Epstein et al., 1997 - Google Patents
Security for the digital information age of medicine: Issues, applications, and implementationEpstein et al., 1997
View PDF- Document ID
- 2542160602660723123
- Author
- Epstein M
- Pasieka M
- Lord W
- Mankovich N
- Publication year
- Publication venue
- Journal of digital imaging
External Links
Snippet
Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to …
- 239000003814 drug 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673626B2 (en) | Threshold secret share authentication proof and secure blockchain voting with hardware security modules | |
US8437474B2 (en) | Public key encryption for groups | |
JP4855940B2 (en) | Efficient management of cryptographic key generation | |
US9609024B2 (en) | Method and system for policy based authentication | |
US8630421B2 (en) | Cryptographic key backup and escrow system | |
US6834112B1 (en) | Secure distribution of private keys to multiple clients | |
EP2348446B1 (en) | A computer implemented method for authenticating a user | |
JP7585315B2 (en) | Digital signature generation using cold wallets | |
US20020062451A1 (en) | System and method of providing communication security | |
Boonkrong | Authentication and Access Control | |
US20200344218A1 (en) | Secure message search | |
US20080240447A1 (en) | System and method for user authentication with exposed and hidden keys | |
CN106897879A (en) | Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label | |
Epstein et al. | Security for the digital information age of medicine: Issues, applications, and implementation | |
Kou | Networking security and standards | |
Curry | An introduction to cryptography and digital signatures | |
Lyu et al. | NSSIA: A New Self‐Sovereign Identity Scheme with Accountability | |
Xu et al. | A decentralized pseudonym scheme for cloud-based eHealth systems | |
Epstein et al. | Security for the digital information age of medicine: Issues, applications, and implementation | |
Zhang et al. | Blockchain-enabled data governance for privacy-preserved sharing of confidential data | |
Ravindran et al. | A review paper on regulating bitcoin currencies | |
US20240214187A1 (en) | System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography | |
Piper | An Introduction to Cryptography | |
Pikrammenos | Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake | |
Yang et al. | COIChain: Blockchain scheme for privacy data authentication in cross-organizational identification |