{"id":222,"date":"2022-07-27T15:52:31","date_gmt":"2022-07-27T19:52:31","guid":{"rendered":"https:\/\/carleton.ca\/e-healthsecurity\/?page_id=222"},"modified":"2022-09-20T16:42:21","modified_gmt":"2022-09-20T20:42:21","slug":"milestones","status":"publish","type":"page","link":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/","title":{"rendered":"Milestones"},"content":{"rendered":"<h2>Primary Milestones<\/h2>\n<div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-107\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image1-240x246.png\" alt=\"\" width=\"240\" height=\"246\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image1-240x246.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image1-160x164.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image1.png 297w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Attack Evaluation and Mitigation<\/h3>\n<ul>\n<li dir=\"ltr\">Modeling threats to e-Health systems<\/li>\n<li dir=\"ltr\">Developing realizable attack scenarios and analysis of their exploitability<\/li>\n<li dir=\"ltr\">Analyzing the impact of attacks and the most critical risks to the system assets<\/li>\n<li dir=\"ltr\">Recommendation of countermeasures<\/li>\n<\/ul>\n<p dir=\"ltr\"><\/div><\/div>\n<p dir=\"ltr\"><div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-117\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image2-240x248.png\" alt=\"\" width=\"240\" height=\"248\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image2-240x248.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image2-160x165.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image2.png 296w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div><\/p>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Secure Horizontal IoT Platform<\/h3>\n<ul>\n<li dir=\"ltr\">Developing a security management layer over a horizontal IoT platform<\/li>\n<\/ul><\/div><\/div>\n<p><\/p>\n<p><\/p>\n<div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-153\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image3-240x238.png\" alt=\"\" width=\"240\" height=\"238\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image3-240x238.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image3-160x159.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image3.png 297w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Medical Device Integration<\/h3>\n<ul>\n<li dir=\"ltr\">Connecting medical devices, with different communication technologies, to a common platform<\/li>\n<\/ul><\/div><\/div>\n<p><\/p>\n<p><\/p>\n<div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-154\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image4-240x239.png\" alt=\"\" width=\"240\" height=\"239\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image4-240x239.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image4-160x159.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image4-200x200.png 200w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image4.png 297w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Trust Management and Access Control<\/h3>\n<ul>\n<li dir=\"ltr\">Evaluating the trust level of medical devices<\/li>\n<li dir=\"ltr\">Developing an attribute-based access control model to manage access to patients&#8217; data<\/li>\n<\/ul><\/div><\/div>\n<p><\/p>\n<p><\/p>\n<div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-155\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image5-240x236.png\" alt=\"\" width=\"240\" height=\"236\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image5-240x236.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image5-160x157.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image5.png 295w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Security Policies and Guidelines<\/h3>\n<ul>\n<li dir=\"ltr\">Analyzing different security policies to establish suitable security guidelines for e-health systems.<\/li>\n<\/ul><\/div><\/div>\n<p><\/p>\n<p><\/p>\n<div class=\"columns\"><div class=\"columns__two\"><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-156\" src=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image6-240x240.png\" alt=\"\" width=\"240\" height=\"240\" srcset=\"https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image6-240x240.png 240w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image6-160x160.png 160w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image6-200x200.png 200w, https:\/\/carleton.ca\/e-healthsecurity\/wp-content\/uploads\/image6.png 297w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/p><\/div>\n<div class=\"columns__two\"><h3 dir=\"ltr\">Best Practices Guide<\/h3>\n<ul>\n<li dir=\"ltr\">Developing best practices for safe and secure use of e-health systems<\/li>\n<li dir=\"ltr\">Developing a best practices guide to be used by different healthcare providers across Canada<\/li>\n<\/ul><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Primary Milestones<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":161,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Milestones - Security for E-health IoT Systems<\/title>\n<meta name=\"description\" content=\"Primary Milestones        &nbsp;  &nbsp;      &nbsp;  &nbsp;      &nbsp;  &nbsp;      &nbsp;  &nbsp;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/\",\"url\":\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/\",\"name\":\"Milestones - Security for E-health IoT Systems\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/e-healthsecurity\/#website\"},\"datePublished\":\"2022-07-27T19:52:31+00:00\",\"dateModified\":\"2022-09-20T20:42:21+00:00\",\"description\":\"Primary Milestones &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/e-healthsecurity\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Project\",\"item\":\"https:\/\/carleton.ca\/e-healthsecurity\/project\/overview\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Milestones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/e-healthsecurity\/#website\",\"url\":\"https:\/\/carleton.ca\/e-healthsecurity\/\",\"name\":\"Security for E-health IoT Systems\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/e-healthsecurity\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Milestones - Security for E-health IoT Systems","description":"Primary Milestones        &nbsp;  &nbsp;      &nbsp;  &nbsp;      &nbsp;  &nbsp;      &nbsp;  &nbsp;","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/","url":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/","name":"Milestones - Security for E-health IoT Systems","isPartOf":{"@id":"https:\/\/carleton.ca\/e-healthsecurity\/#website"},"datePublished":"2022-07-27T19:52:31+00:00","dateModified":"2022-09-20T20:42:21+00:00","description":"Primary Milestones &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;","breadcrumb":{"@id":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/e-healthsecurity\/project\/milestones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/e-healthsecurity\/"},{"@type":"ListItem","position":2,"name":"Project","item":"https:\/\/carleton.ca\/e-healthsecurity\/project\/overview\/"},{"@type":"ListItem","position":3,"name":"Milestones"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/e-healthsecurity\/#website","url":"https:\/\/carleton.ca\/e-healthsecurity\/","name":"Security for E-health IoT Systems","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/e-healthsecurity\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/pages\/222"}],"collection":[{"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/pages\/222\/revisions"}],"predecessor-version":[{"id":240,"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/pages\/222\/revisions\/240"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/pages\/161"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/e-healthsecurity\/wp-json\/wp\/v2\/media?parent=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}