• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 124
Next 10 →

A Secure e-Health Architecture based on the Appliance of Pseudonymization

by unknown authors
"... Abstract — Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade, because EHRs promise massive savings by digitizing and centrally providing medical data. As highly sensitive patient information is exch ..."
Abstract - Add to MetaCart
data privacy and keeps the access to health data under strict control of the patient. This paper introduces the new architecture PIPE (Pseudonymization of Information for Privacy in e-Health) that integrates primary and secondary usage of health data. It provides an innovative concept for data sharing

Efficient and Secure Communication Architecture for E-Health System

by Sangram Ray, Urbi Chatterjee, G. P. Biswas
"... Abstract: Efficient and secure communication architecture for e-health system is proposed in this paper to support online treatment of patients by medical specialists working in any hospital registered to RA (registration authority). The proposed architecture comprises three actors and two use cases ..."
Abstract - Add to MetaCart
authentication protocol for registration phase and symmetric encryption/decryption based protocols have been proposed for secure communication of the proposed e-health system. The in-depth security and performance analysis of the proposed communication architecture shows that the system is efficient and well

Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks

by Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal, Université De Technologie De Compiègne
"... Abstract—There has been a host of research works on wireless sensor networks for medical applications. However, the major shortcoming of these efforts is a lack of consideration of data management. Indeed, the huge amount of high sensitive data generated and collected by medical sensor networks intr ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
introduces several challenges that existing architectures cannot solve. These challenges include scalability, availability and security. In this paper, we propose an innovative architecture for collecting and accessing large amount of data generated by medical sensor networks. Our architecture resolves all

Internet of Things for Medication Control: E-Health Architecture

by Service Implementation
"... The use of Radio Frequency Identification technology (RFID) in medical context enables drug identification but also a rapid and, of course, precise identification of patients, physicians, nurses or any other health caregiver. Combining RFID tag identification with structured and secure Internet of T ..."
Abstract - Add to MetaCart
of Things (IoT) solutions, one can establish a ubiquitous and quick access to any type of medical related records, as long as one can control and adequately secure all the Internet mediated interactions. This paper presents an e-Health service architecture, along with the corresponding Internet of Things

A PROPOSED SECURITY ARCHITECTURE FOR ESTABLISHING PRIVACY DOMAINS IN E-HEALTH CLOUD

by Al-khanjari Z, Al-ani A
"... Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files ..."
Abstract - Add to MetaCart
an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients

Ontology-Based Matching of Security Attributes for Personal Data Access in e-Health

by Ioana Ciuciu, Brecht Claerhout, Louis Schilders, Robert Meersman
"... Abstract. This paper discusses an interoperability solution (tool) for the internal management of a policy decision engine located at the level of the au-thorization layer of a service oriented environment. The tool aims to support federated access control in the context of distributed architectures ..."
Abstract - Add to MetaCart
into the attributes recognized by the central (Master Policy Decision Point) vocabulary based on a security ontology and its domain-specific extensions which provides semantic reasoning services. The approach is validated in an e-Health scenario for the access of patient data for diabetes patient monitoring

The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval

by Len Sassaman, Bram Cohen - In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2005 , 2005
"... We present The Pynchon Gate, a pseudonymous message retrieval system. The Pynchon Gate is based upon Private Information Retrieval, an information theory primitive that enables us to address many of the known problems with existing pseudonymous communication systems. We propose a system where th ..."
Abstract - Cited by 22 (4 self) - Add to MetaCart
We present The Pynchon Gate, a pseudonymous message retrieval system. The Pynchon Gate is based upon Private Information Retrieval, an information theory primitive that enables us to address many of the known problems with existing pseudonymous communication systems. We propose a system where

Secure Pseudonym Management Using Mediated Identity-Based Encryption

by Thibault Candebat, Cameron Ross Dunne, David T. Gray - Journal of Computer Security
"... Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to sup-ply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of such services may therefore depend on how privac ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
accessing LBS under different pseudonyms. The identity-based character of the PKI simplifies signifi-cantly key management by removing the need for digital certificates. Its mediated architecture makes key revocation easier and more efficient as it allows for instant revocation of security capabilities.

AUTHENTICATION OF PROFESSIONALS IN THE RTS E-HEALTH SYSTEM

by André Zúquete, Helder Gomes, João Paulo, Silva Cunha
"... Abstract: This paper describes the design and implementation of a PKI-based e-Health authentication architecture. This architecture was developed to authenticate e-Health Professionals accessing RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated h ..."
Abstract - Add to MetaCart
Abstract: This paper describes the design and implementation of a PKI-based e-Health authentication architecture. This architecture was developed to authenticate e-Health Professionals accessing RTS (Rede Telemática da Saúde), a regional platform for sharing clinical data among a set of affiliated

WEHealth: A Secure and Privacy Preserving eHealth Using NOTICE

by Gongjun Yan, Ye Wang, Michele C. Weigle, Stephan Olariu, Khaled Ibrahim
"... Abstract — Electronic health service on roads is an important issue in next generation electronic health service. Innovative health service systems are needed to provide and support individualized electronic health service for medical needs on roads. In this paper, we integrate a novel, secure and p ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
and privacy preserving wireless electronic health system based on the concept and framework of NOTICE [WO07](a secure and privacyaware architecture for the notification of traffic incidents) and PHR (Personal Health Record). The proposed system, called WEHealth, is a service-oriented PHR system through which
Next 10 →
Results 1 - 10 of 124
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University