Academic literature on the topic 'Computer security Medical records Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer security Medical records Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer security Medical records Data protection"

1

Carrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.

Full text
Abstract:
Purpose ”“ The research aims to observe and describe the legal framework and implementation practices of personal databases management in the Social Security Institute (IPS), the most important public social insurance system in Paraguay. Methodology ”“ The research is exploratory, consisting on both substantive and procedural law analysis of health information storage regulations and its compliance. Also, interview to private companies, the public sector and one qualified worker insured by IPS are conducted to better understand collection, storage and maintenance of health records databases. Findings ”“ Research indicates evidence that biometric data storage of insurers does not have adequate regulation for its protection. It also shows evidence that private companies don’t deliver by default medical records to workers, as well as potential access to these records by administrative personal. Evidence also signals that clinics performing medical examinations request more sensitive information than required by law. Research limitations It is identified that a broader private company sample could be of use to better understand workers health record collection. Also, third party auditing IPS IT systems could be of use to further understand information management practices and vulnerabilities. Practical Implications ”“ A series of discretional practices are identified, signaling regulatory standardization urgency for all actors. A comprehensive Protection of Personal Data Act is needed. Originality ”“ No comprehensive research targeting the IPS system and its health personal data management processes is identified. The research is considered an initial contribution to the state of the art on the subject and specially to biometric collection and storage.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Baocheng, and Zetao Li. "Healthchain: A Privacy Protection System for Medical Data Based on Blockchain." Future Internet 13, no. 10 (September 24, 2021): 247. http://dx.doi.org/10.3390/fi13100247.

Full text
Abstract:
Recently, with the great development of e-health, more and more countries have made certain achievements in the field of electronic medical treatment. The digitization of medical equipment and the structuralization of electronic medical records are the general trends. While bringing convenience to people, the explosive growth of medical data will further promote the value of mining medical data. Obviously, finding out how to safely store such a large amount of data is a problem that urgently needs to be solved. Additionally, the particularity of medical data makes it necessarily subject to great privacy protection needs. This reinforces the importance of designing a safe solution to ensure data privacy. Many existing schemes are based on single-server architecture, which have some natural defects (such as single-point faults). Although blockchain can help solve such problems, there are still some deficiencies in privacy protection. To solve these problems, this paper designs a medical data privacy protection system, which integrates blockchain, group signature, and asymmetric encryption to realize reliable medical data sharing between medical institutions and protect the data privacy of patients. This paper proves theoretically that it meets our security and privacy requirements, and proves its practicability through system implementation.
APA, Harvard, Vancouver, ISO, and other styles
3

Mbonihankuye, Scholas, Athanase Nkunzimana, and Ange Ndagijimana. "Healthcare Data Security Technology: HIPAA Compliance." Wireless Communications and Mobile Computing 2019 (October 17, 2019): 1–7. http://dx.doi.org/10.1155/2019/1927495.

Full text
Abstract:
Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general. The number of data breaches compromising confidential healthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there is a need to use the electronic communication, and a number of methods have been developed for data security technology. Health Insurance Portability and Accountability Act (HIPAA) is one of the methods that can help in healthcare research. On stored database of patient in hospital or clinic, we can develop a conservational and analytical method so as to keep the medical records of the patients in a well-preserved and adequate environment. The method includes the improvement of working possibilities by delivering all the details necessary for the patient. All the information must be identified clearly. The protection of the privacy of the patients and the security of their information are the most imperative obstacles to obtain their intakes when considering the adoption of useful health data in the electronic field of healthcare industries.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Yongbin, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, and Yu Zhang. "Research on electronic medical record access control based on blockchain." International Journal of Distributed Sensor Networks 15, no. 11 (November 2019): 155014771988933. http://dx.doi.org/10.1177/1550147719889330.

Full text
Abstract:
For the medical industry, there are problems such as poor sharing of medical data, tampering, and leakage of private data. In view of these problems, a blockchain-based electronic medical record access control research scheme based on the role-based access control model is proposed in this article. First, the appropriate access control strategy is adopted to solve the leakage problem of the user’s medical privacy information during the access process. Then, the information entropy technology is used to quantify the medical data, so that the medical data can be effectively and maximally utilized. Using the distributed general ledger characteristics of blockchain and its inherent security attributes, data islands can be eliminated, data sharing among medical systems can be promoted, access records can be prevented from being tampered with, and medical research and precise medical treatment can be better supported. Through this research, not only can user’s medical privacy information protection be realized during the service process but also patients can manage their own medical data autonomously, which is beneficial to privacy protection under the medical data sharing.
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Mingyue, Rong Jiang, Wei Zhou, Sen Liu, and Savio Sciancalepore. "A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory." Security and Communication Networks 2020 (September 29, 2020): 1–18. http://dx.doi.org/10.1155/2020/5610839.

Full text
Abstract:
Information leakage in the medical industry has become an urgent problem to be solved in the field of Internet security. However, due to the need for automated or semiautomated authorization management for privacy protection in the big data environment, the traditional privacy protection model cannot adapt to this complex open environment. Although some scholars have studied the risk assessment model of privacy disclosure in the medical big data environment, it is still in the initial stage of exploration. This paper analyzes the key indicators that affect medical big data security and privacy leakage, including user access behavior and trust, from the perspective of users through literature review and expert consultation. Also, based on the user’s historical access information and interaction records, the user’s access behavior and trust are quantified with the help of information entropy and probability, and a definition expression is given explicitly. Finally, the entire experimental process and specific operations are introduced in three aspects: the experimental environment, the experimental data, and the experimental process, and then, the predicted results of the model are compared with the actual output through the 10-fold cross verification with Matlab. The results prove that the model in this paper is feasible. In addition, the method in this paper is compared with the current more classical medical big data risk assessment model, and the results show that when the proportion of illegal users is less than 15%, the model in this paper is more superior in terms of accuracy and recall.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Yingwen, Linghang Meng, Huan Zhou, and Guangtao Xue. "A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection." Wireless Communications and Mobile Computing 2021 (June 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/6685762.

Full text
Abstract:
The rapid development of wearable sensors and the 5G network empowers traditional medical treatment with the ability to collect patients’ information remotely for monitoring and diagnosing purposes. Meanwhile, the health-related mobile apps and devices also generate a large amount of medical data, which is critical for promoting disease research and diagnosis. However, medical data is too sensitive to share, which is also a common issue for IoT (Internet of Things) data. The traditional centralized cloud-based medical data sharing schemes have to rely on a single trusted third party. Therefore, the schemes suffer from single-point failure and lack of privacy protection and access control for the data. Blockchain is an emerging technique to provide an approach for managing data in a decentralized manner. Especially, the blockchain-based smart contract technique enables the programmability for participants to access the data. All the interactions are authenticated and recorded by the other participants of the blockchain network, which is tamper resistant. In this paper, we leverage the K-anonymity and searchable encryption techniques and propose a blockchain-based privacy-preserving scheme for medical data sharing among medical institutions and data users. To be specific, the consortium blockchain, Hyperledger Fabric, is adopted to allow data users to search for encrypted medical data records. The smart contract, i.e., the chaincode, implements the attribute-based access control mechanisms to guarantee that the data can only be accessed by the user with proper attributes. The K-anonymity and searchable encryption ensure that the medical data is shared without privacy leaking, i.e., figuring out an individual patient from queries. We implement a prototype system using the chaincode of Hyperledger Fabric. From the functional perspective, security analysis shows that the proposed scheme satisfies security goals and precedes others. From the performance perspective, we conduct experiments by simulating different numbers of medical institutions. The experimental results demonstrate that the scalability and performance of our scheme are practical.
APA, Harvard, Vancouver, ISO, and other styles
7

Wu, Jimmy Ming-Tai, Gautam Srivastava, Jerry Chun-Wei Lin, and Qian Teng. "A Multi-Threshold Ant Colony System-based Sanitization Model in Shared Medical Environments." ACM Transactions on Internet Technology 21, no. 2 (June 2021): 1–26. http://dx.doi.org/10.1145/3408296.

Full text
Abstract:
During the past several years, revealing some useful knowledge or protecting individual’s private information in an identifiable health dataset (i.e., within an Electronic Health Record) has become a tradeoff issue. Especially in this era of a global pandemic, security and privacy are often overlooked in lieu of usability. Privacy preserving data mining (PPDM) is definitely going to be have an important role to resolve this problem. Nevertheless, the scenario of mining information in an identifiable health dataset holds high complexity compared to traditional PPDM problems. Leaking individual private information in an identifiable health dataset has becomes a serious legal issue. In this article, the proposed Ant Colony System to Data Mining algorithm takes the multi-threshold constraint to secure and sanitize patents’ records in different lengths, which is applicable in a real medical situation. The experimental results show the proposed algorithm not only has the ability to hide all sensitive information but also to keep useful knowledge for mining usage in the sanitized database.
APA, Harvard, Vancouver, ISO, and other styles
8

Quantin, Catherine, François-André Allaert, Paul Avillach, Maniane Fassa, Benoît Riandey, Gilles Trouessin, and Olivier Cohen. "Building Application-Related Patient Identifiers: What Solution for a European Country?" International Journal of Telemedicine and Applications 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/678302.

Full text
Abstract:
We propose a method utilizing a derived social security number with the same reliability as the social security number. We show the anonymity techniques classically based on unidirectional hash functions (such as the secure hash algorithm (SHA-2) function that can guarantee the security, quality, and reliability of information if these techniques are applied to the Social Security Number). Hashing produces a strictly anonymous code that is always the same for a given individual, and thus enables patient data to be linked. Different solutions are developed and proposed in this article. Hashing the social security number will make it possible to link the information in the personal medical file to other national health information sources with the aim of completing or validating the personal medical record or conducting epidemiological and clinical research. This data linkage would meet the anonymous data requirements of the European directive on data protection.
APA, Harvard, Vancouver, ISO, and other styles
9

Anciaux, Nicolas, Morgane Berthelot, Laurent Braconnier, Luc Bouganim, Martine De la Blache, Georges Gardarin, Philippe Kesmarszky, et al. "A Tamper-Resistant and Portable Healthcare Folder." International Journal of Telemedicine and Applications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/763534.

Full text
Abstract:
Electronic health record (EHR) projects have been launched in most developed countries to increase the quality of healthcare while decreasing its cost. The benefits provided by centralizing the healthcare information in database systems are unquestionable in terms of information quality, availability, and protection against failure. Yet, patients are reluctant to give to a distant server the control over highly sensitive data (e.g., data revealing a severe or shameful disease). This paper capitalizes on a new hardware portable device, associating the security of a smart card to the storage capacity of a USB key, to give back to the patient the control over his medical data. This paper shows how this device can complement a traditional EHR server to (1) protect and share highly sensitive data among trusted parties and (2) provide a seamless access to the data even in disconnected mode. The proposed architecture is experimented in the context of a medicosocial network providing medical care and social services at home for elderly people.
APA, Harvard, Vancouver, ISO, and other styles
10

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer security Medical records Data protection"

1

Cheng, Sin Ying. "Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mxoli, Ncedisa Avuya Mercia. "Guidelines for secure cloud-based personal health records." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/14134.

Full text
Abstract:
Traditionally, health records have been stored in paper folders at the physician’s consulting rooms – or at the patient’s home. Some people stored the health records of their family members, so as to keep a running history of all the medical procedures they went through, and what medications they were given by different physicians at different stages of their lives. Technology has introduced better and safer ways of storing these records, namely, through the use of Personal Health Records (PHRs). With time, different types of PHRs have emerged, i.e. local, remote server-based, and hybrid PHRs. Web-based PHRs fall under the remote server-based PHRs; and recently, a new market in storing PHRs has emerged. Cloud computing has become a trend in storing PHRs in a more accessible and efficient manner. Despite its many benefits, cloud computing has many privacy and security concerns. As a result, the adoption rate of cloud services is not yet very high. A qualitative and exploratory research design approach was followed in this study, in order to reach the objective of proposing guidelines that could assist PHR providers in selecting a secure Cloud Service Provider (CSP) to store their customers’ health data. The research methods that were used include a literature review, systematic literature review, qualitative content analysis, reasoning, argumentation and elite interviews. A systematic literature review and qualitative content analysis were conducted to examine those risks in the cloud environment that could have a negative impact on the secure storing of PHRs. PHRs must satisfy certain dimensions, in order for them to be meaningful for use. While these were highlighted in the research, it also emerged that certain risks affect the PHR dimensions directly, thus threatening the meaningfulness and usability of cloud-based PHRs. The literature review revealed that specific control measures can be adopted to mitigate the identified risks. These control measures form part of the material used in this study to identify the guidelines for secure cloud-based PHRs. The guidelines were formulated through the use of reasoning and argumentation. After the guidelines were formulated, elite interviews were conducted, in order to validate and finalize the main research output: i.e. guidelines. The results of this study may alert PHR providers to the risks that exist in the cloud environment; so that they can make informed decisions when choosing a CSP for storing their customers’ health data.
APA, Harvard, Vancouver, ISO, and other styles
3

Mohammed, Yassene. "Data Protection and Data Security Concept for Medical Applications in a Grid Computing Environment." Doctoral thesis, 2008. http://hdl.handle.net/11858/00-1735-0000-0006-B3AE-A.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer security Medical records Data protection"

1

Eric, Johnson M., and SpringerLink (Online service), eds. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

J, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The definitive guide to complying with the HIPAA/HITECH privacy and security rules. Boca Raton, FL: CRC Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Privacy, confidentiality, and health research. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Association, Ontario Hospital. Guidelines for managing privacy, data protection and security for Ontario hospitals. Toronto: Ontario Hospital Association, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

E-health, privacy, and security law. 2nd ed. [Chicago]: American Bar Association Health Law Section, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fernald, Frances. HIPAA security compliance guide. Washington, D.C. (1100 17th St., NW, Suite 300, Washington 20036): Atlantic Information Services, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

E-health, privacy, and security law, second edition: 2012 supplement. [Chicago, IL]: American Bar Association Health Law Section, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

P, Mortenson Kenneth, ed. Health care privacy and security. [Eagan, MN.]: West Thomson Reuters, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer security Medical records Data protection"

1

Bercic, Boštjan, and Carlisle George. "Compiling Medical Data into National Medical Databases." In Database Technologies, 2085–99. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-058-5.ch125.

Full text
Abstract:
In recent years, various national medical databases have been set up in the EU from disparate local databases and file systems. Medical records contain personal data and are as such protected by EU and member states’ legislation. Medical data, in addition to being personal data, is also defined in the EU legislation as being especially sensitive and warrants special measures to protect it. It therefore follows that various legal issues and concerns arise in connection with these processes. Such issues relate to the merits of compiling a nationwide database, deciding on who has access to such a database, legitimate uses of medical data held, protection of medical data, and subject access rights amongst others. This chapter examines some of these issues and argues that such databases are inevitable due to technological change; however there are major legal and information security caveats that have to be addressed. Many of these caveats have not yet been resolved satisfactorily, hence making medical databases that already exist problematic.
APA, Harvard, Vancouver, ISO, and other styles
2

Bowles, Juliana, Thais Webber, Euan Blackledge, and Andreas Vermeulen. "A Blockchain-Based Healthcare Platform for Secure Personalised Data Sharing." In Studies in Health Technology and Informatics. IOS Press, 2021. http://dx.doi.org/10.3233/shti210150.

Full text
Abstract:
To facilitate personalised healthcare provision across Europe, we envision solutions that enable the secure integration and sharing of medical health records. These solutions should address privacy concerns, such as granular access control to personal data, establishing what should be accessible when and by whom, whilst complying with collective regulatory frameworks such as the European General Data Protection Regulation (GDPR) and adhering to international standards on how to manage information security. The proposed healthcare system design integrates technologies such as blockchain and scalable data lakes with adequate system routines to guarantee the secure access of confidential data. In this paper, we present the essential architectural components for the secure integration of medical records in a blockchain-based platform. We present a patient-centric data retrieval approach which incorporates a structured format to compose access rules.
APA, Harvard, Vancouver, ISO, and other styles
3

Medlin, B. Dawn, and Joseph A. Cazier. "Social Engineering Techniques, Password Selection, and Health Care Legislation." In Handbook of Research on Emerging Developments in Data Privacy, 85–99. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7381-6.ch005.

Full text
Abstract:
Healthcare employees generally have access to view hospital patient's medical records. This access can be simply viewing their chart or reviewing information on a computer screen. With this type of accessibly, hospital employees have the opportunity to view diagnosis, personal medical histories, as well as demographic information such as age and gender. Social engineers can use methods such as familiarity with co-workers for instance to obtain this information from unsuspecting health care workers. In addition, weak password selection can provide opportunities for a wealth of information to be stolen. In this chapter, current security legislation that addresses the security of patient's health care records, social engineering tactics, and passwords are explored.
APA, Harvard, Vancouver, ISO, and other styles
4

S, Chitra Selvi. "A Wearable Patient Healthcare Monitoring System Using IoT and Cloud Computing Based Security." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200178.

Full text
Abstract:
Now-a-days, a developing number of individuals at some point of a developing international locations like India forces to seem for brand spanking new answers for the persistent tracking of fitness check-up for stable data. It’s emerge as a need to go to hospitals frequently for doctor’s consultation, which has Growth to be financially associated and a time ingesting process. To beat this situation, we endorse a design to observe the patient’s fitness situations like heartbeat, temperature, ECG and BP and ship the message to guardian the use of GSM. Within the recent improvement of internet of factors (IoT) makes all objects interconnected and cloud been diagnosed due to the fact the subsequent technical revolution and now not secure for patient data. Patient monitoring is one a few of the IoT application to watch the affected person fitness status to collect facts to security for both medical doctor and patients Internet of things makes clinical equipment greater efficient with the aid of allowing actual time tracking of health in security privateness of the patient. Using IoT doctor can continuously monitor the patient’s cloud the usage of protection on his smartphone and also the affected person history could be stored on the web server and health practitioner can get entry to the statistics on every occasion wished from anywhere.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Yingge, Qiang Cheng, and Jie Cheng. "E-Health Security and Privacy." In Information Security and Ethics, 580–88. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch044.

Full text
Abstract:
The widespread and fast-developing information technologies, especially wireless communications and the Internet, have allowed for the realization of greater automation systems than ever in health-care industries: E-health has become an apparent trend, and having a clinic at home or even anywhere at anytime is no longer a dream. E-health, including telemedicine featured by conducting health-care transactions over the Internet, has been revolutionizing the well-being of human society. Traditionally, common practices in the health-care industry place tremendous burdens on both patients and health-care providers, with heavy loads of paper-based documents and inefficient communications through mail or phone calls. The transmission of medical data is even messy for cases in which patients have to transfer between different health providers. In addition, the medical documents prepared manually are prone to errors and delays, which may lead to serious consequences. The time, energy, and resources wasted in such processes are intolerable and unimaginable in any fast-paced society. For these problems, e-health provides powerful solutions to share and exchange information over the Internet in a timely, easy, and safe manner (Balas et al., 1997). Incorporating fast and cost-efficient Internet and wireless communication techniques has enabled the substantial development of e-health. The use of the Internet to transmit sensitive medical data, however, leaves the door open to the threats of information misuse either accidentally or maliciously. Health-care industries need be extremely cautious in handling and delivering electronic patient records using computer networks due to the high vulnerabilities of such information. To this extent, security and privacy issues become two of the biggest concerns in developing e-health infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms." In Handbook of Research on Cyber Crime and Information Privacy, 700–738. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch032.

Full text
Abstract:
Supporting a mechanism to authenticate members in electronic health record (EHR) is a fundamental procedure to prevent different threats from penetrating patients' identities/data. Existing authentication schemes still suffer from security drawbacks. Exchanging medical-related information/data between clients and the servers leaves them compromised to breakthrough by intruders as they can transmit over an unreliable environment. To guarantee the protection of patient records, this chapter proposes a new scheme that provides authentication of patients/providers in EHR depending on the legitimate member identities and the device information. The scheme utilizes an elliptic curve cryptography and lightweight hash function to accomplish robust security with satisfying performance. Moreover, it depends on a set of techniques such as multi-pseudonyms to authenticate legitimate members. Additionally, concentrated theoretical and experimental analysis proves that the proposed provides elevated performance and security compared to existing research.
APA, Harvard, Vancouver, ISO, and other styles
7

Naskar, Ruchira, Rajat Subhra Chakraborty, Dev Kumar Das, and Chandan Chakraborty. "Digital Image Watermarking." In Research Developments in Computer Vision and Image Processing, 195–207. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4558-5.ch011.

Full text
Abstract:
With the advent of telemedicine, Digital Rights Management of medical images has become a critical issue pertaining to security and privacy preservation in the medical industry. The technology of telemedicine makes patient diagnosis possible for physicians located at a remote site. This technology involves electronic transmission of medical images over the internet, thus raising the need for ensuring security and privacy of such information. Digital watermarking is a widely used technique for the authentication and protection of multimedia data such as images and video against various security and privacy threats. But such digital rights management practices as watermarking often lead to considerable distortion or information loss of the medical images. The medical images being highly sensitive and legally valuable assets of the medical industry, such information loss are often not tolerable. Most importantly, such information loss may lead to incorrect patient diagnosis or reduced accuracy of disease detection. In this chapter we investigate the impact of digital watermarking, and its effect on the accuracy of disease diagnosis, specifically diagnosis of malarial infection caused by Plasmodium vivax parasite. We have used a computer–aided, automatic diagnostic model for our work in this chapter. Our experimental results show that although general (lossy) digital watermarking reduces the diagnostic accuracy, it can be improved with the use of reversible (lossless) watermarking. In fact, the adverse effect(s) of watermarking on the diagnostic accuracy can be completely mitigated through the use of reversible watermarking.
APA, Harvard, Vancouver, ISO, and other styles
8

Marsh, Stephen, Andrew S. Patrick, and Pamela Briggs. "Social Issues of Trust and Digital Government." In Information Security and Ethics, 2905–14. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch193.

Full text
Abstract:
Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography