Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 10 SI
Page No. 9006 - 9012

Security Methodologies for Electronic Health Record: A Case Study

Authors : Mahendra Vucha, Himaja Anubolu, A.L. Siridhara and R. Karthik

References

Acharya, S., B. Coats, A. Saluja and D. Fuller, 2013. Secure electronic health record exchange: Achieving the meaningful use objectives. Proceedings of the 46th IEEE Hawaii International Conference on System Sciences (HICSS), Januray 7-10, 2013, IEEE, Wailea-Makena, Hawaii, ISBN:978-1-4673-5933-7, pp: 2555-2564.

Afzal, M., M. Hussain, M. Ahmad and Z. Anwar, 2011. Trusted framework for health information exchange. Proceedings of the IEEE Conference on Frontiers of Information Technology (FIT), December 19-21, 2011, IEEE, Islamabad, Pakistan, ISBN:978-1-4673-0209-8, pp: 308-313.

Aljarullah, A. and S.E. Masri, 2012. A novel system architecture for the national integration of electronic health records: A semi-centralized approach. J. Med. Syst., 37: 9953-9953.
CrossRef  |  Direct Link  |  

Bakers, D.B. and D.R. Masys, 1999. PCASSO: A design for secure communication of personal health information via the internet. Intl. J. Med. Inf., 54: 97-104.
PubMed  |  Direct Link  |  

Baldas, V., K. Giokas and D. Koutsouris, 2010. Multilevel access control in hospital information systems. Proceedings of the 12th Mediterranean Conference on Medical and Biological Engineering and Computing, May 27-30, 2010, Springer, Berlin, Germany, pp: 909-912.

Barber, B., 1998. Patient data and security: An overview. Intl. J. Med. Inf., 49: 19-30.

Blobel, B. and F.R. France, 2001. A systematic approach for analysis and design of secure health information systems. Intl. J. Med. Inf., 62: 51-78.
PubMed  |  Direct Link  |  

Blobel, B. and P. Pharow, 2006. Formal policies for flexible EHR security. Stud. Health Technol. Inf., 121: 307-316.

Blobel, B. and P. Pharow, 2007. A model driven approach for the German health telematics architectural framework and security infrastructure. Intl. J. Med. Inf., 76: 169-175.
Direct Link  |  

Blobel, B., 2000. Advanced tool kits for EPR security. Intl. J. Med. Inf., 60: 169-175.
PubMed  |  Direct Link  |  

Blobel, B., 2004. Authorization and access control for electronic health record systems. Intl. J. Med. Inf., 73: 251-257.
Direct Link  |  

Bouhaddou, O., T. Cromwell, M. Davis, S. Maulden and N. Hsing et al., 2012. Translating standards into practice: Experience and lessons learned at the department of veterans affairs. J. Biomed. Inf., 45: 813-823.
CrossRef  |  PubMed  |  Direct Link  |  

Burton, B., C. Cothran, N. Davis, J. Dooling and R. Dunn et al., 2013. The privacy and security of occupational health records. J. Am. Health Inf. Manage. Assoc., 84: 52-56.
Direct Link  |  

Chen, Y.Y., J.C. Lu and J.K. Jan, 2012. A secure EHR system based on hybrid clouds. J. Med. Syst., 36: 3375-3384.
CrossRef  |  PubMed  |  Direct Link  |  

Coleman J., 2013. Segmenting data privacy: Cross-industry initiative aims to piece out privacy within the health record. J. Am. Health Inf. Manage. Assoc., 84: 34-38.
PubMed  |  Direct Link  |  

Fernandez-Aleman, J.L., I.C. Senor, P.A.O. Lozoya and A. Toval, 2013. Security and privacy in electronic health records: A systematic literature review. J. Biomed. Inf., 46: 541-562.

Guo, L., X. Liu, Y. Fang and X. Li, 2012. User-centric private matching for eHealth networks: A social perspective. Proceedings of the IEEE Symposium on Communication and Information System Security (GLOBECOM), December 3-7, 2012, IEEE, Anaheim, California, ISBN:978-1-4673-0920-2, pp: 732-737.

Haak, M.V.D., A.C. Wolff, R. Brandner, P. Drings and M. Wannenmacher et al., 2003. Data security and protection in cross-institutional electronic patient records. Intl. J. Med. Inf., 70: 117-130.
Direct Link  |  

Hsiao, T.C., Z.Y. Wu, Y.F. Chung, T.S. Chen and G.B. Horng, 2012. A secure integrated medical information system. J. Med. Syst., 36: 3103-3113.
CrossRef  |  Direct Link  |  

Hsieh, G. and R.J. Chen, 2012. Design for a secure interoperable cloud-based personal health record service. Proceedings of the IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), December 3-6, 2012, IEEE, Taipei, Taiwan, ISBN:978-1-4673-4511-8, pp: 472-479.

Huang, C., H. Lee and D.H. Lee, 2012. A privacy-strengthened scheme for E-healthcare monitoring systems. J. Med. Syst., 36: 2959-2971.
CrossRef  |  PubMed  |  Direct Link  |  

Khan, M.F.F. and K. Sakamura, 2012. Security in healthcare informatics: Design and implementation of a robust authentication and a hybrid access control mechanism. Proceedings of the IEEE Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA), October 12-14, 2012, IEEE, Istanbul, Turkey, ISBN:978-1-4673-5230-7, pp: 159-164.

Laszewski, G.V., J. Dayal and L. Wang, 2011. EMOLST: A documentation flow for distributed health informatics. Concurrency Comput. Pract. Experience, 23: 1857-1867.
CrossRef  |  Direct Link  |  

Li, J.S., T.S. Zhou, J. Chu, K. Araki and H. Yoshihara, 2011. Design and development of an international clinical data exchange system: The international layer function of the Dolphin project. J. Am. Med. Inf. Assoc., 18: 683-689.
CrossRef  |  PubMed  |  Direct Link  |  

Li, M., S. Yu, Y. Zheng, K. Ren and W. Lou, 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst., 24: 131-143.
CrossRef  |  Direct Link  |  

Liu, C.H., Y.F. Chung, T.S. Chen and S.D. Wang, 2012. The enhancement of security in healthcare information systems. J. Med. Syst., 36: 1673-1688.
CrossRef  |  Direct Link  |  

Martinez, S., D. Sanchez and A. Valls, 2013. A semantic framework to protect the privacy of electronic health records with non-numerical attributes. J. Biomed. Inf., 46: 294-303.
CrossRef  |  PubMed  |  Direct Link  |  

Matteucci, I., P. Mori, M. Petrocchi and L. Wiegand, 2011. Controlled data sharing in E-health. Proceedings of the 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), September 8-8, 2011, IEEE, Milan, Italy, ISBN:978-1-4577-1182-4, pp: 17-23.

Murray, T.L., M. Calhoun and N.C. Philipsen, 2011. Privacy, confidentiality, HIPAA and HITECH: Implications for the health care practitioner. J. Nurse Pract., 7: 747-752.
Direct Link  |  

Neubauer, T. and J. Heurix, 2011. A methodology for the pseudonymization of medical data. Intl. J. Med. Inf., 80: 190-204.
Direct Link  |  

Riedl, B. and V. Grascher, 2010. Assuring integrity and confidentiality for pseudonymized health data. Proceedings of the IEEE International Conference on Electrical Engineering Electronics Computer Telecommunications and Information Technology (ECTI-CON), May 19-21, 2010, IEEE, Chiang Mai, Thailand, ISBN:978-1-4244-5606-2, pp: 473-477.

Rodrigues, J.J.P.C., I.D.L. Torre, G. Fernandez and M.L. Coronado, 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems. J. Med. Internet Res., 15: e186-e186.
CrossRef  |  Direct Link  |  

Santos, C., T. Pedrosa, C. Costa and J.L. Oliveira, 2011. On the use of open EHR in a portable PHR. Proceedings of the 4th International Conference on Health Informatics (HEALTHINF), January 26-29, 2011, INSTICC Publisher, Rome, Italy, pp: 351-356.

Singh, R., V. Gupta and K. Mohan, 2013. Dynamic federation in identity management for securing and sharing personal health records in a patient centric model in cloud. Intl. J. Eng. Technol., 5: 2201-2209.

Stingl, C. and D. Slamanig, 2011. Health records and the cloud computing paradigm from a privacy perspective. J. Healthcare Eng., 2: 487-508.
Direct Link  |  

Sun, J., X. Zhu, C. Zhang and Y. Fang, 2011. HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare. Proceedings of the 31st IEEE International Conference on Distributed Computing Systems (ICDCS), June 20-24, 2011, IEEE, Minneapolis, Minnesota, ISBN:978-1-61284-384-1, pp: 373-382.

Toh, S., R. Platt, J.F. Steiner and J.S. Brown, 2011. Comparative-effectiveness research in distributed health data networks. Clin. Pharmacol. Ther., 90: 883-887.
CrossRef  |  Direct Link  |  

Tsai, F.S., 2010. Security issues in E-healthcare. J. Med. Biol. Eng., 30: 209-214.

Win, K.T. and J. Fulcher, 2007. Consent mechanisms for electronic health record systems: A simple yet unresolved issue. J. Med. Syst., 31: 91-96.
CrossRef  |  PubMed  |  Direct Link  |  

Win, K.T., 2005. A review of security of electronic health record systems. Health Inf. Manage. J., 34: 13-18.
Direct Link  |  

Wu, R., G.J. Ahn and H. Hu, 2012. Secure sharing of electronic health records in clouds. Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaborate Com), October 14-17, 2012, IEEE, Pittsburgh, Pennsylvania, ISBN:978-1-4673-2740-4, pp: 711-718.

Zhang, R., J. Liu, Z. Han and L. Liu, 2011. RBTBAC: Secure access and management of EHR data. Proceedings of the IEEE International Conference on Information Society (I-Society), June 27-29, 2011, London, England, ISBN:978-1-61284-148-9, pp: 494-499.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved