Back to Results
First PageMeta Content
Smartphones / Multi-touch / IOS / ITunes / Cloud clients / MHealth / IPad / Operating system / Cloud computing / Computing / Software / System software


Amulet: A secure architecture for mHealth applications for low-power wearable devices Andres Molina-Markham† , Ronald Peterson† , Joseph Skinner† , Tianlong Yun† , Bhargav Golla∗ Kevin Freeman∗ , Travis Peter
Add to Reading List

Document Date: 2014-10-12 18:11:59


Open Document

File Size: 692,25 KB

Share Result on Facebook

City

New York / Memphis / /

Company

Atmel / Actuator / Motorola / Embedded Software / W. H. Press S. A. / Texas Instruments / Amulet / /

Country

United States / /

Currency

USD / /

/

Facility

A library / Dartmouth College / /

IndustryTerm

network communications / low-power wearable device / non-volatile memory technology / software guards / body-area mHealth network / proposed software architecture / app processor / smart low-power wearable device / medical devices / internal and external applications / event processor / wrist-worn device / peak-detection algorithm / low-power wearable devices / parser generator tool / Internet Programming / resource-constrained wearable hardware / external mHealth device / system software / trust management / personal mobile-health networks / thirdparty mHealth applications / service to applications / mobile applications / low-level software development / authentic system software / mobile health applications / health-related applications / mHealth applications / through audit / context-aware applications / body-area network / battery processing requests / trustworthy management / mHealth networks / real-time visualization / ultralow power wearable devices / wireless links / trusted computing base / wearable devices / wearable device / compilation tools / near-body devices / secure software architecture / verified software / software architecture / low-power hardware / basic services / internal applications / /

OperatingSystem

Linux / Android / /

Organization

National Science Foundation / Dartmouth College / US Federal Reserve / Institute for Security / Department of Health and Human Services / Clemson University / /

Person

Joseph Skinner / Ronald Peterson / David Kotz / Jacob Sorber / Bhargav Golla∗ Kevin Freeman / Andres Molina-Markham / Travis Peters / Ryan Halter / /

Position

app designer / translator / Storage Manager / Network Manager / Inter-processor Communication Manager / authorization manager / RT / General / model / the Authorization Manager / Secure Logging The Authorization Manager / lite authorization manager / Manager / Storage Manager / Network Manager / supervisor / full authorization manager / Manager in the amulet / The Sensor Manager / full authorization manager for configuration / onboard authorization manager / event supervisor / memory controller / human programmer / Manager / Crypto Service / and Authorization Manager / /

ProgrammingLanguage

C / /

ProvinceOrState

New York / Manitoba / /

Technology

RAM / app processor / Linux / API / smartphone / machine learning / Android / operating system / mobile device / operating systems / access control list / encryption / non-volatile memory technology / application processor / java / finite state machine / event processor / Smartphones / Mobile Computing / http / peak-detection algorithm / four algorithms / flash / /

URL

http /

SocialTag