Qadir et al., 2023 - Google Patents
An Authentication and Access Control Model for Healthcare based Cloud ServicesQadir et al., 2023
View PDF- Document ID
- 13910544181219128665
- Author
- Qadir G
- Hussan B
- Publication year
- Publication venue
- Journal of Engineering
External Links
Snippet
ABSTRACT Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients' health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/34—Computer-assisted medical diagnosis or treatment, e.g. computerised prescription or delivery of medication or diets, computerised local control of medical devices, medical expert systems or telemedicine
- G06F19/3418—Telemedicine, e.g. remote diagnosis, remote control of instruments or remote monitoring of patient carried devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/22—Health care, e.g. hospitals; Social work
- G06Q50/24—Patient record management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Riad et al. | Sensitive and energetic IoT access control for managing cloud electronic health records | |
Chen et al. | A Blockchain‐Based Medical Data Sharing Mechanism with Attribute‐Based Access Control and Privacy Protection | |
Fabian et al. | Collaborative and secure sharing of healthcare data in multi-clouds | |
Ganiga et al. | Security framework for cloud based electronic health record (EHR) system | |
Kahani et al. | Authentication and access control in e-health systems in the cloud | |
Sharma et al. | Blockchain-based decentralized architecture for cloud storage system | |
Lee et al. | Privacy preservation in patient information exchange systems based on blockchain: system design study | |
Huang et al. | FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system | |
Mishra et al. | Hybrid blockchain based medical data sharing with the optimized CP-ABE for e-Health systems | |
Saravanan et al. | Lattice based access control for protecting user data in cloud environments with hybrid security | |
Qadir et al. | An Authentication and Access Control Model for Healthcare based Cloud Services | |
Huang et al. | Lagrange interpolation-driven access control mechanism: Towards secure and privacy-preserving fusion of personal health records | |
Sudheep et al. | Review on securing medical big data in healthcare cloud | |
Kumar et al. | A novel privacy preserving blockchain based secure storage framework for electronic health records | |
Satar et al. | Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme | |
Wenhua et al. | A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications | |
Ikuomola et al. | Securing patient privacy in e-health cloud using homomorphic encryption and access control | |
Lavanya et al. | Secure tamper-resistant electronic health record transaction in cloud system via blockchain | |
Sassi et al. | Security and privacy protection in the e-health system: Remote monitoring of covid-19 patients as a use case | |
Bhardwaj et al. | Review and analysis of security model in healthcare system | |
George et al. | Privacy Protection and Con Dentiality in Medical IoT | |
Sumathi et al. | A Decentralized Medical Network for Maintaining Patient Records Using Blockchain Technology | |
Austin | Sharing PHR data in cloud using sigmoid key and median support signature-based cryptosystem | |
Merabet et al. | A multi-authorisation blockchain-based access control for cloud healthcare system | |
Koravatti et al. | Blockchain Based Health Care Management System |