B. Adversary Model
There are three types of threats : misuse of patient identities,
unauthorized access and modification of PHI in the health
monitoring system. Huang et al. in [11] considered three types
of adversary: the patient himself/herself, insiders and outsiders.