Epstein et al., 1998 - Google Patents
Security for the digital information age of medicine: Issues, applications, and implementationEpstein et al., 1998
View PDF- Document ID
- 9286356023913784248
- Author
- Epstein M
- Pasieka M
- Lord W
- Wong S
- Mankovich N
- Publication year
- Publication venue
- Journal of digital imaging
External Links
Snippet
Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to …
- 239000003814 drug 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5615268A (en) | System and method for electronic transmission storage and retrieval of authenticated documents | |
Obaidat et al. | Security of E-systems and Computer Networks | |
US8437474B2 (en) | Public key encryption for groups | |
Law et al. | How to make a mint: the cryptography of anonymous electronic cash | |
Jakobsson et al. | Revokable and versatile electronic money | |
AU746966B2 (en) | Method and apparatus for cryptographically camouflaged cryptographic key storage certification and use | |
US6708893B2 (en) | Multiple-use smart card with security features and method | |
Brands | A technical overview of digital credentials | |
WO1997012460A1 (en) | Document authentication system and method | |
Epstein et al. | Security for the digital information age of medicine: Issues, applications, and implementation | |
CN106897879A (en) | Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label | |
JPH0962596A (en) | Email system | |
Seo et al. | Electronic funds transfer protocol using domain-verifiable signcryption scheme | |
Dandash et al. | Fraudulent Internet Banking Payments Prevention using Dynamic Key. | |
Kou | Networking security and standards | |
CN101867587A (en) | A method and system for anonymous authentication | |
Mohammadi et al. | A secure E-tendering system | |
Hasan et al. | " Online Transaction Security Enhancement": An Algorithm Based on Cryptography | |
Bhujade et al. | Analysis and implementation of combined approach of RSA and ECC algorithm for enhanced data security | |
Peyravian et al. | Generation of RSA keys that are guaranteed to be unique for each user | |
Epstein et al. | Security for the digital information age of medicine: Issues, applications, and implementation | |
Verheul | Attestation Proof of Association–provability that attestation keys are bound to the same hardware and person | |
Maher | Trust in the new information age | |
GBESOR-ZOIKU | COLLEGE OF BASIC AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE | |
Mokhtari | Digital Money Methods Based On Public Insurance Tools |