000063264 001__ 63264
000063264 005__ 20190709135455.0
000063264 0247_ $$2doi$$a10.1109/ACCESS.2017.2752176
000063264 0248_ $$2sideral$$a102112
000063264 037__ $$aART-2017-102112
000063264 041__ $$aeng
000063264 100__ $$aGuillén-Gámez, Francisco D.
000063264 245__ $$aA proposal to improve the authentication process in m-health environments
000063264 260__ $$c2017
000063264 5060_ $$aAccess copy available to the general public$$fUnrestricted
000063264 5203_ $$aSpecial Section: Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications
One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially, when using ICT for providing access to health services and information. In these scenarios, it is essential to determine and verify the identity of users to ensure the security of the network. A way of authenticating the identity of each patient, doctor or any stakeholder involved in the process is to use a software application that analyzes the face of them through the cams integrated in their devices. The selection of an appropriate facial authentication software application requires a fair comparison between alternatives through a common database of face images. Users usually carry out authentication with variations in their aspects while accessing to health services. This paper presents both 1) a database of facial images that combines the most common variations that can happen in the participants and 2) an algorithm that establishes different levels of access to the data based on data sensitivity levels and the accuracy of the authentication.
000063264 540__ $$9info:eu-repo/semantics/openAccess$$aby$$uhttp://creativecommons.org/licenses/by/3.0/es/
000063264 590__ $$a3.557$$b2017
000063264 591__ $$aCOMPUTER SCIENCE, INFORMATION SYSTEMS$$b24 / 148 = 0.162$$c2017$$dQ1$$eT1
000063264 591__ $$aTELECOMMUNICATIONS$$b19 / 87 = 0.218$$c2017$$dQ1$$eT1
000063264 591__ $$aENGINEERING, ELECTRICAL & ELECTRONIC$$b48 / 260 = 0.185$$c2017$$dQ1$$eT1
000063264 592__ $$a0.548$$b2017
000063264 593__ $$aComputer Science (miscellaneous)$$c2017$$dQ1
000063264 593__ $$aEngineering (miscellaneous)$$c2017$$dQ1
000063264 593__ $$aMaterials Science (miscellaneous)$$c2017$$dQ2
000063264 655_4 $$ainfo:eu-repo/semantics/article$$vinfo:eu-repo/semantics/publishedVersion
000063264 700__ $$0(orcid)0000-0002-2726-6760$$aGarcía-Magariño, Iván$$uUniversidad de Zaragoza
000063264 700__ $$aBravo-Agapito, Javier
000063264 700__ $$0(orcid)0000-0002-4773-4904$$aLacuesta, Raquel$$uUniversidad de Zaragoza
000063264 700__ $$aLloret, Jaime
000063264 7102_ $$15007$$2570$$aUniversidad de Zaragoza$$bDpto. Informát.Ingenie.Sistms.$$cÁrea Lenguajes y Sistemas Inf.
000063264 773__ $$g5, 1 (2017), 22530-22544$$pIEEE Access$$tIEEE Access$$x2169-3536
000063264 8564_ $$s2011285$$uhttps://zaguan.unizar.es/record/63264/files/texto_completo.pdf$$yVersión publicada
000063264 8564_ $$s119865$$uhttps://zaguan.unizar.es/record/63264/files/texto_completo.jpg?subformat=icon$$xicon$$yVersión publicada
000063264 909CO $$ooai:zaguan.unizar.es:63264$$particulos$$pdriver
000063264 951__ $$a2019-07-09-11:42:52
000063264 980__ $$aARTICLE