Provenance-aware Pervasive Computing in Clinical Applications

被引:0
|
作者
Kovalchuk, Yevgeniya [1 ]
Chen, Yuhui [2 ]
Miles, Simon [2 ]
Liang, Shao Fen [3 ]
Taweel, Adel [2 ]
机构
[1] Kings Coll London, Sch Med, Dept Primary Care & Publ Hlth Sci, London WC2R 2LS, England
[2] Kings Coll London, Sch Nat & Math Sci, Dept Informat, London WC2R 2LS, England
[3] Kings Coll London, NIHR, GSTFT, Biomed Res Ctr,KCL, London WC2R 2LS, England
来源
2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) | 2013年
关键词
provenance; pervasive computing; PROV model; clinical research information system; HEALTH-CARE; CHALLENGES;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Pervasive computing applications bring together heterogeneous network-connected devices, services and resources to enable context-aware information integration. The increasing adoption of pervasive computing technology in the healthcare domain offers a healthcare model that delivers high quality service with fewer resources. In this paper, we briefly review the existing pervasive healthcare solutions and propose a novel provenance-aware system design that can enhance the performance of such solutions by means of including provenance capture functionality. We argue that our system architecture can improve quality of clinical data, efficiency of its collection, and its integrating ability with other data sources. To demonstrate our system and explain its provenance capacity, we use a clinical research example in which a patient's condition is closely monitored in order to assess the safety and efficacy of medications and treatments prescribed to him.
引用
收藏
页码:297 / 302
页数:6
相关论文
共 50 条
  • [1] PrIMe: A Methodology for Developing Provenance-Aware Applications
    Miles, Simon
    Groth, Paul
    Munroe, Steve
    Moreau, Luc
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2011, 20 (03)
  • [2] Provenance-Aware NoSQL Databases
    Chacko, Anu Mary
    Fairooz, Munavar
    Kumar, S. D. Madhu
    SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 152 - 160
  • [3] Provenance-aware Query Optimization
    Niu, Xing
    Kapoor, Raghav
    Glavic, Boris
    Gawlick, Dieter
    Liu, Zhen Hua
    Krishnaswamy, Vasudha
    Radhakrishnan, Venkatesh
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 473 - 484
  • [4] Provenance-aware storage systems
    Muniswamy-Reddy, Kiran-Kumar
    Holland, David A.
    Braun, Uri
    Seltzer, Margo
    USENIX ASSOCIATION PROCEEDINGS OF THE 2006 USENIX ANNUAL TECHNICAL CONFERENCE, 2006, : 43 - +
  • [5] Provenance-aware secure networks
    Zhou, Wenchao
    Cronin, Eric
    Loo, Boon Thau
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1 AND 2, 2008, : 188 - 193
  • [6] TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing
    Luo, Wu
    Ruan, Anbang
    Shen, Qingni
    Wu, Zhonghai
    WEB SERVICES - ICWS 2018, 2018, 10966 : 67 - 83
  • [7] A Provenance-Aware Access Control Framework with Typed Provenance
    Sun, Lianshan
    Park, Jaehong
    Dang Nguyen
    Sandhu, Ravi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 411 - 423
  • [8] Decentralized provenance-aware publishing with nanopublications
    Kuhn, Tobias
    Chichester, Christine
    Krauthammer, Michael
    Queralt-Rosinach, Nuria
    Verborgh, Ruben
    Giannakopoulos, George
    Ngomo, Axel-Cyrille Ngonga
    Viglianti, Raffaele
    Dumontier, Michel
    PEERJ COMPUTER SCIENCE, 2016,
  • [9] QUAL: A Provenance-Aware Quality Model
    Baillie, Chris
    Edwards, Peter
    Pignotti, Edoardo
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2015, 5 (03): : 12
  • [10] Provenance-Aware Faceted Search in Drupal
    Shangguan, Zhenning
    Zheng, Jinguang
    McGuinness, Deborah L.
    PROVENANCE AND ANNOTATION OF DATA AND PROCESSES, 2010, 6378 : 142 - 147