[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Epstein et al., 1997 - Google Patents

Security for the digital information age of medicine: Issues, applications, and implementation

Epstein et al., 1997

View PDF
Document ID
2542160602660723123
Author
Epstein M
Pasieka M
Lord W
Mankovich N
Publication year
Publication venue
Journal of digital imaging

External Links

Snippet

Privacy and integrity of medical records is expected by patients. This privacy and integrity is often mandated by regulations. Traditionally, the security of medical records has been based on physical lock and key. As the storage of patient record information shifts from paper to …
Continue reading at pmc.ncbi.nlm.nih.gov (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
US10673626B2 (en) Threshold secret share authentication proof and secure blockchain voting with hardware security modules
US8437474B2 (en) Public key encryption for groups
JP4855940B2 (en) Efficient management of cryptographic key generation
US9609024B2 (en) Method and system for policy based authentication
US8630421B2 (en) Cryptographic key backup and escrow system
US6834112B1 (en) Secure distribution of private keys to multiple clients
EP2348446B1 (en) A computer implemented method for authenticating a user
JP7585315B2 (en) Digital signature generation using cold wallets
US20020062451A1 (en) System and method of providing communication security
Boonkrong Authentication and Access Control
US20200344218A1 (en) Secure message search
US20080240447A1 (en) System and method for user authentication with exposed and hidden keys
CN106897879A (en) Block chain encryption method based on the PKI CLC close algorithms of isomerization polymerization label
Epstein et al. Security for the digital information age of medicine: Issues, applications, and implementation
Kou Networking security and standards
Curry An introduction to cryptography and digital signatures
Lyu et al. NSSIA: A New Self‐Sovereign Identity Scheme with Accountability
Xu et al. A decentralized pseudonym scheme for cloud-based eHealth systems
Epstein et al. Security for the digital information age of medicine: Issues, applications, and implementation
Zhang et al. Blockchain-enabled data governance for privacy-preserved sharing of confidential data
Ravindran et al. A review paper on regulating bitcoin currencies
US20240214187A1 (en) System and Method of Creating Symmetric Keys Using Elliptic Curve Cryptography
Piper An Introduction to Cryptography
Pikrammenos Authentication Mechanism Enhancement Utilising Secure Repository for Passwordless Handshake
Yang et al. COIChain: Blockchain scheme for privacy data authentication in cross-organizational identification