Katt et al., 2008 - Google Patents
Privacy and access control for ihe-based systemsKatt et al., 2008
View PDF- Document ID
- 16441649554550137015
- Author
- Katt B
- Breu R
- Hafner M
- Schabetsberger T
- Mair R
- Wozak F
- Publication year
- Publication venue
- International Conference on Electronic Healthcare
External Links
Snippet
Abstract Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/3418—Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3729256B1 (en) | Dynamically generated smart contracts | |
Yang et al. | Medshare: a novel hybrid cloud for medical resource sharing among autonomous healthcare providers | |
Sun et al. | Semantic access control for cloud computing based on e-Healthcare | |
Lebre et al. | A cloud-ready architecture for shared medical imaging repository | |
Lomotey et al. | Mobile-based medical data accessibility in mHealth | |
Sicuranza et al. | An access control model to minimize the data exchange in the information retrieval | |
O'Keefe et al. | A decentralised approach to electronic consent and health information access control | |
Abayomi-Alli et al. | An enterprise cloud-based electronic health records system | |
Vithanwattana et al. | Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes | |
Katt et al. | Privacy and access control for ihe-based systems | |
Sun et al. | Access control management for e-Healthcare in cloud environment | |
Li | A service-oriented model for personal health records | |
Ciampi et al. | On securing communications among federated health information systems | |
de la Torre-Díez et al. | Secure cloud-based solutions for different eHealth services in spanish rural health centers | |
Kallepalli et al. | Security middleware infrastructure for DICOM images in health information systems | |
Sucurovic | An approach to access control in electronic health record | |
De la Rosa Algarín et al. | Generating XACML enforcement policies for role-based access control of XML documents | |
Kacimi et al. | XACML policies into mongoDB for privacy access control | |
Al Kukhun et al. | Adaptive solutions for access control within pervasive healthcare systems | |
Buchanan et al. | Towards trust and governance in integrated health and social care platforms | |
von Laszewski et al. | eMOLST: a documentation flow for distributed health informatics | |
Akhtar et al. | Formal verification of authorization policies for enterprise social networks using PlusCal-2 | |
Tall et al. | Access Control in the Era of Big-Data Driven Models and Simulations | |
Kuijs et al. | Privacy enhancing data access control for ambient assisted living | |
Poulymenopoulou et al. | Ontology-driven authorization policies on personal health records for sustainable citizen-centered healthcare |