[go: up one dir, main page]

Katt et al., 2008 - Google Patents

Privacy and access control for ihe-based systems

Katt et al., 2008

View PDF
Document ID
16441649554550137015
Author
Katt B
Breu R
Hafner M
Schabetsberger T
Mair R
Wozak F
Publication year
Publication venue
International Conference on Electronic Healthcare

External Links

Snippet

Abstract Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • G06F19/3418Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations

Similar Documents

Publication Publication Date Title
EP3729256B1 (en) Dynamically generated smart contracts
Yang et al. Medshare: a novel hybrid cloud for medical resource sharing among autonomous healthcare providers
Sun et al. Semantic access control for cloud computing based on e-Healthcare
Lebre et al. A cloud-ready architecture for shared medical imaging repository
Lomotey et al. Mobile-based medical data accessibility in mHealth
Sicuranza et al. An access control model to minimize the data exchange in the information retrieval
O'Keefe et al. A decentralised approach to electronic consent and health information access control
Abayomi-Alli et al. An enterprise cloud-based electronic health records system
Vithanwattana et al. Securing future healthcare environments in a post-COVID-19 world: moving from frameworks to prototypes
Katt et al. Privacy and access control for ihe-based systems
Sun et al. Access control management for e-Healthcare in cloud environment
Li A service-oriented model for personal health records
Ciampi et al. On securing communications among federated health information systems
de la Torre-Díez et al. Secure cloud-based solutions for different eHealth services in spanish rural health centers
Kallepalli et al. Security middleware infrastructure for DICOM images in health information systems
Sucurovic An approach to access control in electronic health record
De la Rosa Algarín et al. Generating XACML enforcement policies for role-based access control of XML documents
Kacimi et al. XACML policies into mongoDB for privacy access control
Al Kukhun et al. Adaptive solutions for access control within pervasive healthcare systems
Buchanan et al. Towards trust and governance in integrated health and social care platforms
von Laszewski et al. eMOLST: a documentation flow for distributed health informatics
Akhtar et al. Formal verification of authorization policies for enterprise social networks using PlusCal-2
Tall et al. Access Control in the Era of Big-Data Driven Models and Simulations
Kuijs et al. Privacy enhancing data access control for ambient assisted living
Poulymenopoulou et al. Ontology-driven authorization policies on personal health records for sustainable citizen-centered healthcare