IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Electronic Healthcare Records Distribution in Wireless Environments Using Low Resource Devices

Secure Electronic Healthcare Records Distribution in Wireless Environments Using Low Resource Devices
View Sample PDF
Author(s): Petros Belsis (Technological Education Institute Athens, Greece), Christos Skourlas (Technological Education Institute Athens, Greece)and Stefanos Gritzalis (University of the Aegean, Greece)
Copyright: 2011
Pages: 16
Source title: Pervasive Computing and Communications Design and Deployment: Technologies, Trends and Applications
Source Author(s)/Editor(s): Apostolos Malatras (University of Fribourg, Switzerland)
DOI: 10.4018/978-1-60960-611-4.ch011

Purchase

View Secure Electronic Healthcare Records Distribution in Wireless Environments Using Low Resource Devices on the publisher's website for pricing and purchasing information.

Abstract

The continuous growth of wireless technologies introduces a paradigm shift in the way information may be treated. Especially in the medical domain, Information Systems may gain benefits from the utilization of wireless devices which gain continuously in terms of resources. Existing legislation in US and EU countries introduces a lot of new challenges. Above all else, the information exchanged should be encrypted, and verified to reach the intended recipient. The authors of this chapter discuss the challenges hindering the efforts to disseminate in an accurate and secure manner medical information over wireless infrastructures. They present based on the results of two projects partially funded by the EU, an architecture that allows secure dissemination of electronic healthcare records. The chapter presents the architecture based on software agent technologies and enables query and authentication mechanisms in a transparent to the user manner. The chapter also discusses the security oriented choices of the approach and argues based on experimentation that the architecture efficiently supports a sufficient number of users.

Related Content

Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou. © 2014. 20 pages.
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu. © 2014. 31 pages.
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese. © 2014. 33 pages.
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch. © 2014. 22 pages.
Viktoriya Degeler, Alexander Lazovik. © 2014. 23 pages.
Vlasios Kasapakis, Damianos Gavalas. © 2014. 26 pages.
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu. © 2014. 18 pages.
Body Bottom