A HIPAA-compliant key management scheme with revocation of authorization
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
The privacy/security regulation of HIPAA has addressed many of the rights and obligations of both the patient and the health information system. Emergency treatment, however, still presents problems as we do not have an exact definition to apply. By employing cryptographic techniques, we provide a novel model which can confirm several essentials in HIPAA. In particular, we have discussed how the new model can appropriately handle emergency cases. This is useful for engineers to design a better HIPAA system.