000063264 001__ 63264 000063264 005__ 20190709135455.0 000063264 0247_ $$2doi$$a10.1109/ACCESS.2017.2752176 000063264 0248_ $$2sideral$$a102112 000063264 037__ $$aART-2017-102112 000063264 041__ $$aeng 000063264 100__ $$aGuillén-Gámez, Francisco D. 000063264 245__ $$aA proposal to improve the authentication process in m-health environments 000063264 260__ $$c2017 000063264 5060_ $$aAccess copy available to the general public$$fUnrestricted 000063264 5203_ $$aSpecial Section: Mission Critical Public-Safety Communications: Architectures, Enabling Technologies, and Future Applications One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially, when using ICT for providing access to health services and information. In these scenarios, it is essential to determine and verify the identity of users to ensure the security of the network. A way of authenticating the identity of each patient, doctor or any stakeholder involved in the process is to use a software application that analyzes the face of them through the cams integrated in their devices. The selection of an appropriate facial authentication software application requires a fair comparison between alternatives through a common database of face images. Users usually carry out authentication with variations in their aspects while accessing to health services. This paper presents both 1) a database of facial images that combines the most common variations that can happen in the participants and 2) an algorithm that establishes different levels of access to the data based on data sensitivity levels and the accuracy of the authentication. 000063264 540__ $$9info:eu-repo/semantics/openAccess$$aby$$uhttp://creativecommons.org/licenses/by/3.0/es/ 000063264 590__ $$a3.557$$b2017 000063264 591__ $$aCOMPUTER SCIENCE, INFORMATION SYSTEMS$$b24 / 148 = 0.162$$c2017$$dQ1$$eT1 000063264 591__ $$aTELECOMMUNICATIONS$$b19 / 87 = 0.218$$c2017$$dQ1$$eT1 000063264 591__ $$aENGINEERING, ELECTRICAL & ELECTRONIC$$b48 / 260 = 0.185$$c2017$$dQ1$$eT1 000063264 592__ $$a0.548$$b2017 000063264 593__ $$aComputer Science (miscellaneous)$$c2017$$dQ1 000063264 593__ $$aEngineering (miscellaneous)$$c2017$$dQ1 000063264 593__ $$aMaterials Science (miscellaneous)$$c2017$$dQ2 000063264 655_4 $$ainfo:eu-repo/semantics/article$$vinfo:eu-repo/semantics/publishedVersion 000063264 700__ $$0(orcid)0000-0002-2726-6760$$aGarcía-Magariño, Iván$$uUniversidad de Zaragoza 000063264 700__ $$aBravo-Agapito, Javier 000063264 700__ $$0(orcid)0000-0002-4773-4904$$aLacuesta, Raquel$$uUniversidad de Zaragoza 000063264 700__ $$aLloret, Jaime 000063264 7102_ $$15007$$2570$$aUniversidad de Zaragoza$$bDpto. Informát.Ingenie.Sistms.$$cÁrea Lenguajes y Sistemas Inf. 000063264 773__ $$g5, 1 (2017), 22530-22544$$pIEEE Access$$tIEEE Access$$x2169-3536 000063264 8564_ $$s2011285$$uhttps://zaguan.unizar.es/record/63264/files/texto_completo.pdf$$yVersión publicada 000063264 8564_ $$s119865$$uhttps://zaguan.unizar.es/record/63264/files/texto_completo.jpg?subformat=icon$$xicon$$yVersión publicada 000063264 909CO $$ooai:zaguan.unizar.es:63264$$particulos$$pdriver 000063264 951__ $$a2019-07-09-11:42:52 000063264 980__ $$aARTICLE