IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Exchange of Electronic Health Records

Secure Exchange of Electronic Health Records
View Sample PDF
Author(s): Alejandro Enrique Flores (University of Wollongong, Australia), Khin Than Win (University of Wollongong, Australia)and Willy Susilo (University of Wollongong, Australia)
Copyright: 2011
Pages: 22
Source title: Certification and Security in Health-Related Web Applications: Concepts and Solutions
Source Author(s)/Editor(s): Anargyros Chryssanthou (Hellenic Data Protection Authority, Greece), Ioannis Apostolakis (National School of Public Health, Greece)and Iraklis Varlamis (Harokopio University of Athens, Greece)
DOI: 10.4018/978-1-61692-895-7.ch001

Purchase

View Secure Exchange of Electronic Health Records on the publisher's website for pricing and purchasing information.

Abstract

Protecting the confidentiality of a patient‘s information in a shared care environment could become a complex task. Correct identification of users, assigning of access permissions, and resolution of conflict rise as main points of interest in providing solutions for data exchange among health care providers. Traditional approaches such as Mandatory Access Control, Discretionary Access control and Role-Based Access Control policies do not always provide a suitable solution for health care settings, especially for shared care environments. The core of this contribution consists in the description of an approach which uses attribute-based encryption to protect the confidentiality of patients’ information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information; it also provides a set of functionalities which are described using a case study. Attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom