encryption. Google for 'Cyber-security for assisted living'.},
 private_publication = {false},
 bibtype = {inProceedings},
 author = {Gunter, Carl A},
 booktitle = {Proceedings of the ACM workshop on Security and privacy in medical and home-care systems}
}

Downloads: 0