[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Qadir et al., 2023 - Google Patents

An Authentication and Access Control Model for Healthcare based Cloud Services

Qadir et al., 2023

View PDF
Document ID
13910544181219128665
Author
Qadir G
Hussan B
Publication year
Publication venue
Journal of Engineering

External Links

Snippet

ABSTRACT Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients' health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a …
Continue reading at www.iasj.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/34Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
    • G06F19/3418Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Health care, e.g. hospitals; Social work
    • G06Q50/24Patient record management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Similar Documents

Publication Publication Date Title
Riad et al. Sensitive and energetic IoT access control for managing cloud electronic health records
Chen et al. A Blockchain‐Based Medical Data Sharing Mechanism with Attribute‐Based Access Control and Privacy Protection
Fabian et al. Collaborative and secure sharing of healthcare data in multi-clouds
Ganiga et al. Security framework for cloud based electronic health record (EHR) system
Kahani et al. Authentication and access control in e-health systems in the cloud
Sharma et al. Blockchain-based decentralized architecture for cloud storage system
Lee et al. Privacy preservation in patient information exchange systems based on blockchain: system design study
Huang et al. FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system
Mishra et al. Hybrid blockchain based medical data sharing with the optimized CP-ABE for e-Health systems
Saravanan et al. Lattice based access control for protecting user data in cloud environments with hybrid security
Qadir et al. An Authentication and Access Control Model for Healthcare based Cloud Services
Huang et al. Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records
Sudheep et al. Review on securing medical big data in healthcare cloud
Kumar et al. A novel privacy preserving blockchain based secure storage framework for electronic health records
Satar et al. Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme
Wenhua et al. A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Ikuomola et al. Securing patient privacy in e-health cloud using homomorphic encryption and access control
Lavanya et al. Secure tamper-resistant electronic health record transaction in cloud system via blockchain
Sassi et al. Security and privacy protection in the e-health system: Remote monitoring of covid-19 patients as a use case
Bhardwaj et al. Review and analysis of security model in healthcare system
George et al. Privacy Protection and Con Dentiality in Medical IoT
Sumathi et al. A Decentralized Medical Network for Maintaining Patient Records Using Blockchain Technology
Austin Sharing PHR data in cloud using sigmoid key and median support signature-based cryptosystem
Merabet et al. A multi-authorisation blockchain-based access control for cloud healthcare system
Koravatti et al. Blockchain Based Health Care Management System