1 Scope
2 References
3 Terms and
definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations and
acronyms
5 Relationship
between the biometric e-health service model and privacy
5.1 e-health sensor types
5.2 Biometric information
5.3 Privacy information
6 General overview
of the integration model
6.1 Functional requirements
6.2 Authentication procedure
7 Application of
the biometric-based integrated e-health model – Terminal application
8 Threat for
telemedicine (e-health)
8.1 Enhanced personal authentication
8.2 Personal information leak from
e-health terminal
8.3 Use of unauthorized biosensor
8.4 Use of unauthorized sensor
8.5 Security protocol that ensures
availability
8.6 Personal information leak from
centre
8.7 Medical information leak from
centre
9 Security
requirements for each threat
9.1 Enhanced personal authentication
9.2 Personal information leak from
terminal
9.3 Unauthorized use of biometric
sensor
9.4 Unauthorized use of e-health
sensor
9.5 Security protocol that ensures
availability
9.6 Personal information leak from
centre
9.7 Medical information leak from
the e-health centre
10 Countermeasures for each threat
10.1 Enhanced personal authentication
10.2 Personal information leaks from
e-health terminal
10.3 Unauthorized use of biometric
sensor
10.4 Unauthorized use of e-health
sensor
10.5 Personal information leaks from
e-health centre
10.6 Medical information leaks from
e-health centre
Appendix I – Use cases
I.1 Introduction
I.2 Use cases
Bibliography