You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

6 April 2023

Research on Medical Security System Based on Zero Trust

,
,
,
and
Beijing Electronic Science and Technology Institute, Beijing 100070, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Internet of Medical Things and Smart Healthcare

Abstract

With the rapid development of Internet of Things technology, cloud computing, and big data, the combination of medical systems and information technology has become increasingly close. However, the emergence of intelligent medical systems has brought a series of network security threats and hidden dangers, including data leakage and remote attacks, which can directly threaten patients’ lives. To ensure the security of medical information systems and expand the application of zero trust in the medical field, we combined the medical system with the zero-trust security system to propose a zero-trust medical security system. In addition, in its dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed to improve the security of medical equipment and data. Finally, the feasibility of the system is verified through a simulation experiment.

1. Introduction

Due to the impact of the new pneumonia epidemic, more and more countries are paying more attention to the construction of medical system informatization. The computerization of medical systems has therefore become an inevitable trend in the development of international medical services. In this direction, we strongly support the “Internet + Medical Health [1]” work. However, with the increasing informatization of the medical system, the medical system will also face more cybersecurity threats. The medical system contains all kinds of sensitive personal information, such as the age, name, and physical condition of all patients. Once attacked, the medical system may temporarily stop working, affecting the life safety of patients. Therefore, the security design of the medical system is of great importance to the informatization of the medical system.
As one of the emerging network security technologies, zero trust focuses on the protection of information and requires all access subjects to be authenticated and authorized to gain access. In the increasingly complex network environment, it can better resist system attacks. However, zero trust mainly applies to remote office equipment, and the scope of zero-trust research at home and abroad is one-sided. At the same time, a lot of research is being conducted on the combination of medical equipment and the Internet of Things, but more research needs to be carried out on the network security system of medical equipment. Therefore, in order to reduce the network security risks in the intelligent medical system [2], we combine the medical system with the zero-trust security system and propose a medical security system based on zero trust. In addition, based on the RBAC model and the calculation of access subjects’ behavior risk value and trust value, an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC) was designed. The system can better resist attacks on the system, reduce the possibility of medical data leakage, and improve the overall network security of the medical system.
Notations and abbreviations used in this paper are collated in Table 1.
Table 1. Summary of notations and abbreviations.

3. Medical Equipment Cyberspace Security System Based on Zero Trust

To solve the many network security problems in current medical equipment and strengthen the research on the medical device network system, we designed a medical equipment cyberspace security system based on zero trust according to the medical network security specification. In particular, based on the RBAC model, combined with user behavior risk value and trust, we designed an access control model based on subject behavior evaluation under the zero-trust condition (ABEAC), which can better resist attacks on the system, reduce the possibility of medical data leakage, and improve the overall network security of the medical system.

3.1. System Construction

The zero-trust-based medical security system is based on the zero-trust principle. No one can be trusted directly (digital identity management for doctors, patients, equipment, development and maintenance, and applications). Anyone needs to be authorized before accessing. The trust level is based on the visitor, the authenticated visitor’s trust level is evaluated dynamically and in real time, and the trust value is automatically adjusted.
In this article, a zero-trust-based healthcare security framework is designed, as shown in Figure 2, which specifically includes two parts, the control plane and data plane, where the control plane includes the policy engine and policy administrator and the data plane includes three parts: information about visitors, policy enforcement point, and final decision. Based on the core components of the zero-trust system [18], this framework adds several modules, such as CDM (continuous diagnosis and mitigation system), medical system management standards, identity management, PKI, security information and incident management system, and data access policy.
Figure 2. Medical equipment security system based on zero trust.
A continuous diagnosis and mitigation system (CDM) collects current information about medical equipment, including real-time information on the medical system and access request information. It updates the configuration and software organization, such as whether it is running an appropriate patched operating system, the integrity of the medical equipment network software, or whether any known vulnerabilities have appeared in unapproved components and databases.
Medical system management standards are various management systems that must be followed to ensure the normal operation of the medical system, such as Internet diagnostic methods (trial implementation), Internet hospital management methods (trial implementation), telemedicine service management specifications (trial implementation), and Internet medical and health information service management methods.
Identity authentication is a necessary part of the system. The principle of zero trust means that no person, equipment, or system is trusted under any circumstances. Therefore, the medical equipment network security system must first use the trust mechanism based on identity authentication. In the system, all access subjects have a database of corresponding identities, including doctors, patients, devices, applications, developers, and maintenance personnel. After the access subject sends an access request to the medical system, it needs to verify the identity of the access subject and prepare for the later dynamic access evaluation.
The PKI part is responsible for generating and recording the tokens issued by the medical equipment system to resources, services, and applications.
The security information and event management system continuously collects and analyzes security-centric data, then uses data refinement strategies to issue warnings against malicious attacks.
The data access policy is the attributes, rules, and strategies for accessing the medical device database. They are based on the identity and operation of the access subject and can be encoded through the management interface or dynamically generated by the policy engine. They provide basic access rights to accounts and applications/services in the medical device network and are the starting point for authorized resource access.
The policy engine (PE) is responsible for finally determining whether to authorize the access subject and whether the access subject can access the resource. It corresponds to each of the policy manager components. Specifically, based on the use policy of medical equipment and the access operation of medical equipment, the policy administrator (PA) completes the decision of granting, refusing, or revoking the access right of the access subject.
The policy administrator (PA) completes the communication with the policy enforcement point (PEP) by creating a communication path through the control plane. According to the relevant policy execution instructions, the policy administrator decides to open or close the communication channel of the access subject and the access resource. The access subject will produce a specific identity authentication token or credential in applying for medical resources. If the access subject is authenticated, the policy administrator (PA) signals the policy enforcement point (PEP) to open the path between the access subject and the access resource. Otherwise, the policy administrator (PA) signals the policy enforcement point (PEP) to close the connection.
The policy enforcement point (PEP) is a single logical component in the system responsible for enabling, monitoring, and eventually terminating the connection between the medical device and the user based on policy updates sent by the policy administrator (PA). The policy enforcement point (PEP) divides into two different components: the user side and the resource side. According to the dynamic access control policy, it decides the communication connection between the access subject and the access resource.

3.2. Dynamic Authentication Process

In the dynamic access control policy, based on the RBAC model and the calculation results of user behavior risk value and trust degree, we designed an access control model based on subject behavior evaluation under the zero-trust condition (ABEAC). ABEAC is the core part of the zero-trust-based medical security system. In the access control, the access subject is divided into the user and the medical device. The access rights of the access subject are dynamically adjusted by verifying the identity and evaluating the trust degree and behavior risk value, respectively. This not only improves the success rate of interaction between access subject nodes and the resource nodes but also reduces the risk of the illegal operation of legal users and improves the security of medical equipment and data. The dynamic access control flow chart is shown in Figure 3.
Figure 3. Flow chart of dynamic access control.
Step 1: The access subject submits the access request and judges the subject type. After obtaining the subject type of the user or medical device, it needs to verify the legitimacy of the identity. If it is legal, proceed to the next step; if it is not legal, deny access.
Step 2: Call the trust database according to the access subject type and calculate the subject’s trust value a. If a > threshold, access permission is obtained, and if a < threshold, access is denied.
Step 3: Identify access subject requests and screen resource nodes.
Step 4: Calculate the access subject behavior risk value b. If b > threshold, the access subject can obtain access right; if b < threshold, the access is denied.
Step 5: When the requirements both of a > threshold and b > threshold are met, the two parties can interact to access resources.

3.3. Trust Calculation

To provide reliable services and establish a safe medical equipment system, this article combines user behavior risk assessment and identity trust assessment to evaluate user trust. According to the definition of GB/T 20984–2007 Specification for Information Security Risk Assessment of Information Security Technology and related medical equipment standards, through the analysis of information security risk factors in the information system, the user trust and behavior risk values are designed.

3.3.1. Calculation of User Behavior Risk Value

Equation (5) represents the process of risk attenuation when the user has normal behavior, that is, the calculation of the risk value in legitimate access [19], where α ∈ [0.5, 1] is the high-risk attenuation factor, which regulates the attenuation rate of the user’s risk value. Equation (6) calculates the risk value when the user has a threatening behavior, where μ ∈ [1,2] represents the adjustment factor used to adjust the user’s behavior risk under different behavior frequencies. It is the calculation result of the user’s latest behavior risk value; t represents the number of user threat behaviors, CV is the value of medical data, V is vulnerability, and TA is threat behavior. According to the information security risk calculation formula and GB/T 20984–2007 Information Security Technology Information Security Risk Assessment Specification, the following definitions are made:
R = { (5) α × R V 0 (6) R V 0 + μ × t × C V × V × T A R V + V + T A                               
CV (medical data value): In a cloud environment, the degree of harm caused by a threat varies depending on the importance of different components or resources. Therefore, it is necessary to divide the value of medical data and assign values to different levels of resource values. The higher the level, the more important the resource and the greater its value. The CV level of the medical data value is CV = {1 CV (generally important), 2 CV (important), 3 CV (more important), 4 CV (very important), 5 CV (very important)}.
V (vulnerability): Vulnerability refers to some weak parts in the cloud, such as software vulnerabilities, backdoors, or hardware system failures. Similar to the classification of data value, the vulnerability of medical data is also classified and assigned. The higher the level, the more serious the vulnerability of medical data and the greater the loss caused by threatened use. V = {1 V (generally severe), 2 V (serious), 3 V (more severe), 4 V (very severe), 5 V (very severe)}.
TA (threat behavior): Since any attack is manifested through behavior, this article regards users’ abnormal behavior, breach of contract, and malicious security behavior as threats. Threat behaviors are divided into levels and assigned values according to their impact on resources. The higher the level, the greater the value assigned, indicating that the user behavior has a more serious impact on medical data. The level of threat behavior TA is TA= {1 TA (ignorable impact), 2 TA (small impact), 3 TA (normally severe impact), 4 TA (severe impact), 5 TA (very severe impact)}.

3.3.2. User Trust Calculation Formula

Equation (7) is in the high-risk state, where λ∈[0.5, 1] is the trust correction factor in the high-risk state, which adjusts the rate of user trust decline. Equation (8) is in the low-risk state, where ρ ∈[0, 0.5] is the trust correction factor in the low-trust risk state to adjust the growth rate of user trust. In the two formulas, R is the user’s risk trust value, t is the number of threat behaviors, T0 is the user trust calculated last time, and θ is the user behavior risk threshold constant [20].
T = { (7) λ t × T 0 + ( 1 λ ) t × ( R θ ) , R [ θ , 10 ]                         (8) T 0 + ρ t × ( θ R ) , R [ 0 , θ )

4. Simulation

In the cloud computing environment of medical equipment, dynamic access control can effectively control the illegal behavior of users and protect medical data resources. In order to verify the rationality and effectiveness of this model, this chapter simulates this model from the user behavior evaluation algorithm.

4.1. Experimental Data

This article analyzes the calculated behavioral risk values and user trust of two cloud system users when accessing and operating cloud resources ten times, under two situations:
(1) The change in the risk value and trust level of the user’s normal operation for a long time after a single threat behavior. The specific situation is that when user u1 accessed the system software assigned a value of 6 for the third time, he performed a malicious security behavior assigned a value of 7; the vulnerable value was assigned a value of 5, and the operation was legal at other times.
(2) Changes in user behavior risk and trust under multiple threats. The specific situation is that when the user u_2 accesses the shared data assigned a value of 4 for the second time, he has performed a violation of the assignment value of 5, and the fragile value is assigned a value of 6. The eighth visit to the application software assigned a value of 3 performed an abnormal behavior assigned a value of 2; the fragile value was assigned a value of 2, and the other time operations were legal.
Cloud user assessment needs to be divided into vulnerability levels, medical data value levels, and threat behavior levels. According to the GB/T 20984–2007 Information Security Technology Information Security Risk Assessment Specification and the UBADAC model [20], the classification of vulnerability level is shown in Table 2, the value levels of medical data are classified as shown in Table 3, and the classification of threat behavior is shown in Table 4.
Table 2. Vulnerability level.
Table 3. Value level of medical data.
Table 4. Threat behavior division.
According to the basic resource types of cloud computing, the value levels of medical data are classified as shown in Table 3.
According to the behavior of visiting users, the threat behavior of users is divided into abnormal behavior, breach of contract, and malicious security behavior. The classification of threat behavior is shown in Table 4.
At the same time, in order to have reasonableness and credibility of the experimental data, the initial values of the relevant parameters are set: R_0 (u_1) = 4, R_0 (u_2) = 5, T_0 (u_1) = 5, T_0 (u_2) = 5, α = 0.75, λ = 0.8, ρ = 0.2, θ = 3, μ_1 = 1.4, and μ_2 = 1.8

4.2. Analysis of the Relationship between User Behavior Risk and User Trust

In order to improve the rationality of the behavioral risk value and trust degree under the user’s multiple threat behaviors, this article improves the user behavior evaluation algorithm in the TMBRE model. Hereinafter, the TMBRE model is called Model 1, and the design model in this article is Model 2.
For the first case, as shown in Figure 4, when the user has a threat behavior on the second visit, the risk value increases and the trust value decreases in Model 1, but when there is a threat behavior on the eighth visit, the risk value only slightly increases and there is no obvious change.
Figure 4. Flow chart of dynamic access control.
In Model 2 in the first case, the change curve of user u_2’s behavioral risk value and trust degree is shown in Figure 5. The user has threatening behavior during the second visit, and the behavioral risk value has the process of increasing. The second threatening behavior appears on the eighth visit, and the behavioral risk value has a sharp increase process, and the degree of trust declines accordingly.
Figure 5. The u_2 behavior risk value and trust change curve Model 2.

4.3. Analysis of the Relationship between Multi-User Behavior Risk and Trust

In the second situation, we conduct a simulation experiment of multi-user behavior risk value and trust degree change and further compare Model 1 and Model 2.
As follows, the user u_1 accessed value level of medical data was shared data assigned 4, breach of contract was 5, and the vulnerability level assignment was 6 for the second time; for the eighth time, the value level of medical data was application software assigned 3, abnormal behavior was 2, and the vulnerability level assignment was 2. Other than that, it was all legitimate access. The user u_2 accessed value level of medical data was systems software assigned 6, abnormal behavior was 2, and the vulnerability level assignment was 4 for the third time; for the seventh time, the value level of medical data was application software assigned 2, breach of contract was 5, and the vulnerability level assignment was 3. Other than that, it was all legitimate access. The user u_3 accessed value level of medical data was shared data assigned 4, abnormal behavior was 3, and the vulnerability level assignment was 2 for the first time; for the fifth time, the value level of medical data was shared data assigned 5, breach of contract was 4, and the vulnerability level assignment was 4; for the seventh time, the value level of medical data was system software assigned 6, abnormal behavior was 2, and the vulnerability level assignment was 8. Other than that, it was all legitimate access. The user u_4 accessed value level of medical data was system software assigned 7, breach of contract was 4, and the vulnerability level assignment was 4 for the fifth time. Other than that, it was all legitimate access.
Shown in Figure 6 is the change curve of the Model 1 multi-user behavior risk value. The behavioral risk value of the four users in the first few violations of regulations has an obvious trend of increase, but with the next few violations of regulations, the behavioral risk value only increased slightly, and the change was not obvious.
Figure 6. Model multi-user behavior risk value change curve.
Shown in Figure 7 is the curve graph of the Model 1 multi-user user trust degree. When four users perform operations in violation of regulations, the user trust value does not change significantly.
Figure 7. Model multi-user trust value change curve.
Shown in Figure 8 and Figure 9, respectively, are more than two user models and the behavioral risk value change curve of user confidence. When the four users performed operations in violation of regulations, the behavioral risk values all had a significant upward trend, and the corresponding user trust level also had a corresponding downward trend.
Figure 8. Change curve of multi-user behavior risk value in Model 2.
Figure 9. Multi-user trust value change curve of Model 2.
According to the experimental results, the TMBRE model does not consider the impact of the number of threat behaviors on the trust of entities when evaluating trust. However, the ABAEC model makes up for the defect. The trust value of the ABAEC model decreases when the risk value of user behavior increases. When there is only one threat behavior, ABAEC has a sharp increase in the behavior risk value when there is a secondary threat, and the trust degree decreases, which is more in line with the actual situation. When multiple users carry out threatening behaviors, the behavior risk value of the ABAEC model has an obvious upward trend, and the corresponding user trust degree also has a corresponding downward trend, which is more in line with the basic law. The effect is better than the TMBRE model. Therefore, the ABAEC model is more reasonable and effective, and can better protect medical equipment resources.

5. Conclusions

With the wide application of Internet technology in the medical field, the intelligent medical system has many network security problems. The problems such as data leakage caused by attacks will pose a serious threat to the life safety of patients. The data security of medical equipment has become one of the important factors affecting the promotion and application of intelligent medical systems. Therefore, it is necessary to strengthen the information security protection of medical equipment and medical information. We designed a zero-trust medical security system based on previous studies to promote medical equipment application and prevent information leakage. In the dynamic access control module, based on the RBAC model and the calculation of user behavior risk value and trust, we designed an access control model based on subject behavior evaluation under zero-trust conditions (ABEAC). We compared it with the TMBRE model in multiple dimensions. Finally, the comparison shows that the ABEAC model is more consistent with the basic law of the changing relationship between behavior risk value and trust. The effect is better than the TMBRE model. The ABEAC model emphasizes dynamic access control, which improves the dynamics and timeliness of the model to ensure the security of medical equipment and data.
At present, the zero-trust medical security system proposed by us can be applied to the medical field to strengthen the information security protection of medical equipment and medical information. However, it also has the problems of cumbersome authentication and low work efficiency. In the future, we will study and improve the following directions:
(1) With the combination of medical devices and the Internet becoming closer and closer, it is necessary to explore a more comprehensive medical equipment model structure, improve the stability of the trust evaluation model, and further improve the security and applicability of the model in the actual application environment.
(2) The access control strategy mainly calculates user behavior risk value and user trust degree, and when both meet the access requirements, the access subject can access. Although the authentication results are accurate, the process is relatively cumbersome. Next, we will shorten the time of identity authentication and improve work efficiency while ensuring that medical equipment is accessed safely.

Author Contributions

Conceptualization, Z.W. and X.Y.; methodology, Z.W.; software, Z.W. and P.X.; validation, Z.W., X.Y. and P.X.; formal analysis, Z.W. and P.X.; data curation, P.X.; writing—original draft preparation, Z.W. and Y.Q.; writing—review and editing, Z.W., X.Y., Y.Q. and L.J.; visualization, Z.W.; supervision, X.Y. and L.J.; project administration, X.Y.; funding acquisition, X.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was financially supported by the National Key Research and Development Plan of China (Grant No. 2018YFB0803401), the Fundamental Research Funds for the Central Universities (Grant No. 328202203), and China Postdoctoral Science Foundation funded project (Grant No. 2019M650606).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. Yang, H.; Li, J.Q.; Li, X.Z.; Huang, Z.; Wu, Y. Build Internet plus health care innovation service mode–create new experience for outpatients&apos; medical treatment. Med. Theory Pract. 2021, 34, 717–719. [Google Scholar]
  2. Tencent Smart Security. Medical Industry Blackmail Virus Project. Available online: https://s.tencent.com/research/report/535.html (accessed on 10 March 2023).
  3. Liu, Y.Z.; Hao, X.H.; Ren, W.; Xiong, R.T.; Zhu, T.Q.; Choo, K.K.R.; Min, G. A blockchain-based decentralized, fair and authenticated in formation sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 2023, 72, 501–512. [Google Scholar] [CrossRef]
  4. Xie, L.J.; Hang, F.L.; Guo, W.; Lv, Y.; Chen, H. A micro-segmentation protection scheme based on zero trust architecture. In Proceedings of the ISCTT 2021, 6th International Conference on Information Science, Computer Technology and Transportation, Xishuangbanna, China, 26–28 November 2021; pp. 1–4. [Google Scholar]
  5. Zhang, P.F.; Tian, C.; Shang, T.; Liu, L.; Li, L.; Wang, W.; Zhao, Y.M. Dynamic access control technology based on zero-trust light verification network model. In Proceedings of the 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), Beijing, China, 14–16 May 2021; pp. 712–715. [Google Scholar] [CrossRef]
  6. Chen, L.; Dai, Z.; Chen, M.; Li, N. Research on the security protection framework of power mobile internet services based on zero trust. In Proceedings of the 2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA), Kunming, China, 29–30 May 2021; pp. 65–68. [Google Scholar] [CrossRef]
  7. Fang, W.; Guan, X. Research on iOS remote security access technology based on zero trust. In Proceedings of the 2022 IEEE 6th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 4–6 March 2022; pp. 238–241. [Google Scholar] [CrossRef]
  8. Vallathan, G.; Rajamani, V.; Harinee, M.P. Enhanced medical data security and perceptual quality for healthcare services. In Proceedings of the 2020 International Conference on System, Computation, Automation and Networking (ICSCAN), Pondicherry, India, 3–4 July 2020; pp. 1–6. [Google Scholar] [CrossRef]
  9. Le, T.V.; Lu, C.F.; Hsu, C.L.; Do, T.K.; Chou, Y.F.; Wei, W.C. A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems. IEEE Access 2022, 10, 28975–28990. [Google Scholar] [CrossRef]
  10. Oh, H.; Yu, J.; Kim, N.; Kim, D.; Lee, J.; Yang, J. A federated binarized neural network model for constrained de vices in IoT healthcare services. In Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Jeju Island, Korea, 21–24 February 2022; pp. 241–245. [Google Scholar] [CrossRef]
  11. Sivasangari, A.; Sonti, V.J.K.K.; Ajitha, P.; Deepa, D.; Vignesh, R. Integrated security framework for healthcare using blockchain and fog computing. In Proceedings of the 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, 21–22 January 2022; pp. 1–5. [Google Scholar] [CrossRef]
  12. Campbell, M. Beyond zero trust: Trust is a vulnerability. Computer 2020, 53, 110–113. [Google Scholar] [CrossRef]
  13. Tian, X.P.; Song, H.H. A zero trust method based on BLP and BIBA model. In Proceedings of the 2021 14th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China, 11–12 December 2021; pp. 96–100. [Google Scholar] [CrossRef]
  14. Khan, M.F.F.; Sakamura, K. A context-policy-based approach to access control for health care data protection. In Proceedings of the 2020 International Computer Symposium (ICS), Tainan, Taiwan, 17–19 December 2020; pp. 420–425. [Google Scholar] [CrossRef]
  15. Miao, Y.; Sun, Y.; Chen, X.J.; Song, W. Implementation of fine-grained mandatory access control mechanism for multi-source object relational database. Comput. Appl. Softw. 2021, 38, 14–21+55. [Google Scholar]
  16. Yang, F.J.; Ding, T.; Fu, M.; Zhang, P.H.; Zhou, C. Research on authority complexity and reliability control model based on RBAC. Comput. Appl. Softw. 2022, 39, 30–38+59. [Google Scholar]
  17. Zhang, R.L.; Wu, X.N.; Zhou, S.Y.; Dong, X.S. A trust model based on Entity Behavior Risk Assessment. Chin. J. Comput. 2009, 32, 688–698. [Google Scholar] [CrossRef]
  18. Wang, X.B. Network security solutions based on zero trust Architecture. Intell. Build. 2019, 223, 63–67. [Google Scholar]
  19. Amédée-Manesme, C.O.; Barthélémy, F. Ex-ante real estate value at risk calculation method. Ann. Oper. Res. 2018, 262, 257–285. [Google Scholar] [CrossRef]
  20. Jing, X.; Liu, Z.; Li, S.; Qiao, B.; Tan, G. A cloud-user behavior assessment based dynamic access control model. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 1966–1975. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.