Table of Contents

 1     Scope          
 2     References              
 3     Terms and definitions         
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations and acronyms           
 5     Relationship between the biometric e-health service model and privacy   
        5.1     e-health sensor types              
        5.2     Biometric information              
        5.3     Privacy information   
 6     General overview of the integration model             
        6.1     Functional requirements        
        6.2     Authentication procedure      
 7     Application of the biometric-based integrated e-health model – Terminal application        
 8     Threat for telemedicine (e-health)               
        8.1     Enhanced personal authentication     
        8.2     Personal information leak from e-health terminal      
        8.3     Use of unauthorized biosensor           
        8.4     Use of unauthorized sensor  
        8.5     Security protocol that ensures availability       
        8.6     Personal information leak from centre            
        8.7     Medical information leak from centre              
 9     Security requirements for each threat        
        9.1     Enhanced personal authentication     
        9.2     Personal information leak from terminal         
        9.3     Unauthorized use of biometric sensor             
        9.4     Unauthorized use of e-health sensor               
        9.5     Security protocol that ensures availability       
        9.6     Personal information leak from centre            
        9.7     Medical information leak from the e-health centre   
10     Countermeasures for each threat
       10.1     Enhanced personal authentication   
       10.2     Personal information leaks from e-health terminal   
       10.3     Unauthorized use of biometric sensor            
       10.4     Unauthorized use of e-health sensor              
       10.5     Personal information leaks from e-health centre      
       10.6     Medical information leaks from e-health centre        
Appendix I – Use cases    
        I.1                  Introduction     
        I.2                  Use cases          
Bibliography