Privacy-Preserving Authentication and Key-Management Protocol for Health Information Systems

Author(s):  
Mukesh Soni ◽  
Dileep Kumar Singh
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 76812-76832 ◽  
Author(s):  
Kisung Park ◽  
Youngho Park ◽  
Ashok Kumar Das ◽  
Sungjin Yu ◽  
Joonyoung Lee ◽  
...  

Author(s):  
Sheikh Mohammad Idrees ◽  
Mariusz Nowostawski ◽  
Roshan Jameel ◽  
Ashish Kumar Mourya

1998 ◽  
Vol 37 (04/05) ◽  
pp. 518-526 ◽  
Author(s):  
D. Sauquet ◽  
M.-C. Jaulent ◽  
E. Zapletal ◽  
M. Lavril ◽  
P. Degoulet

AbstractRapid development of community health information networks raises the issue of semantic interoperability between distributed and heterogeneous systems. Indeed, operational health information systems originate from heterogeneous teams of independent developers and have to cooperate in order to exchange data and services. A good cooperation is based on a good understanding of the messages exchanged between the systems. The main issue of semantic interoperability is to ensure that the exchange is not only possible but also meaningful. The main objective of this paper is to analyze semantic interoperability from a software engineering point of view. It describes the principles for the design of a semantic mediator (SM) in the framework of a distributed object manager (DOM). The mediator is itself a component that should allow the exchange of messages independently of languages and platforms. The functional architecture of such a SM is detailed. These principles have been partly applied in the context of the HEllOS object-oriented software engineering environment. The resulting service components are presented with their current state of achievement.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document